Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
YWL3cB5Fah.exe

Overview

General Information

Sample name:YWL3cB5Fah.exe
renamed because original name is a hash value
Original sample name:8eee9b3715ed15a7d5712c72f846a6af1e3289a9b06bd9680f69190b10046bcd.exe
Analysis ID:1529032
MD5:b98b8ef708db68473ef0204de2004087
SHA1:73334e27ff036c7ccaab5a5654177f7974d8f506
SHA256:8eee9b3715ed15a7d5712c72f846a6af1e3289a9b06bd9680f69190b10046bcd
Tags:exeuser-adrian__luca
Infos:

Detection

FormBook
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected FormBook
AI detected suspicious sample
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • YWL3cB5Fah.exe (PID: 6268 cmdline: "C:\Users\user\Desktop\YWL3cB5Fah.exe" MD5: B98B8EF708DB68473EF0204DE2004087)
    • svchost.exe (PID: 6532 cmdline: "C:\Users\user\Desktop\YWL3cB5Fah.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000001.00000002.1869291913.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000001.00000002.1869291913.0000000000400000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x2f4b3:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x17512:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    00000001.00000002.1869685528.0000000003840000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000001.00000002.1869685528.0000000003840000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x2c2d0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x1432f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      SourceRuleDescriptionAuthorStrings
      1.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        1.2.svchost.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
        • 0x2e6b3:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
        • 0x16712:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
        1.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          1.2.svchost.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x2f4b3:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x17512:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01

          System Summary

          barindex
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\YWL3cB5Fah.exe", CommandLine: "C:\Users\user\Desktop\YWL3cB5Fah.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\YWL3cB5Fah.exe", ParentImage: C:\Users\user\Desktop\YWL3cB5Fah.exe, ParentProcessId: 6268, ParentProcessName: YWL3cB5Fah.exe, ProcessCommandLine: "C:\Users\user\Desktop\YWL3cB5Fah.exe", ProcessId: 6532, ProcessName: svchost.exe
          Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\YWL3cB5Fah.exe", CommandLine: "C:\Users\user\Desktop\YWL3cB5Fah.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\YWL3cB5Fah.exe", ParentImage: C:\Users\user\Desktop\YWL3cB5Fah.exe, ParentProcessId: 6268, ParentProcessName: YWL3cB5Fah.exe, ProcessCommandLine: "C:\Users\user\Desktop\YWL3cB5Fah.exe", ProcessId: 6532, ProcessName: svchost.exe
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: YWL3cB5Fah.exeReversingLabs: Detection: 70%
          Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000001.00000002.1869291913.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.1869685528.0000000003840000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: YWL3cB5Fah.exeJoe Sandbox ML: detected
          Source: YWL3cB5Fah.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: Binary string: wntdll.pdbUGP source: YWL3cB5Fah.exe, 00000000.00000003.1687677473.0000000004670000.00000004.00001000.00020000.00000000.sdmp, YWL3cB5Fah.exe, 00000000.00000003.1688766593.0000000004810000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1869834122.0000000003A00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1831403359.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1833704658.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1869834122.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: YWL3cB5Fah.exe, 00000000.00000003.1687677473.0000000004670000.00000004.00001000.00020000.00000000.sdmp, YWL3cB5Fah.exe, 00000000.00000003.1688766593.0000000004810000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000002.1869834122.0000000003A00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1831403359.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1833704658.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1869834122.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000001.00000002.1869291913.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.1869685528.0000000003840000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000001.00000002.1869291913.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000001.00000002.1869685528.0000000003840000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0042C773 NtClose,1_2_0042C773
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72B60 NtClose,LdrInitializeThunk,1_2_03A72B60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72DF0 NtQuerySystemInformation,LdrInitializeThunk,1_2_03A72DF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A735C0 NtCreateMutant,LdrInitializeThunk,1_2_03A735C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A74340 NtSetContextThread,1_2_03A74340
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A74650 NtSuspendThread,1_2_03A74650
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72BA0 NtEnumerateValueKey,1_2_03A72BA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72B80 NtQueryInformationFile,1_2_03A72B80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72BE0 NtQueryValueKey,1_2_03A72BE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72BF0 NtAllocateVirtualMemory,1_2_03A72BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72AB0 NtWaitForSingleObject,1_2_03A72AB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72AF0 NtWriteFile,1_2_03A72AF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72AD0 NtReadFile,1_2_03A72AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72FA0 NtQuerySection,1_2_03A72FA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72FB0 NtResumeThread,1_2_03A72FB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72F90 NtProtectVirtualMemory,1_2_03A72F90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72FE0 NtCreateFile,1_2_03A72FE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72F30 NtCreateSection,1_2_03A72F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72F60 NtCreateProcessEx,1_2_03A72F60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72EA0 NtAdjustPrivilegesToken,1_2_03A72EA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72E80 NtReadVirtualMemory,1_2_03A72E80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72EE0 NtQueueApcThread,1_2_03A72EE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72E30 NtWriteVirtualMemory,1_2_03A72E30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72DB0 NtEnumerateKey,1_2_03A72DB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72DD0 NtDelayExecution,1_2_03A72DD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72D30 NtUnmapViewOfSection,1_2_03A72D30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72D00 NtSetInformationFile,1_2_03A72D00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72D10 NtMapViewOfSection,1_2_03A72D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72CA0 NtQueryInformationToken,1_2_03A72CA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72CF0 NtOpenProcess,1_2_03A72CF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72CC0 NtQueryVirtualMemory,1_2_03A72CC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72C00 NtQueryInformationProcess,1_2_03A72C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72C60 NtCreateKey,1_2_03A72C60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72C70 NtFreeVirtualMemory,1_2_03A72C70
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A73090 NtSetValueKey,1_2_03A73090
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A73010 NtOpenDirectoryObject,1_2_03A73010
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A739B0 NtGetContextThread,1_2_03A739B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A73D10 NtOpenProcessToken,1_2_03A73D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A73D70 NtOpenThread,1_2_03A73D70
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_004096A00_2_004096A0
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0042200C0_2_0042200C
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0041A2170_2_0041A217
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_004122160_2_00412216
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0042435D0_2_0042435D
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_004033C00_2_004033C0
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0044F4300_2_0044F430
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_004125E80_2_004125E8
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0044663B0_2_0044663B
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_004138010_2_00413801
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0042096F0_2_0042096F
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_004129D00_2_004129D0
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_004119E30_2_004119E3
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0041C9AE0_2_0041C9AE
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0047EA6F0_2_0047EA6F
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0040FA100_2_0040FA10
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0044EB590_2_0044EB59
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_00423C810_2_00423C81
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_00411E780_2_00411E78
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_00442E0C0_2_00442E0C
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_00420EC00_2_00420EC0
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0044CF170_2_0044CF17
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_00444FD20_2_00444FD2
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_040F6AA00_2_040F6AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004020D01_2_004020D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004168831_2_00416883
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004010B01_2_004010B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004101331_2_00410133
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040E1B11_2_0040E1B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040E1B31_2_0040E1B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004012201_2_00401220
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004022F01_2_004022F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00402B001_2_00402B00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0042EDA31_2_0042EDA3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004026E01_2_004026E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00402F601_2_00402F60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040FF0D1_2_0040FF0D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040FF131_2_0040FF13
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A4E3F01_2_03A4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B003E61_2_03B003E6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AFA3521_2_03AFA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AC02C01_2_03AC02C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AE02741_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AF41A21_2_03AF41A2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B001AA1_2_03B001AA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AF81CC1_2_03AF81CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A301001_2_03A30100
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADA1181_2_03ADA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AC81581_2_03AC8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AD20001_2_03AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3C7C01_2_03A3C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A407701_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A647501_2_03A64750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5C6E01_2_03A5C6E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B005911_2_03B00591
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A405351_2_03A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AEE4F61_2_03AEE4F6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AE44201_2_03AE4420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AF24461_2_03AF2446
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AF6BD71_2_03AF6BD7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AFAB401_2_03AFAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3EA801_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A429A01_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B0A9A61_2_03B0A9A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A569621_2_03A56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A268B81_2_03A268B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6E8F01_2_03A6E8F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A4A8401_2_03A4A840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A428401_2_03A42840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ABEFA01_2_03ABEFA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A32FC81_2_03A32FC8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A82F281_2_03A82F28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A60F301_2_03A60F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AE2F301_2_03AE2F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB4F401_2_03AB4F40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A52E901_2_03A52E90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AFCE931_2_03AFCE93
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AFEEDB1_2_03AFEEDB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AFEE261_2_03AFEE26
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A40E591_2_03A40E59
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A58DBF1_2_03A58DBF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3ADE01_2_03A3ADE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A4AD001_2_03A4AD00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADCD1F1_2_03ADCD1F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AE0CB51_2_03AE0CB5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A30CF21_2_03A30CF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A40C001_2_03A40C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A8739A1_2_03A8739A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AF132D1_2_03AF132D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A2D34C1_2_03A2D34C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A452A01_2_03A452A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AE12ED1_2_03AE12ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5B2C01_2_03A5B2C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A4B1B01_2_03A4B1B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A7516C1_2_03A7516C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A2F1721_2_03A2F172
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B0B16B1_2_03B0B16B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AF70E91_2_03AF70E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AFF0E01_2_03AFF0E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AEF0CC1_2_03AEF0CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A470C01_2_03A470C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AFF7B01_2_03AFF7B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AF16CC1_2_03AF16CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A856301_2_03A85630
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADD5B01_2_03ADD5B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AF75711_2_03AF7571
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AFF43F1_2_03AFF43F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A314601_2_03A31460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5FB801_2_03A5FB80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB5BF01_2_03AB5BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A7DBF91_2_03A7DBF9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AFFB761_2_03AFFB76
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADDAAC1_2_03ADDAAC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A85AA01_2_03A85AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AE1AA31_2_03AE1AA3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AEDAC61_2_03AEDAC6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB3A6C1_2_03AB3A6C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AFFA491_2_03AFFA49
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AF7A461_2_03AF7A46
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AD59101_2_03AD5910
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A499501_2_03A49950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5B9501_2_03A5B950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A438E01_2_03A438E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AAD8001_2_03AAD800
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AFFFB11_2_03AFFFB1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A41F921_2_03A41F92
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AFFF091_2_03AFFF09
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A49EB01_2_03A49EB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5FDC01_2_03A5FDC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AF7D731_2_03AF7D73
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A43D401_2_03A43D40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AF1D5A1_2_03AF1D5A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AFFCF21_2_03AFFCF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB9C321_2_03AB9C32
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03AAEA12 appears 86 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03A2B970 appears 265 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03A87E54 appears 100 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03ABF290 appears 105 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03A75130 appears 58 times
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: String function: 004115D7 appears 36 times
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: String function: 00416C70 appears 39 times
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: String function: 00445AE0 appears 65 times
          Source: YWL3cB5Fah.exe, 00000000.00000003.1689083228.0000000004793000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs YWL3cB5Fah.exe
          Source: YWL3cB5Fah.exe, 00000000.00000003.1689821058.000000000493D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs YWL3cB5Fah.exe
          Source: YWL3cB5Fah.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000001.00000002.1869291913.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000001.00000002.1869685528.0000000003840000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: classification engineClassification label: mal84.troj.evad.winEXE@3/1@0/0
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0047839D CoInitialize,CoCreateInstance,CoUninitialize,0_2_0047839D
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeFile created: C:\Users\user\AppData\Local\Temp\enterogenousJump to behavior
          Source: YWL3cB5Fah.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: YWL3cB5Fah.exeReversingLabs: Detection: 70%
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeFile read: C:\Users\user\Desktop\YWL3cB5Fah.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\YWL3cB5Fah.exe "C:\Users\user\Desktop\YWL3cB5Fah.exe"
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\YWL3cB5Fah.exe"
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\YWL3cB5Fah.exe"Jump to behavior
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
          Source: YWL3cB5Fah.exeStatic file information: File size 1401331 > 1048576
          Source: Binary string: wntdll.pdbUGP source: YWL3cB5Fah.exe, 00000000.00000003.1687677473.0000000004670000.00000004.00001000.00020000.00000000.sdmp, YWL3cB5Fah.exe, 00000000.00000003.1688766593.0000000004810000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1869834122.0000000003A00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1831403359.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1833704658.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1869834122.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: YWL3cB5Fah.exe, 00000000.00000003.1687677473.0000000004670000.00000004.00001000.00020000.00000000.sdmp, YWL3cB5Fah.exe, 00000000.00000003.1688766593.0000000004810000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000002.1869834122.0000000003A00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1831403359.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1833704658.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1869834122.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
          Source: YWL3cB5Fah.exeStatic PE information: real checksum: 0xa961f should be: 0x161e86
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_00462463 push edi; ret 0_2_00462465
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004190AA push cs; iretd 1_2_004190D6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004148B9 push FFFFFFB6h; iretd 1_2_004148C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004031E0 push eax; ret 1_2_004031E2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004191B7 push esp; ret 1_2_004191BF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00401C18 pushfd ; ret 1_2_00401C58
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041AC38 push ecx; iretd 1_2_0041AC3B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00401646 push ss; ret 1_2_004016C5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041F667 push esp; retf 1_2_0041F669
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041F63B push 830C2AB9h; iretd 1_2_0041F64A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004016EB push ss; ret 1_2_004016C5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004016EB pushfd ; ret 1_2_004016E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040168C push ss; ret 1_2_004016C5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00405717 push esi; retf 1_2_00405720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00415FB3 push ebx; iretd 1_2_004160C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A309AD push ecx; mov dword ptr [esp], ecx1_2_03A309B6
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeAPI/Special instruction interceptor: Address: 40F66C4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A7096E rdtsc 1_2_03A7096E
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-85703
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeAPI coverage: 3.5 %
          Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.6 %
          Source: C:\Windows\SysWOW64\svchost.exe TID: 6464Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeAPI call chain: ExitProcess graph end nodegraph_0-84835
          Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A7096E rdtsc 1_2_03A7096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00417833 LdrLoadDll,1_2_00417833
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_040F52E0 mov eax, dword ptr fs:[00000030h]0_2_040F52E0
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_040F6930 mov eax, dword ptr fs:[00000030h]0_2_040F6930
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_040F6990 mov eax, dword ptr fs:[00000030h]0_2_040F6990
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A2E388 mov eax, dword ptr fs:[00000030h]1_2_03A2E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A2E388 mov eax, dword ptr fs:[00000030h]1_2_03A2E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A2E388 mov eax, dword ptr fs:[00000030h]1_2_03A2E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5438F mov eax, dword ptr fs:[00000030h]1_2_03A5438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5438F mov eax, dword ptr fs:[00000030h]1_2_03A5438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A28397 mov eax, dword ptr fs:[00000030h]1_2_03A28397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A28397 mov eax, dword ptr fs:[00000030h]1_2_03A28397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A28397 mov eax, dword ptr fs:[00000030h]1_2_03A28397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A403E9 mov eax, dword ptr fs:[00000030h]1_2_03A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A403E9 mov eax, dword ptr fs:[00000030h]1_2_03A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A403E9 mov eax, dword ptr fs:[00000030h]1_2_03A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A403E9 mov eax, dword ptr fs:[00000030h]1_2_03A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A403E9 mov eax, dword ptr fs:[00000030h]1_2_03A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A403E9 mov eax, dword ptr fs:[00000030h]1_2_03A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A403E9 mov eax, dword ptr fs:[00000030h]1_2_03A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A403E9 mov eax, dword ptr fs:[00000030h]1_2_03A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A4E3F0 mov eax, dword ptr fs:[00000030h]1_2_03A4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A4E3F0 mov eax, dword ptr fs:[00000030h]1_2_03A4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A4E3F0 mov eax, dword ptr fs:[00000030h]1_2_03A4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A663FF mov eax, dword ptr fs:[00000030h]1_2_03A663FF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AEC3CD mov eax, dword ptr fs:[00000030h]1_2_03AEC3CD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]1_2_03A3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]1_2_03A3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]1_2_03A3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]1_2_03A3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]1_2_03A3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]1_2_03A3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A383C0 mov eax, dword ptr fs:[00000030h]1_2_03A383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A383C0 mov eax, dword ptr fs:[00000030h]1_2_03A383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A383C0 mov eax, dword ptr fs:[00000030h]1_2_03A383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A383C0 mov eax, dword ptr fs:[00000030h]1_2_03A383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB63C0 mov eax, dword ptr fs:[00000030h]1_2_03AB63C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADE3DB mov eax, dword ptr fs:[00000030h]1_2_03ADE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADE3DB mov eax, dword ptr fs:[00000030h]1_2_03ADE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADE3DB mov ecx, dword ptr fs:[00000030h]1_2_03ADE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADE3DB mov eax, dword ptr fs:[00000030h]1_2_03ADE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AD43D4 mov eax, dword ptr fs:[00000030h]1_2_03AD43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AD43D4 mov eax, dword ptr fs:[00000030h]1_2_03AD43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6A30B mov eax, dword ptr fs:[00000030h]1_2_03A6A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6A30B mov eax, dword ptr fs:[00000030h]1_2_03A6A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6A30B mov eax, dword ptr fs:[00000030h]1_2_03A6A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A2C310 mov ecx, dword ptr fs:[00000030h]1_2_03A2C310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A50310 mov ecx, dword ptr fs:[00000030h]1_2_03A50310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AD437C mov eax, dword ptr fs:[00000030h]1_2_03AD437C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB2349 mov eax, dword ptr fs:[00000030h]1_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB2349 mov eax, dword ptr fs:[00000030h]1_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB2349 mov eax, dword ptr fs:[00000030h]1_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB2349 mov eax, dword ptr fs:[00000030h]1_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB2349 mov eax, dword ptr fs:[00000030h]1_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB2349 mov eax, dword ptr fs:[00000030h]1_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB2349 mov eax, dword ptr fs:[00000030h]1_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB2349 mov eax, dword ptr fs:[00000030h]1_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB2349 mov eax, dword ptr fs:[00000030h]1_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB2349 mov eax, dword ptr fs:[00000030h]1_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB2349 mov eax, dword ptr fs:[00000030h]1_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB2349 mov eax, dword ptr fs:[00000030h]1_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB2349 mov eax, dword ptr fs:[00000030h]1_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB2349 mov eax, dword ptr fs:[00000030h]1_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB2349 mov eax, dword ptr fs:[00000030h]1_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB035C mov eax, dword ptr fs:[00000030h]1_2_03AB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB035C mov eax, dword ptr fs:[00000030h]1_2_03AB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB035C mov eax, dword ptr fs:[00000030h]1_2_03AB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB035C mov ecx, dword ptr fs:[00000030h]1_2_03AB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB035C mov eax, dword ptr fs:[00000030h]1_2_03AB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB035C mov eax, dword ptr fs:[00000030h]1_2_03AB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AFA352 mov eax, dword ptr fs:[00000030h]1_2_03AFA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AD8350 mov ecx, dword ptr fs:[00000030h]1_2_03AD8350
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A402A0 mov eax, dword ptr fs:[00000030h]1_2_03A402A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A402A0 mov eax, dword ptr fs:[00000030h]1_2_03A402A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AC62A0 mov eax, dword ptr fs:[00000030h]1_2_03AC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AC62A0 mov ecx, dword ptr fs:[00000030h]1_2_03AC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AC62A0 mov eax, dword ptr fs:[00000030h]1_2_03AC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AC62A0 mov eax, dword ptr fs:[00000030h]1_2_03AC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AC62A0 mov eax, dword ptr fs:[00000030h]1_2_03AC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AC62A0 mov eax, dword ptr fs:[00000030h]1_2_03AC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6E284 mov eax, dword ptr fs:[00000030h]1_2_03A6E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6E284 mov eax, dword ptr fs:[00000030h]1_2_03A6E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB0283 mov eax, dword ptr fs:[00000030h]1_2_03AB0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB0283 mov eax, dword ptr fs:[00000030h]1_2_03AB0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB0283 mov eax, dword ptr fs:[00000030h]1_2_03AB0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A402E1 mov eax, dword ptr fs:[00000030h]1_2_03A402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A402E1 mov eax, dword ptr fs:[00000030h]1_2_03A402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A402E1 mov eax, dword ptr fs:[00000030h]1_2_03A402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3A2C3 mov eax, dword ptr fs:[00000030h]1_2_03A3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3A2C3 mov eax, dword ptr fs:[00000030h]1_2_03A3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3A2C3 mov eax, dword ptr fs:[00000030h]1_2_03A3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3A2C3 mov eax, dword ptr fs:[00000030h]1_2_03A3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3A2C3 mov eax, dword ptr fs:[00000030h]1_2_03A3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A2823B mov eax, dword ptr fs:[00000030h]1_2_03A2823B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A34260 mov eax, dword ptr fs:[00000030h]1_2_03A34260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A34260 mov eax, dword ptr fs:[00000030h]1_2_03A34260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A34260 mov eax, dword ptr fs:[00000030h]1_2_03A34260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A2826B mov eax, dword ptr fs:[00000030h]1_2_03A2826B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AE0274 mov eax, dword ptr fs:[00000030h]1_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AE0274 mov eax, dword ptr fs:[00000030h]1_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AE0274 mov eax, dword ptr fs:[00000030h]1_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AE0274 mov eax, dword ptr fs:[00000030h]1_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AE0274 mov eax, dword ptr fs:[00000030h]1_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AE0274 mov eax, dword ptr fs:[00000030h]1_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AE0274 mov eax, dword ptr fs:[00000030h]1_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AE0274 mov eax, dword ptr fs:[00000030h]1_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AE0274 mov eax, dword ptr fs:[00000030h]1_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AE0274 mov eax, dword ptr fs:[00000030h]1_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AE0274 mov eax, dword ptr fs:[00000030h]1_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AE0274 mov eax, dword ptr fs:[00000030h]1_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB8243 mov eax, dword ptr fs:[00000030h]1_2_03AB8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB8243 mov ecx, dword ptr fs:[00000030h]1_2_03AB8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A2A250 mov eax, dword ptr fs:[00000030h]1_2_03A2A250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A36259 mov eax, dword ptr fs:[00000030h]1_2_03A36259
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AEA250 mov eax, dword ptr fs:[00000030h]1_2_03AEA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AEA250 mov eax, dword ptr fs:[00000030h]1_2_03AEA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A70185 mov eax, dword ptr fs:[00000030h]1_2_03A70185
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AEC188 mov eax, dword ptr fs:[00000030h]1_2_03AEC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AEC188 mov eax, dword ptr fs:[00000030h]1_2_03AEC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AD4180 mov eax, dword ptr fs:[00000030h]1_2_03AD4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AD4180 mov eax, dword ptr fs:[00000030h]1_2_03AD4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB019F mov eax, dword ptr fs:[00000030h]1_2_03AB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB019F mov eax, dword ptr fs:[00000030h]1_2_03AB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB019F mov eax, dword ptr fs:[00000030h]1_2_03AB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB019F mov eax, dword ptr fs:[00000030h]1_2_03AB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A2A197 mov eax, dword ptr fs:[00000030h]1_2_03A2A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A2A197 mov eax, dword ptr fs:[00000030h]1_2_03A2A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A2A197 mov eax, dword ptr fs:[00000030h]1_2_03A2A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B061E5 mov eax, dword ptr fs:[00000030h]1_2_03B061E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A601F8 mov eax, dword ptr fs:[00000030h]1_2_03A601F8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AF61C3 mov eax, dword ptr fs:[00000030h]1_2_03AF61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AF61C3 mov eax, dword ptr fs:[00000030h]1_2_03AF61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AAE1D0 mov eax, dword ptr fs:[00000030h]1_2_03AAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AAE1D0 mov eax, dword ptr fs:[00000030h]1_2_03AAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AAE1D0 mov ecx, dword ptr fs:[00000030h]1_2_03AAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AAE1D0 mov eax, dword ptr fs:[00000030h]1_2_03AAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AAE1D0 mov eax, dword ptr fs:[00000030h]1_2_03AAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A60124 mov eax, dword ptr fs:[00000030h]1_2_03A60124
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADE10E mov eax, dword ptr fs:[00000030h]1_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADE10E mov ecx, dword ptr fs:[00000030h]1_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADE10E mov eax, dword ptr fs:[00000030h]1_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADE10E mov eax, dword ptr fs:[00000030h]1_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADE10E mov ecx, dword ptr fs:[00000030h]1_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADE10E mov eax, dword ptr fs:[00000030h]1_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADE10E mov eax, dword ptr fs:[00000030h]1_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADE10E mov ecx, dword ptr fs:[00000030h]1_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADE10E mov eax, dword ptr fs:[00000030h]1_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADE10E mov ecx, dword ptr fs:[00000030h]1_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADA118 mov ecx, dword ptr fs:[00000030h]1_2_03ADA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADA118 mov eax, dword ptr fs:[00000030h]1_2_03ADA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADA118 mov eax, dword ptr fs:[00000030h]1_2_03ADA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADA118 mov eax, dword ptr fs:[00000030h]1_2_03ADA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AF0115 mov eax, dword ptr fs:[00000030h]1_2_03AF0115
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AC4144 mov eax, dword ptr fs:[00000030h]1_2_03AC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AC4144 mov eax, dword ptr fs:[00000030h]1_2_03AC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AC4144 mov ecx, dword ptr fs:[00000030h]1_2_03AC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AC4144 mov eax, dword ptr fs:[00000030h]1_2_03AC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AC4144 mov eax, dword ptr fs:[00000030h]1_2_03AC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A2C156 mov eax, dword ptr fs:[00000030h]1_2_03A2C156
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AC8158 mov eax, dword ptr fs:[00000030h]1_2_03AC8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A36154 mov eax, dword ptr fs:[00000030h]1_2_03A36154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A36154 mov eax, dword ptr fs:[00000030h]1_2_03A36154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AC80A8 mov eax, dword ptr fs:[00000030h]1_2_03AC80A8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AF60B8 mov eax, dword ptr fs:[00000030h]1_2_03AF60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AF60B8 mov ecx, dword ptr fs:[00000030h]1_2_03AF60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3208A mov eax, dword ptr fs:[00000030h]1_2_03A3208A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A2A0E3 mov ecx, dword ptr fs:[00000030h]1_2_03A2A0E3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A380E9 mov eax, dword ptr fs:[00000030h]1_2_03A380E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB60E0 mov eax, dword ptr fs:[00000030h]1_2_03AB60E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A2C0F0 mov eax, dword ptr fs:[00000030h]1_2_03A2C0F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A720F0 mov ecx, dword ptr fs:[00000030h]1_2_03A720F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB20DE mov eax, dword ptr fs:[00000030h]1_2_03AB20DE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A2A020 mov eax, dword ptr fs:[00000030h]1_2_03A2A020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A2C020 mov eax, dword ptr fs:[00000030h]1_2_03A2C020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AC6030 mov eax, dword ptr fs:[00000030h]1_2_03AC6030
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB4000 mov ecx, dword ptr fs:[00000030h]1_2_03AB4000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AD2000 mov eax, dword ptr fs:[00000030h]1_2_03AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AD2000 mov eax, dword ptr fs:[00000030h]1_2_03AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AD2000 mov eax, dword ptr fs:[00000030h]1_2_03AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AD2000 mov eax, dword ptr fs:[00000030h]1_2_03AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AD2000 mov eax, dword ptr fs:[00000030h]1_2_03AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AD2000 mov eax, dword ptr fs:[00000030h]1_2_03AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AD2000 mov eax, dword ptr fs:[00000030h]1_2_03AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AD2000 mov eax, dword ptr fs:[00000030h]1_2_03AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A4E016 mov eax, dword ptr fs:[00000030h]1_2_03A4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A4E016 mov eax, dword ptr fs:[00000030h]1_2_03A4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A4E016 mov eax, dword ptr fs:[00000030h]1_2_03A4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A4E016 mov eax, dword ptr fs:[00000030h]1_2_03A4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5C073 mov eax, dword ptr fs:[00000030h]1_2_03A5C073
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A32050 mov eax, dword ptr fs:[00000030h]1_2_03A32050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB6050 mov eax, dword ptr fs:[00000030h]1_2_03AB6050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A307AF mov eax, dword ptr fs:[00000030h]1_2_03A307AF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AE47A0 mov eax, dword ptr fs:[00000030h]1_2_03AE47A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AD678E mov eax, dword ptr fs:[00000030h]1_2_03AD678E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A527ED mov eax, dword ptr fs:[00000030h]1_2_03A527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A527ED mov eax, dword ptr fs:[00000030h]1_2_03A527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A527ED mov eax, dword ptr fs:[00000030h]1_2_03A527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ABE7E1 mov eax, dword ptr fs:[00000030h]1_2_03ABE7E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A347FB mov eax, dword ptr fs:[00000030h]1_2_03A347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A347FB mov eax, dword ptr fs:[00000030h]1_2_03A347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3C7C0 mov eax, dword ptr fs:[00000030h]1_2_03A3C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB07C3 mov eax, dword ptr fs:[00000030h]1_2_03AB07C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6C720 mov eax, dword ptr fs:[00000030h]1_2_03A6C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6C720 mov eax, dword ptr fs:[00000030h]1_2_03A6C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6273C mov eax, dword ptr fs:[00000030h]1_2_03A6273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6273C mov ecx, dword ptr fs:[00000030h]1_2_03A6273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6273C mov eax, dword ptr fs:[00000030h]1_2_03A6273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AAC730 mov eax, dword ptr fs:[00000030h]1_2_03AAC730
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6C700 mov eax, dword ptr fs:[00000030h]1_2_03A6C700
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A30710 mov eax, dword ptr fs:[00000030h]1_2_03A30710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A60710 mov eax, dword ptr fs:[00000030h]1_2_03A60710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A38770 mov eax, dword ptr fs:[00000030h]1_2_03A38770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A40770 mov eax, dword ptr fs:[00000030h]1_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A40770 mov eax, dword ptr fs:[00000030h]1_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A40770 mov eax, dword ptr fs:[00000030h]1_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A40770 mov eax, dword ptr fs:[00000030h]1_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A40770 mov eax, dword ptr fs:[00000030h]1_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A40770 mov eax, dword ptr fs:[00000030h]1_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A40770 mov eax, dword ptr fs:[00000030h]1_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A40770 mov eax, dword ptr fs:[00000030h]1_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A40770 mov eax, dword ptr fs:[00000030h]1_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A40770 mov eax, dword ptr fs:[00000030h]1_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A40770 mov eax, dword ptr fs:[00000030h]1_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A40770 mov eax, dword ptr fs:[00000030h]1_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6674D mov esi, dword ptr fs:[00000030h]1_2_03A6674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6674D mov eax, dword ptr fs:[00000030h]1_2_03A6674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6674D mov eax, dword ptr fs:[00000030h]1_2_03A6674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A30750 mov eax, dword ptr fs:[00000030h]1_2_03A30750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ABE75D mov eax, dword ptr fs:[00000030h]1_2_03ABE75D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72750 mov eax, dword ptr fs:[00000030h]1_2_03A72750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72750 mov eax, dword ptr fs:[00000030h]1_2_03A72750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB4755 mov eax, dword ptr fs:[00000030h]1_2_03AB4755
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6C6A6 mov eax, dword ptr fs:[00000030h]1_2_03A6C6A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A666B0 mov eax, dword ptr fs:[00000030h]1_2_03A666B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A34690 mov eax, dword ptr fs:[00000030h]1_2_03A34690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A34690 mov eax, dword ptr fs:[00000030h]1_2_03A34690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AAE6F2 mov eax, dword ptr fs:[00000030h]1_2_03AAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AAE6F2 mov eax, dword ptr fs:[00000030h]1_2_03AAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AAE6F2 mov eax, dword ptr fs:[00000030h]1_2_03AAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AAE6F2 mov eax, dword ptr fs:[00000030h]1_2_03AAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB06F1 mov eax, dword ptr fs:[00000030h]1_2_03AB06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB06F1 mov eax, dword ptr fs:[00000030h]1_2_03AB06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6A6C7 mov ebx, dword ptr fs:[00000030h]1_2_03A6A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6A6C7 mov eax, dword ptr fs:[00000030h]1_2_03A6A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A4E627 mov eax, dword ptr fs:[00000030h]1_2_03A4E627
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A66620 mov eax, dword ptr fs:[00000030h]1_2_03A66620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A68620 mov eax, dword ptr fs:[00000030h]1_2_03A68620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3262C mov eax, dword ptr fs:[00000030h]1_2_03A3262C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AAE609 mov eax, dword ptr fs:[00000030h]1_2_03AAE609
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A4260B mov eax, dword ptr fs:[00000030h]1_2_03A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A4260B mov eax, dword ptr fs:[00000030h]1_2_03A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A4260B mov eax, dword ptr fs:[00000030h]1_2_03A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A4260B mov eax, dword ptr fs:[00000030h]1_2_03A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A4260B mov eax, dword ptr fs:[00000030h]1_2_03A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A4260B mov eax, dword ptr fs:[00000030h]1_2_03A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A4260B mov eax, dword ptr fs:[00000030h]1_2_03A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A72619 mov eax, dword ptr fs:[00000030h]1_2_03A72619
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AF866E mov eax, dword ptr fs:[00000030h]1_2_03AF866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AF866E mov eax, dword ptr fs:[00000030h]1_2_03AF866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6A660 mov eax, dword ptr fs:[00000030h]1_2_03A6A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6A660 mov eax, dword ptr fs:[00000030h]1_2_03A6A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A62674 mov eax, dword ptr fs:[00000030h]1_2_03A62674
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A4C640 mov eax, dword ptr fs:[00000030h]1_2_03A4C640
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB05A7 mov eax, dword ptr fs:[00000030h]1_2_03AB05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB05A7 mov eax, dword ptr fs:[00000030h]1_2_03AB05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB05A7 mov eax, dword ptr fs:[00000030h]1_2_03AB05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A545B1 mov eax, dword ptr fs:[00000030h]1_2_03A545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A545B1 mov eax, dword ptr fs:[00000030h]1_2_03A545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A32582 mov eax, dword ptr fs:[00000030h]1_2_03A32582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A32582 mov ecx, dword ptr fs:[00000030h]1_2_03A32582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A64588 mov eax, dword ptr fs:[00000030h]1_2_03A64588
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6E59C mov eax, dword ptr fs:[00000030h]1_2_03A6E59C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]1_2_03A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]1_2_03A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]1_2_03A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]1_2_03A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]1_2_03A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]1_2_03A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]1_2_03A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]1_2_03A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A325E0 mov eax, dword ptr fs:[00000030h]1_2_03A325E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6C5ED mov eax, dword ptr fs:[00000030h]1_2_03A6C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6C5ED mov eax, dword ptr fs:[00000030h]1_2_03A6C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6E5CF mov eax, dword ptr fs:[00000030h]1_2_03A6E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6E5CF mov eax, dword ptr fs:[00000030h]1_2_03A6E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A365D0 mov eax, dword ptr fs:[00000030h]1_2_03A365D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6A5D0 mov eax, dword ptr fs:[00000030h]1_2_03A6A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6A5D0 mov eax, dword ptr fs:[00000030h]1_2_03A6A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A40535 mov eax, dword ptr fs:[00000030h]1_2_03A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A40535 mov eax, dword ptr fs:[00000030h]1_2_03A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A40535 mov eax, dword ptr fs:[00000030h]1_2_03A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A40535 mov eax, dword ptr fs:[00000030h]1_2_03A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A40535 mov eax, dword ptr fs:[00000030h]1_2_03A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A40535 mov eax, dword ptr fs:[00000030h]1_2_03A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5E53E mov eax, dword ptr fs:[00000030h]1_2_03A5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5E53E mov eax, dword ptr fs:[00000030h]1_2_03A5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5E53E mov eax, dword ptr fs:[00000030h]1_2_03A5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5E53E mov eax, dword ptr fs:[00000030h]1_2_03A5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5E53E mov eax, dword ptr fs:[00000030h]1_2_03A5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AC6500 mov eax, dword ptr fs:[00000030h]1_2_03AC6500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B04500 mov eax, dword ptr fs:[00000030h]1_2_03B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B04500 mov eax, dword ptr fs:[00000030h]1_2_03B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B04500 mov eax, dword ptr fs:[00000030h]1_2_03B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B04500 mov eax, dword ptr fs:[00000030h]1_2_03B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B04500 mov eax, dword ptr fs:[00000030h]1_2_03B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B04500 mov eax, dword ptr fs:[00000030h]1_2_03B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B04500 mov eax, dword ptr fs:[00000030h]1_2_03B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6656A mov eax, dword ptr fs:[00000030h]1_2_03A6656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6656A mov eax, dword ptr fs:[00000030h]1_2_03A6656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6656A mov eax, dword ptr fs:[00000030h]1_2_03A6656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A38550 mov eax, dword ptr fs:[00000030h]1_2_03A38550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A38550 mov eax, dword ptr fs:[00000030h]1_2_03A38550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A364AB mov eax, dword ptr fs:[00000030h]1_2_03A364AB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A644B0 mov ecx, dword ptr fs:[00000030h]1_2_03A644B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ABA4B0 mov eax, dword ptr fs:[00000030h]1_2_03ABA4B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AEA49A mov eax, dword ptr fs:[00000030h]1_2_03AEA49A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A304E5 mov ecx, dword ptr fs:[00000030h]1_2_03A304E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A2E420 mov eax, dword ptr fs:[00000030h]1_2_03A2E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A2E420 mov eax, dword ptr fs:[00000030h]1_2_03A2E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A2E420 mov eax, dword ptr fs:[00000030h]1_2_03A2E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A2C427 mov eax, dword ptr fs:[00000030h]1_2_03A2C427
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB6420 mov eax, dword ptr fs:[00000030h]1_2_03AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB6420 mov eax, dword ptr fs:[00000030h]1_2_03AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB6420 mov eax, dword ptr fs:[00000030h]1_2_03AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB6420 mov eax, dword ptr fs:[00000030h]1_2_03AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB6420 mov eax, dword ptr fs:[00000030h]1_2_03AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB6420 mov eax, dword ptr fs:[00000030h]1_2_03AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB6420 mov eax, dword ptr fs:[00000030h]1_2_03AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6A430 mov eax, dword ptr fs:[00000030h]1_2_03A6A430
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A68402 mov eax, dword ptr fs:[00000030h]1_2_03A68402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A68402 mov eax, dword ptr fs:[00000030h]1_2_03A68402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A68402 mov eax, dword ptr fs:[00000030h]1_2_03A68402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ABC460 mov ecx, dword ptr fs:[00000030h]1_2_03ABC460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5A470 mov eax, dword ptr fs:[00000030h]1_2_03A5A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5A470 mov eax, dword ptr fs:[00000030h]1_2_03A5A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5A470 mov eax, dword ptr fs:[00000030h]1_2_03A5A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6E443 mov eax, dword ptr fs:[00000030h]1_2_03A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6E443 mov eax, dword ptr fs:[00000030h]1_2_03A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6E443 mov eax, dword ptr fs:[00000030h]1_2_03A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6E443 mov eax, dword ptr fs:[00000030h]1_2_03A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6E443 mov eax, dword ptr fs:[00000030h]1_2_03A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6E443 mov eax, dword ptr fs:[00000030h]1_2_03A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6E443 mov eax, dword ptr fs:[00000030h]1_2_03A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6E443 mov eax, dword ptr fs:[00000030h]1_2_03A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AEA456 mov eax, dword ptr fs:[00000030h]1_2_03AEA456
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A2645D mov eax, dword ptr fs:[00000030h]1_2_03A2645D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5245A mov eax, dword ptr fs:[00000030h]1_2_03A5245A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A40BBE mov eax, dword ptr fs:[00000030h]1_2_03A40BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A40BBE mov eax, dword ptr fs:[00000030h]1_2_03A40BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AE4BB0 mov eax, dword ptr fs:[00000030h]1_2_03AE4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AE4BB0 mov eax, dword ptr fs:[00000030h]1_2_03AE4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A38BF0 mov eax, dword ptr fs:[00000030h]1_2_03A38BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A38BF0 mov eax, dword ptr fs:[00000030h]1_2_03A38BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A38BF0 mov eax, dword ptr fs:[00000030h]1_2_03A38BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5EBFC mov eax, dword ptr fs:[00000030h]1_2_03A5EBFC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ABCBF0 mov eax, dword ptr fs:[00000030h]1_2_03ABCBF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A50BCB mov eax, dword ptr fs:[00000030h]1_2_03A50BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A50BCB mov eax, dword ptr fs:[00000030h]1_2_03A50BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A50BCB mov eax, dword ptr fs:[00000030h]1_2_03A50BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A30BCD mov eax, dword ptr fs:[00000030h]1_2_03A30BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A30BCD mov eax, dword ptr fs:[00000030h]1_2_03A30BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A30BCD mov eax, dword ptr fs:[00000030h]1_2_03A30BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADEBD0 mov eax, dword ptr fs:[00000030h]1_2_03ADEBD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5EB20 mov eax, dword ptr fs:[00000030h]1_2_03A5EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5EB20 mov eax, dword ptr fs:[00000030h]1_2_03A5EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AF8B28 mov eax, dword ptr fs:[00000030h]1_2_03AF8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AF8B28 mov eax, dword ptr fs:[00000030h]1_2_03AF8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AAEB1D mov eax, dword ptr fs:[00000030h]1_2_03AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AAEB1D mov eax, dword ptr fs:[00000030h]1_2_03AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AAEB1D mov eax, dword ptr fs:[00000030h]1_2_03AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AAEB1D mov eax, dword ptr fs:[00000030h]1_2_03AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AAEB1D mov eax, dword ptr fs:[00000030h]1_2_03AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AAEB1D mov eax, dword ptr fs:[00000030h]1_2_03AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AAEB1D mov eax, dword ptr fs:[00000030h]1_2_03AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AAEB1D mov eax, dword ptr fs:[00000030h]1_2_03AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AAEB1D mov eax, dword ptr fs:[00000030h]1_2_03AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A2CB7E mov eax, dword ptr fs:[00000030h]1_2_03A2CB7E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AE4B4B mov eax, dword ptr fs:[00000030h]1_2_03AE4B4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AE4B4B mov eax, dword ptr fs:[00000030h]1_2_03AE4B4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AC6B40 mov eax, dword ptr fs:[00000030h]1_2_03AC6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AC6B40 mov eax, dword ptr fs:[00000030h]1_2_03AC6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AFAB40 mov eax, dword ptr fs:[00000030h]1_2_03AFAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AD8B42 mov eax, dword ptr fs:[00000030h]1_2_03AD8B42
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADEB50 mov eax, dword ptr fs:[00000030h]1_2_03ADEB50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A38AA0 mov eax, dword ptr fs:[00000030h]1_2_03A38AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A38AA0 mov eax, dword ptr fs:[00000030h]1_2_03A38AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A86AA4 mov eax, dword ptr fs:[00000030h]1_2_03A86AA4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3EA80 mov eax, dword ptr fs:[00000030h]1_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3EA80 mov eax, dword ptr fs:[00000030h]1_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3EA80 mov eax, dword ptr fs:[00000030h]1_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3EA80 mov eax, dword ptr fs:[00000030h]1_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3EA80 mov eax, dword ptr fs:[00000030h]1_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3EA80 mov eax, dword ptr fs:[00000030h]1_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3EA80 mov eax, dword ptr fs:[00000030h]1_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3EA80 mov eax, dword ptr fs:[00000030h]1_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3EA80 mov eax, dword ptr fs:[00000030h]1_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B04A80 mov eax, dword ptr fs:[00000030h]1_2_03B04A80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A68A90 mov edx, dword ptr fs:[00000030h]1_2_03A68A90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6AAEE mov eax, dword ptr fs:[00000030h]1_2_03A6AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6AAEE mov eax, dword ptr fs:[00000030h]1_2_03A6AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A86ACC mov eax, dword ptr fs:[00000030h]1_2_03A86ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A86ACC mov eax, dword ptr fs:[00000030h]1_2_03A86ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A86ACC mov eax, dword ptr fs:[00000030h]1_2_03A86ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A30AD0 mov eax, dword ptr fs:[00000030h]1_2_03A30AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A64AD0 mov eax, dword ptr fs:[00000030h]1_2_03A64AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A64AD0 mov eax, dword ptr fs:[00000030h]1_2_03A64AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6CA24 mov eax, dword ptr fs:[00000030h]1_2_03A6CA24
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5EA2E mov eax, dword ptr fs:[00000030h]1_2_03A5EA2E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A54A35 mov eax, dword ptr fs:[00000030h]1_2_03A54A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A54A35 mov eax, dword ptr fs:[00000030h]1_2_03A54A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6CA38 mov eax, dword ptr fs:[00000030h]1_2_03A6CA38
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ABCA11 mov eax, dword ptr fs:[00000030h]1_2_03ABCA11
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6CA6F mov eax, dword ptr fs:[00000030h]1_2_03A6CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6CA6F mov eax, dword ptr fs:[00000030h]1_2_03A6CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6CA6F mov eax, dword ptr fs:[00000030h]1_2_03A6CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ADEA60 mov eax, dword ptr fs:[00000030h]1_2_03ADEA60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AACA72 mov eax, dword ptr fs:[00000030h]1_2_03AACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AACA72 mov eax, dword ptr fs:[00000030h]1_2_03AACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A36A50 mov eax, dword ptr fs:[00000030h]1_2_03A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A36A50 mov eax, dword ptr fs:[00000030h]1_2_03A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A36A50 mov eax, dword ptr fs:[00000030h]1_2_03A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A36A50 mov eax, dword ptr fs:[00000030h]1_2_03A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A36A50 mov eax, dword ptr fs:[00000030h]1_2_03A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A36A50 mov eax, dword ptr fs:[00000030h]1_2_03A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A36A50 mov eax, dword ptr fs:[00000030h]1_2_03A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A40A5B mov eax, dword ptr fs:[00000030h]1_2_03A40A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A40A5B mov eax, dword ptr fs:[00000030h]1_2_03A40A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A429A0 mov eax, dword ptr fs:[00000030h]1_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A429A0 mov eax, dword ptr fs:[00000030h]1_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A429A0 mov eax, dword ptr fs:[00000030h]1_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A429A0 mov eax, dword ptr fs:[00000030h]1_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A429A0 mov eax, dword ptr fs:[00000030h]1_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A429A0 mov eax, dword ptr fs:[00000030h]1_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A429A0 mov eax, dword ptr fs:[00000030h]1_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A429A0 mov eax, dword ptr fs:[00000030h]1_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A429A0 mov eax, dword ptr fs:[00000030h]1_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A429A0 mov eax, dword ptr fs:[00000030h]1_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A429A0 mov eax, dword ptr fs:[00000030h]1_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A429A0 mov eax, dword ptr fs:[00000030h]1_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A429A0 mov eax, dword ptr fs:[00000030h]1_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A309AD mov eax, dword ptr fs:[00000030h]1_2_03A309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A309AD mov eax, dword ptr fs:[00000030h]1_2_03A309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB89B3 mov esi, dword ptr fs:[00000030h]1_2_03AB89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB89B3 mov eax, dword ptr fs:[00000030h]1_2_03AB89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB89B3 mov eax, dword ptr fs:[00000030h]1_2_03AB89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ABE9E0 mov eax, dword ptr fs:[00000030h]1_2_03ABE9E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A629F9 mov eax, dword ptr fs:[00000030h]1_2_03A629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A629F9 mov eax, dword ptr fs:[00000030h]1_2_03A629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AC69C0 mov eax, dword ptr fs:[00000030h]1_2_03AC69C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]1_2_03A3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]1_2_03A3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]1_2_03A3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]1_2_03A3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]1_2_03A3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]1_2_03A3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A649D0 mov eax, dword ptr fs:[00000030h]1_2_03A649D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AFA9D3 mov eax, dword ptr fs:[00000030h]1_2_03AFA9D3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB892A mov eax, dword ptr fs:[00000030h]1_2_03AB892A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AC892B mov eax, dword ptr fs:[00000030h]1_2_03AC892B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AAE908 mov eax, dword ptr fs:[00000030h]1_2_03AAE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AAE908 mov eax, dword ptr fs:[00000030h]1_2_03AAE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ABC912 mov eax, dword ptr fs:[00000030h]1_2_03ABC912
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A28918 mov eax, dword ptr fs:[00000030h]1_2_03A28918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A28918 mov eax, dword ptr fs:[00000030h]1_2_03A28918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A56962 mov eax, dword ptr fs:[00000030h]1_2_03A56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A56962 mov eax, dword ptr fs:[00000030h]1_2_03A56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A56962 mov eax, dword ptr fs:[00000030h]1_2_03A56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A7096E mov eax, dword ptr fs:[00000030h]1_2_03A7096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A7096E mov edx, dword ptr fs:[00000030h]1_2_03A7096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A7096E mov eax, dword ptr fs:[00000030h]1_2_03A7096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AD4978 mov eax, dword ptr fs:[00000030h]1_2_03AD4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AD4978 mov eax, dword ptr fs:[00000030h]1_2_03AD4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ABC97C mov eax, dword ptr fs:[00000030h]1_2_03ABC97C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AB0946 mov eax, dword ptr fs:[00000030h]1_2_03AB0946
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A30887 mov eax, dword ptr fs:[00000030h]1_2_03A30887
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ABC89D mov eax, dword ptr fs:[00000030h]1_2_03ABC89D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AFA8E4 mov eax, dword ptr fs:[00000030h]1_2_03AFA8E4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6C8F9 mov eax, dword ptr fs:[00000030h]1_2_03A6C8F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6C8F9 mov eax, dword ptr fs:[00000030h]1_2_03A6C8F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A5E8C0 mov eax, dword ptr fs:[00000030h]1_2_03A5E8C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B008C0 mov eax, dword ptr fs:[00000030h]1_2_03B008C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A52835 mov eax, dword ptr fs:[00000030h]1_2_03A52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A52835 mov eax, dword ptr fs:[00000030h]1_2_03A52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A52835 mov eax, dword ptr fs:[00000030h]1_2_03A52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A52835 mov ecx, dword ptr fs:[00000030h]1_2_03A52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A52835 mov eax, dword ptr fs:[00000030h]1_2_03A52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A52835 mov eax, dword ptr fs:[00000030h]1_2_03A52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6A830 mov eax, dword ptr fs:[00000030h]1_2_03A6A830
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AD483A mov eax, dword ptr fs:[00000030h]1_2_03AD483A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AD483A mov eax, dword ptr fs:[00000030h]1_2_03AD483A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ABC810 mov eax, dword ptr fs:[00000030h]1_2_03ABC810
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ABE872 mov eax, dword ptr fs:[00000030h]1_2_03ABE872
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03ABE872 mov eax, dword ptr fs:[00000030h]1_2_03ABE872
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AC6870 mov eax, dword ptr fs:[00000030h]1_2_03AC6870
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03AC6870 mov eax, dword ptr fs:[00000030h]1_2_03AC6870
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A42840 mov ecx, dword ptr fs:[00000030h]1_2_03A42840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A60854 mov eax, dword ptr fs:[00000030h]1_2_03A60854
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A34859 mov eax, dword ptr fs:[00000030h]1_2_03A34859
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A34859 mov eax, dword ptr fs:[00000030h]1_2_03A34859
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A6CF80 mov eax, dword ptr fs:[00000030h]1_2_03A6CF80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A62F98 mov eax, dword ptr fs:[00000030h]1_2_03A62F98
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A62F98 mov eax, dword ptr fs:[00000030h]1_2_03A62F98
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2F3C008Jump to behavior
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\YWL3cB5Fah.exe"Jump to behavior
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
          Source: YWL3cB5Fah.exeBinary or memory string: Shell_TrayWnd
          Source: YWL3cB5Fah.exeBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0041E364
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000001.00000002.1869291913.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.1869685528.0000000003840000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: YWL3cB5Fah.exeBinary or memory string: WIN_XP
          Source: YWL3cB5Fah.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
          Source: YWL3cB5Fah.exeBinary or memory string: WIN_XPe
          Source: YWL3cB5Fah.exeBinary or memory string: WIN_VISTA
          Source: YWL3cB5Fah.exeBinary or memory string: WIN_7
          Source: YWL3cB5Fah.exeBinary or memory string: WIN_8

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000001.00000002.1869291913.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.1869685528.0000000003840000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
          Source: C:\Users\user\Desktop\YWL3cB5Fah.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure2
          Valid Accounts
          2
          Native API
          2
          Valid Accounts
          2
          Valid Accounts
          2
          Valid Accounts
          21
          Input Capture
          2
          System Time Discovery
          Remote Services21
          Input Capture
          1
          Encrypted Channel
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          DLL Side-Loading
          1
          Exploitation for Privilege Escalation
          1
          Disable or Modify Tools
          LSASS Memory14
          Security Software Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          1
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)21
          Access Token Manipulation
          2
          Virtualization/Sandbox Evasion
          Security Account Manager2
          Virtualization/Sandbox Evasion
          SMB/Windows Admin Shares3
          Clipboard Data
          SteganographyAutomated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook212
          Process Injection
          21
          Access Token Manipulation
          NTDS3
          Process Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
          DLL Side-Loading
          212
          Process Injection
          LSA Secrets1
          Application Window Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Deobfuscate/Decode Files or Information
          Cached Domain Credentials1
          Account Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
          Obfuscated Files or Information
          DCSync1
          System Owner/User Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          DLL Side-Loading
          Proc Filesystem2
          File and Directory Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow15
          System Information Discovery
          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          YWL3cB5Fah.exe71%ReversingLabsWin32.Trojan.Autoitinject
          YWL3cB5Fah.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No contacted domains info
          No contacted IP infos
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1529032
          Start date and time:2024-10-08 15:24:12 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 5m 5s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:5
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:YWL3cB5Fah.exe
          renamed because original name is a hash value
          Original Sample Name:8eee9b3715ed15a7d5712c72f846a6af1e3289a9b06bd9680f69190b10046bcd.exe
          Detection:MAL
          Classification:mal84.troj.evad.winEXE@3/1@0/0
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 98%
          • Number of executed functions: 51
          • Number of non-executed functions: 305
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Stop behavior analysis, all processes terminated
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size exceeded maximum capacity and may have missing disassembly code.
          • VT rate limit hit for: YWL3cB5Fah.exe
          TimeTypeDescription
          09:25:20API Interceptor3x Sleep call for process: svchost.exe modified
          No context
          No context
          No context
          No context
          No context
          Process:C:\Users\user\Desktop\YWL3cB5Fah.exe
          File Type:data
          Category:dropped
          Size (bytes):287744
          Entropy (8bit):7.995062605956197
          Encrypted:true
          SSDEEP:6144:KXBXVTprJ1tK979ae0Uo0zeQOregFuLfzqNqIetdzwAukwR4:4BzrpK9BP0Uo0z4oLrEq3vpwC
          MD5:2AD5BBB2F60459AF618281EC62E518ED
          SHA1:A84091ABC9A868CC9FE6DDDFB2A860F07225A3A2
          SHA-256:7F7B4D2B0048023F3A9640A294A47004CB09FECEAFB911173D323BF56D35400E
          SHA-512:4245DA5ECE3F2012FFAA2B0FF28FAB8F167C838D6506BA1947EC7EADBA1CEF6B73049DC33FD2000EB9DFC902AA828F71B40E7FE042B36D680C468553456BECB6
          Malicious:false
          Reputation:low
          Preview:y.|g.YIFL..^..v.X:...r:=...FLUZCWGZABJEX94Y4Z95EYIFLUZCWG.ABJKG.:Y.S...X..m.2*$g*3--79T.:U4WZ1y+#l'/-w.4a...xT[=Qt48O}IFLUZCW>[H.w%?..9S..U".S..`#0.@..y8^.C....%>..%62~7 .ABJEX94Yd.95.XHFm..#WGZABJEX.4[5Q8>EY.BLUZCWGZAB.QX94I4Z9EAYIF.UZSWGZCBJCX94Y4Z93EYIFLUZC'CZA@JEX94Y6Zy.EYYFLEZCWGJABZEX94Y4J95EYIFLUZCWGZABJEX94Y4Z95EYIFLUZCWGZABJEX94Y4Z95EYIFLUZCWGZABJEX94Y4Z95EYIFLUZCWGZABJEX94Y4Z95EYIFLUZCWGZABJEX94Y4Z95EYIFLUZCWGZABJk,\L-4Z9..]IF\UZC.CZARJEX94Y4Z95EYIFlUZ#WGZABJEX94Y4Z95EYIFLUZCWGZABJEX94Y4Z95EYIFLUZCWGZABJEX94Y4Z95EYIFLUZCWGZABJEX94Y4Z95EYIFLUZCWGZABJEX94Y4Z95EYIFLUZCWGZABJEX94Y4Z95EYIFLUZCWGZABJEX94Y4Z95EYIFLUZCWGZABJEX94Y4Z95EYIFLUZCWGZABJEX94Y4Z95EYIFLUZCWGZABJEX94Y4Z95EYIFLUZCWGZABJEX94Y4Z95EYIFLUZCWGZABJEX94Y4Z95EYIFLUZCWGZABJEX94Y4Z95EYIFLUZCWGZABJEX94Y4Z95EYIFLUZCWGZABJEX94Y4Z95EYIFLUZCWGZABJEX94Y4Z95EYIFLUZCWGZABJEX94Y4Z95EYIFLUZCWGZABJEX94Y4Z95EYIFLUZCWGZABJEX94Y4Z95EYIFLUZCWGZABJEX94Y4Z95EYIFLUZCWGZABJEX94Y4Z95EYIFLUZCWGZABJEX94Y4Z95EYIFLUZCWGZABJEX94Y4Z95EYIFLUZ
          File type:PE32 executable (GUI) Intel 80386, for MS Windows
          Entropy (8bit):7.560686845362291
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.96%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:YWL3cB5Fah.exe
          File size:1'401'331 bytes
          MD5:b98b8ef708db68473ef0204de2004087
          SHA1:73334e27ff036c7ccaab5a5654177f7974d8f506
          SHA256:8eee9b3715ed15a7d5712c72f846a6af1e3289a9b06bd9680f69190b10046bcd
          SHA512:3bf1bd4c06d8b964cdde1f6874f6b3e35e679164001763fa1d732465d1080d9b3fdd7395b2fdcbe3f349bc762d4ec7201d993934d860e6f6c073bfd8a397780c
          SSDEEP:24576:uRmJkcoQricOIQxiZY1iaC9iqt3sLtKdQcr1CCFNzH1ZFb7MJbN:7JZoQrbTFZY1iaC992YdJ5dbAN
          TLSH:9155F122F5C69076C1B323B19E7FF76A963D793A1326D1D723C82E211EA05416B39723
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
          Icon Hash:1733312925935517
          Entrypoint:0x4165c1
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          DLL Characteristics:TERMINAL_SERVER_AWARE
          Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:5
          OS Version Minor:0
          File Version Major:5
          File Version Minor:0
          Subsystem Version Major:5
          Subsystem Version Minor:0
          Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
          Instruction
          call 00007F1B407FAA1Bh
          jmp 00007F1B407F188Eh
          int3
          int3
          int3
          int3
          int3
          push ebp
          mov ebp, esp
          push edi
          push esi
          mov esi, dword ptr [ebp+0Ch]
          mov ecx, dword ptr [ebp+10h]
          mov edi, dword ptr [ebp+08h]
          mov eax, ecx
          mov edx, ecx
          add eax, esi
          cmp edi, esi
          jbe 00007F1B407F1A0Ah
          cmp edi, eax
          jc 00007F1B407F1BA6h
          cmp ecx, 00000080h
          jc 00007F1B407F1A1Eh
          cmp dword ptr [004A9724h], 00000000h
          je 00007F1B407F1A15h
          push edi
          push esi
          and edi, 0Fh
          and esi, 0Fh
          cmp edi, esi
          pop esi
          pop edi
          jne 00007F1B407F1A07h
          jmp 00007F1B407F1DE2h
          test edi, 00000003h
          jne 00007F1B407F1A16h
          shr ecx, 02h
          and edx, 03h
          cmp ecx, 08h
          jc 00007F1B407F1A2Bh
          rep movsd
          jmp dword ptr [00416740h+edx*4]
          mov eax, edi
          mov edx, 00000003h
          sub ecx, 04h
          jc 00007F1B407F1A0Eh
          and eax, 03h
          add ecx, eax
          jmp dword ptr [00416654h+eax*4]
          jmp dword ptr [00416750h+ecx*4]
          nop
          jmp dword ptr [004166D4h+ecx*4]
          nop
          inc cx
          add byte ptr [eax-4BFFBE9Ah], dl
          inc cx
          add byte ptr [ebx], ah
          ror dword ptr [edx-75F877FAh], 1
          inc esi
          add dword ptr [eax+468A0147h], ecx
          add al, cl
          jmp 00007F1B42C6A207h
          add esi, 03h
          add edi, 03h
          cmp ecx, 08h
          jc 00007F1B407F19CEh
          rep movsd
          jmp dword ptr [00000000h+edx*4]
          Programming Language:
          • [ C ] VS2010 SP1 build 40219
          • [C++] VS2010 SP1 build 40219
          • [ C ] VS2008 SP1 build 30729
          • [IMP] VS2008 SP1 build 30729
          • [ASM] VS2010 SP1 build 40219
          • [RES] VS2010 SP1 build 40219
          • [LNK] VS2010 SP1 build 40219
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9328.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0xab0000x93280x9400495451d7eb8326bd9fa2714869ea6de8False0.49002322635135137data5.541804843154628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
          RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
          RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
          RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
          RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
          RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
          RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
          RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
          RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
          RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
          RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
          RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
          RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
          RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
          RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
          RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
          RT_STRING0xb28380x4d0dataEnglishGreat Britain0.36363636363636365
          RT_STRING0xb2d080x5fcdataEnglishGreat Britain0.3087467362924282
          RT_STRING0xb33080x65cdataEnglishGreat Britain0.34336609336609336
          RT_STRING0xb39680x388dataEnglishGreat Britain0.377212389380531
          RT_STRING0xb3cf00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
          RT_GROUP_ICON0xb3e480x84dataEnglishGreat Britain0.6439393939393939
          RT_GROUP_ICON0xb3ed00x14dataEnglishGreat Britain1.15
          RT_GROUP_ICON0xb3ee80x14dataEnglishGreat Britain1.25
          RT_GROUP_ICON0xb3f000x14dataEnglishGreat Britain1.25
          RT_VERSION0xb3f180x19cdataEnglishGreat Britain0.5339805825242718
          RT_MANIFEST0xb40b80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
          DLLImport
          WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
          VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
          COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
          MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
          WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
          PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
          USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
          KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
          USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
          GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
          COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
          ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
          SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
          ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
          OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
          Language of compilation systemCountry where language is spokenMap
          EnglishGreat Britain
          EnglishUnited States
          No network behavior found

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:09:25:03
          Start date:08/10/2024
          Path:C:\Users\user\Desktop\YWL3cB5Fah.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\YWL3cB5Fah.exe"
          Imagebase:0x400000
          File size:1'401'331 bytes
          MD5 hash:B98B8EF708DB68473EF0204DE2004087
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:1
          Start time:09:25:04
          Start date:08/10/2024
          Path:C:\Windows\SysWOW64\svchost.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\YWL3cB5Fah.exe"
          Imagebase:0xb60000
          File size:46'504 bytes
          MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.1869291913.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000001.00000002.1869291913.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.1869685528.0000000003840000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000001.00000002.1869685528.0000000003840000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
          Reputation:high
          Has exited:true

          Reset < >

            Execution Graph

            Execution Coverage:3.5%
            Dynamic/Decrypted Code Coverage:1.5%
            Signature Coverage:8.9%
            Total number of Nodes:2000
            Total number of Limit Nodes:37
            execution_graph 84227 4010e0 84230 401100 84227->84230 84229 4010f8 84231 401113 84230->84231 84232 401120 84231->84232 84233 401184 84231->84233 84234 40114c 84231->84234 84264 401182 84231->84264 84235 40112c DefWindowProcW 84232->84235 84275 401000 Shell_NotifyIconW __wctomb_s_l 84232->84275 84268 401250 61 API calls __wctomb_s_l 84233->84268 84236 401151 84234->84236 84237 40119d 84234->84237 84235->84229 84241 401219 84236->84241 84242 40115d 84236->84242 84239 4011a3 84237->84239 84240 42afb4 84237->84240 84239->84232 84247 4011b6 KillTimer 84239->84247 84248 4011db SetTimer RegisterWindowMessageW 84239->84248 84270 40f190 10 API calls 84240->84270 84241->84232 84251 401225 84241->84251 84243 401163 84242->84243 84244 42b01d 84242->84244 84249 42afe9 84243->84249 84250 40116c 84243->84250 84244->84235 84274 4370f4 52 API calls 84244->84274 84269 401000 Shell_NotifyIconW __wctomb_s_l 84247->84269 84252 401193 84248->84252 84257 401204 CreatePopupMenu 84248->84257 84272 40f190 10 API calls 84249->84272 84250->84232 84259 401174 84250->84259 84286 468b0e 74 API calls __wctomb_s_l 84251->84286 84252->84229 84253 42b04f 84276 40e0c0 84253->84276 84257->84229 84271 45fd57 65 API calls __wctomb_s_l 84259->84271 84261 42afe4 84261->84252 84262 42b00e 84273 401a50 331 API calls 84262->84273 84263 4011c9 PostQuitMessage 84263->84229 84264->84235 84267 42afdc 84267->84235 84267->84261 84268->84252 84269->84263 84270->84252 84271->84267 84272->84262 84273->84264 84274->84264 84275->84253 84278 40e0e7 __wctomb_s_l 84276->84278 84277 40e142 84280 40e184 84277->84280 84309 4341e6 63 API calls __wcsicoll 84277->84309 84278->84277 84279 42729f DestroyIcon 84278->84279 84279->84277 84282 40e1a0 Shell_NotifyIconW 84280->84282 84283 4272db Shell_NotifyIconW 84280->84283 84287 401b80 84282->84287 84285 40e1ba 84285->84264 84286->84261 84288 401b9c 84287->84288 84308 401c7e 84287->84308 84310 4013c0 84288->84310 84291 42722b LoadStringW 84294 427246 84291->84294 84292 401bb9 84315 402160 84292->84315 84329 40e0a0 84294->84329 84295 401bcd 84297 427258 84295->84297 84298 401bda 84295->84298 84333 40d200 52 API calls 2 library calls 84297->84333 84298->84294 84299 401be4 84298->84299 84328 40d200 52 API calls 2 library calls 84299->84328 84302 427267 84303 42727b 84302->84303 84305 401bf3 _wcscpy __wctomb_s_l _wcsncpy 84302->84305 84334 40d200 52 API calls 2 library calls 84303->84334 84307 401c62 Shell_NotifyIconW 84305->84307 84306 427289 84307->84308 84308->84285 84309->84280 84335 4115d7 84310->84335 84316 426daa 84315->84316 84317 40216b _wcslen 84315->84317 84373 40c600 84316->84373 84320 402180 84317->84320 84321 40219e 84317->84321 84319 426db5 84319->84295 84372 403bd0 52 API calls moneypunct 84320->84372 84323 4013a0 52 API calls 84321->84323 84325 4021a5 84323->84325 84324 402187 _memmove 84324->84295 84326 426db7 84325->84326 84327 4115d7 52 API calls 84325->84327 84327->84324 84328->84305 84330 40e0b2 84329->84330 84331 40e0a8 84329->84331 84330->84305 84385 403c30 52 API calls _memmove 84331->84385 84333->84302 84334->84306 84337 4115e1 _malloc 84335->84337 84338 4013e4 84337->84338 84341 4115fd std::exception::exception 84337->84341 84349 4135bb 84337->84349 84346 4013a0 84338->84346 84339 41163b 84364 4180af 46 API calls std::exception::operator= 84339->84364 84341->84339 84363 41130a 51 API calls __cinit 84341->84363 84342 411645 84365 418105 RaiseException 84342->84365 84345 411656 84347 4115d7 52 API calls 84346->84347 84348 4013a7 84347->84348 84348->84291 84348->84292 84350 413638 _malloc 84349->84350 84352 4135c9 _malloc 84349->84352 84371 417f77 46 API calls __getptd_noexit 84350->84371 84354 4135d4 84352->84354 84355 4135f7 RtlAllocateHeap 84352->84355 84358 413624 84352->84358 84361 413622 84352->84361 84354->84352 84366 418901 46 API calls 2 library calls 84354->84366 84367 418752 46 API calls 9 library calls 84354->84367 84368 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 84354->84368 84355->84352 84356 413630 84355->84356 84356->84337 84369 417f77 46 API calls __getptd_noexit 84358->84369 84370 417f77 46 API calls __getptd_noexit 84361->84370 84363->84339 84364->84342 84365->84345 84366->84354 84367->84354 84369->84361 84370->84356 84371->84356 84372->84324 84374 40c619 84373->84374 84375 40c60a 84373->84375 84374->84319 84375->84374 84378 4026f0 84375->84378 84377 426d7a _memmove 84377->84319 84379 426873 84378->84379 84380 4026ff 84378->84380 84381 4013a0 52 API calls 84379->84381 84380->84377 84382 42687b 84381->84382 84383 4115d7 52 API calls 84382->84383 84384 42689e _memmove 84383->84384 84384->84377 84385->84330 84386 40bd20 84387 428194 84386->84387 84388 40bd2d 84386->84388 84390 40bd43 84387->84390 84392 4281bc 84387->84392 84394 4281b2 84387->84394 84389 40bd37 84388->84389 84409 4531b1 85 API calls 5 library calls 84388->84409 84398 40bd50 84389->84398 84408 45e987 86 API calls moneypunct 84392->84408 84407 40b510 VariantClear 84394->84407 84397 4281ba 84399 426cf1 84398->84399 84400 40bd63 84398->84400 84419 44cde9 52 API calls _memmove 84399->84419 84410 40bd80 84400->84410 84403 40bd73 84403->84390 84404 426cfc 84405 40e0a0 52 API calls 84404->84405 84406 426d02 84405->84406 84407->84397 84408->84388 84409->84389 84411 40bd8e 84410->84411 84415 40bdb7 _memmove 84410->84415 84412 40bded 84411->84412 84413 40bdad 84411->84413 84411->84415 84416 4115d7 52 API calls 84412->84416 84420 402f00 84413->84420 84415->84403 84417 40bdf6 84416->84417 84417->84415 84418 4115d7 52 API calls 84417->84418 84418->84415 84419->84404 84421 402f10 84420->84421 84422 402f0c 84420->84422 84423 4115d7 52 API calls 84421->84423 84424 4268c3 84421->84424 84422->84415 84425 402f51 moneypunct _memmove 84423->84425 84425->84415 84426 425ba2 84431 40e360 84426->84431 84428 425bb4 84447 41130a 51 API calls __cinit 84428->84447 84430 425bbe 84432 4115d7 52 API calls 84431->84432 84433 40e3ec GetModuleFileNameW 84432->84433 84448 413a0e 84433->84448 84435 40e421 _wcsncat 84451 413a9e 84435->84451 84438 4115d7 52 API calls 84439 40e45e _wcscpy 84438->84439 84454 40bc70 84439->84454 84443 40e4a9 84443->84428 84444 401c90 52 API calls 84445 40e4a1 _wcscat _wcslen _wcsncpy 84444->84445 84445->84443 84445->84444 84446 4115d7 52 API calls 84445->84446 84446->84445 84447->84430 84473 413801 84448->84473 84503 419efd 84451->84503 84455 4115d7 52 API calls 84454->84455 84456 40bc98 84455->84456 84457 4115d7 52 API calls 84456->84457 84458 40bca6 84457->84458 84459 40e4c0 84458->84459 84515 403350 84459->84515 84461 40e4cb RegOpenKeyExW 84462 427190 RegQueryValueExW 84461->84462 84463 40e4eb 84461->84463 84464 4271b0 84462->84464 84465 42721a RegCloseKey 84462->84465 84463->84445 84466 4115d7 52 API calls 84464->84466 84465->84445 84467 4271cb 84466->84467 84522 43652f 52 API calls 84467->84522 84469 4271d8 RegQueryValueExW 84470 4271f7 84469->84470 84472 42720e 84469->84472 84471 402160 52 API calls 84470->84471 84471->84472 84472->84465 84474 41381a 84473->84474 84475 41389e 84473->84475 84474->84475 84486 41388a 84474->84486 84495 419e30 46 API calls 2 library calls 84474->84495 84476 4139e8 84475->84476 84477 413a00 84475->84477 84500 417f77 46 API calls __getptd_noexit 84476->84500 84502 417f77 46 API calls __getptd_noexit 84477->84502 84479 4139ed 84501 417f25 10 API calls __write 84479->84501 84482 413967 84482->84435 84484 41396c 84484->84475 84484->84482 84487 41397a 84484->84487 84485 413929 84485->84475 84488 413945 84485->84488 84497 419e30 46 API calls 2 library calls 84485->84497 84486->84475 84494 413909 84486->84494 84496 419e30 46 API calls 2 library calls 84486->84496 84499 419e30 46 API calls 2 library calls 84487->84499 84488->84475 84488->84482 84491 41395b 84488->84491 84498 419e30 46 API calls 2 library calls 84491->84498 84494->84484 84494->84485 84495->84486 84496->84494 84497->84488 84498->84482 84499->84482 84500->84479 84501->84482 84502->84482 84504 419f13 84503->84504 84505 419f0e 84503->84505 84512 417f77 46 API calls __getptd_noexit 84504->84512 84505->84504 84508 419f2b 84505->84508 84507 419f18 84513 417f25 10 API calls __write 84507->84513 84510 40e454 84508->84510 84514 417f77 46 API calls __getptd_noexit 84508->84514 84510->84438 84512->84507 84513->84510 84514->84507 84516 403367 84515->84516 84517 403358 84515->84517 84518 4115d7 52 API calls 84516->84518 84517->84461 84519 403370 84518->84519 84520 4115d7 52 API calls 84519->84520 84521 40339e 84520->84521 84521->84461 84522->84469 84523 40f5dcb 84524 40f5dd2 84523->84524 84525 40f5dda 84524->84525 84526 40f5e70 84524->84526 84530 40f5a80 84525->84530 84543 40f6720 9 API calls 84526->84543 84529 40f5e57 84544 40f3470 84530->84544 84533 40f5b50 CreateFileW 84534 40f5b1f 84533->84534 84537 40f5b5d 84533->84537 84535 40f5b79 VirtualAlloc 84534->84535 84534->84537 84541 40f5c80 CloseHandle 84534->84541 84542 40f5c90 VirtualFree 84534->84542 84547 40f6990 GetPEB 84534->84547 84536 40f5b9a ReadFile 84535->84536 84535->84537 84536->84537 84540 40f5bb8 VirtualAlloc 84536->84540 84538 40f5d6c VirtualFree 84537->84538 84539 40f5d7a 84537->84539 84538->84539 84539->84529 84540->84534 84540->84537 84541->84534 84542->84534 84543->84529 84549 40f6930 GetPEB 84544->84549 84546 40f3afb 84546->84534 84548 40f69ba 84547->84548 84548->84533 84550 40f695a 84549->84550 84550->84546 84551 416454 84588 416c70 84551->84588 84553 416460 GetStartupInfoW 84554 416474 84553->84554 84589 419d5a HeapCreate 84554->84589 84556 4164cd 84559 4164d8 84556->84559 84673 41642b 46 API calls 3 library calls 84556->84673 84590 417c20 GetModuleHandleW 84559->84590 84560 4164de 84561 4164e9 __RTC_Initialize 84560->84561 84674 41642b 46 API calls 3 library calls 84560->84674 84609 41aaa1 GetStartupInfoW 84561->84609 84565 416503 GetCommandLineW 84622 41f584 GetEnvironmentStringsW 84565->84622 84569 416513 84628 41f4d6 GetModuleFileNameW 84569->84628 84571 41651d 84572 416528 84571->84572 84676 411924 46 API calls 3 library calls 84571->84676 84632 41f2a4 84572->84632 84575 41652e 84576 416539 84575->84576 84677 411924 46 API calls 3 library calls 84575->84677 84646 411703 84576->84646 84579 416541 84581 41654c __wwincmdln 84579->84581 84678 411924 46 API calls 3 library calls 84579->84678 84650 40d6b0 84581->84650 84584 41657c 84680 411906 46 API calls _doexit 84584->84680 84587 416581 __getstream 84588->84553 84589->84556 84591 417c34 84590->84591 84592 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 84590->84592 84681 4178ff 49 API calls _free 84591->84681 84594 417c87 TlsAlloc 84592->84594 84597 417cd5 TlsSetValue 84594->84597 84598 417d96 84594->84598 84595 417c39 84595->84560 84597->84598 84599 417ce6 __init_pointers 84597->84599 84598->84560 84682 418151 InitializeCriticalSectionAndSpinCount 84599->84682 84601 417d91 84690 4178ff 49 API calls _free 84601->84690 84603 417d2a 84603->84601 84683 416b49 84603->84683 84606 417d76 84689 41793c 46 API calls 4 library calls 84606->84689 84608 417d7e GetCurrentThreadId 84608->84598 84610 416b49 __calloc_crt 46 API calls 84609->84610 84611 41aabf 84610->84611 84612 41ac34 84611->84612 84615 416b49 __calloc_crt 46 API calls 84611->84615 84616 4164f7 84611->84616 84618 41abb4 84611->84618 84613 41ac6a GetStdHandle 84612->84613 84614 41acce SetHandleCount 84612->84614 84617 41ac7c GetFileType 84612->84617 84621 41aca2 InitializeCriticalSectionAndSpinCount 84612->84621 84613->84612 84614->84616 84615->84611 84616->84565 84675 411924 46 API calls 3 library calls 84616->84675 84617->84612 84618->84612 84619 41abe0 GetFileType 84618->84619 84620 41abeb InitializeCriticalSectionAndSpinCount 84618->84620 84619->84618 84619->84620 84620->84616 84620->84618 84621->84612 84621->84616 84623 41f595 84622->84623 84624 41f599 84622->84624 84623->84569 84700 416b04 84624->84700 84626 41f5bb _memmove 84627 41f5c2 FreeEnvironmentStringsW 84626->84627 84627->84569 84629 41f50b _wparse_cmdline 84628->84629 84630 416b04 __malloc_crt 46 API calls 84629->84630 84631 41f54e _wparse_cmdline 84629->84631 84630->84631 84631->84571 84633 41f2bc _wcslen 84632->84633 84637 41f2b4 84632->84637 84634 416b49 __calloc_crt 46 API calls 84633->84634 84639 41f2e0 _wcslen 84634->84639 84635 41f336 84707 413748 84635->84707 84637->84575 84638 416b49 __calloc_crt 46 API calls 84638->84639 84639->84635 84639->84637 84639->84638 84640 41f35c 84639->84640 84643 41f373 84639->84643 84706 41ef12 46 API calls 2 library calls 84639->84706 84642 413748 _free 46 API calls 84640->84642 84642->84637 84713 417ed3 84643->84713 84645 41f37f 84645->84575 84647 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 84646->84647 84649 411750 __IsNonwritableInCurrentImage 84647->84649 84732 41130a 51 API calls __cinit 84647->84732 84649->84579 84651 42e2f3 84650->84651 84652 40d6cc 84650->84652 84733 408f40 84652->84733 84654 40d707 84737 40ebb0 84654->84737 84661 40d737 84740 411951 84661->84740 84662 40d751 84752 40f4e0 SystemParametersInfoW SystemParametersInfoW 84662->84752 84664 40d75f 84753 40d590 GetCurrentDirectoryW 84664->84753 84666 40d767 SystemParametersInfoW 84667 40d794 84666->84667 84668 40d78d FreeLibrary 84666->84668 84669 408f40 VariantClear 84667->84669 84668->84667 84670 40d79d 84669->84670 84671 408f40 VariantClear 84670->84671 84672 40d7a6 84671->84672 84672->84584 84679 4118da 46 API calls _doexit 84672->84679 84673->84559 84674->84561 84679->84584 84680->84587 84681->84595 84682->84603 84685 416b52 84683->84685 84686 416b8f 84685->84686 84687 416b70 Sleep 84685->84687 84691 41f677 84685->84691 84686->84601 84686->84606 84688 416b85 84687->84688 84688->84685 84688->84686 84689->84608 84690->84598 84692 41f683 84691->84692 84698 41f69e _malloc 84691->84698 84693 41f68f 84692->84693 84692->84698 84699 417f77 46 API calls __getptd_noexit 84693->84699 84695 41f6b1 HeapAlloc 84697 41f6d8 84695->84697 84695->84698 84696 41f694 84696->84685 84697->84685 84698->84695 84698->84697 84699->84696 84703 416b0d 84700->84703 84701 4135bb _malloc 45 API calls 84701->84703 84702 416b43 84702->84626 84703->84701 84703->84702 84704 416b24 Sleep 84703->84704 84705 416b39 84704->84705 84705->84702 84705->84703 84706->84639 84708 413753 RtlFreeHeap 84707->84708 84712 41377c __dosmaperr 84707->84712 84709 413768 84708->84709 84708->84712 84716 417f77 46 API calls __getptd_noexit 84709->84716 84711 41376e GetLastError 84711->84712 84712->84637 84717 417daa 84713->84717 84716->84711 84718 417dc9 __wctomb_s_l __call_reportfault 84717->84718 84719 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 84718->84719 84721 417eb5 __call_reportfault 84719->84721 84723 41a208 84721->84723 84722 417ed1 GetCurrentProcess TerminateProcess 84722->84645 84724 41a210 84723->84724 84725 41a212 IsDebuggerPresent 84723->84725 84724->84722 84731 41fe19 84725->84731 84728 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 84729 421ff0 __call_reportfault 84728->84729 84730 421ff8 GetCurrentProcess TerminateProcess 84728->84730 84729->84730 84730->84722 84731->84728 84732->84649 84735 408f48 moneypunct 84733->84735 84734 4265c7 VariantClear 84736 408f55 moneypunct 84734->84736 84735->84734 84735->84736 84736->84654 84793 40ebd0 84737->84793 84797 4182cb 84740->84797 84742 41195e 84804 4181f2 LeaveCriticalSection 84742->84804 84744 40d748 84745 4119b0 84744->84745 84746 4119d6 84745->84746 84747 4119bc 84745->84747 84746->84662 84747->84746 84839 417f77 46 API calls __getptd_noexit 84747->84839 84749 4119c6 84840 417f25 10 API calls __write 84749->84840 84751 4119d1 84751->84662 84752->84664 84841 401f20 84753->84841 84755 40d5b6 IsDebuggerPresent 84756 40d5c4 84755->84756 84757 42e1bb MessageBoxA 84755->84757 84758 42e1d4 84756->84758 84759 40d5e3 84756->84759 84757->84758 85013 403a50 52 API calls 3 library calls 84758->85013 84911 40f520 84759->84911 84763 40d5fd GetFullPathNameW 84923 401460 84763->84923 84765 40d63b 84766 40d643 84765->84766 84767 42e231 SetCurrentDirectoryW 84765->84767 84768 40d64c 84766->84768 85014 432fee 6 API calls 84766->85014 84767->84766 84938 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 84768->84938 84771 42e252 84771->84768 84773 42e25a GetModuleFileNameW 84771->84773 84775 42e274 84773->84775 84776 42e2cb GetForegroundWindow ShellExecuteW 84773->84776 85015 401b10 84775->85015 84778 40d688 84776->84778 84777 40d656 84780 40d669 84777->84780 84782 40e0c0 74 API calls 84777->84782 84784 40d692 SetCurrentDirectoryW 84778->84784 84946 4091e0 84780->84946 84782->84780 84784->84666 84787 42e28d 85022 40d200 52 API calls 2 library calls 84787->85022 84790 42e299 GetForegroundWindow ShellExecuteW 84791 42e2c6 84790->84791 84791->84778 84792 40ec00 LoadLibraryA GetProcAddress 84792->84661 84794 40d72e 84793->84794 84795 40ebd6 LoadLibraryA 84793->84795 84794->84661 84794->84792 84795->84794 84796 40ebe7 GetProcAddress 84795->84796 84796->84794 84798 4182e0 84797->84798 84799 4182f3 EnterCriticalSection 84797->84799 84805 418209 84798->84805 84799->84742 84801 4182e6 84801->84799 84832 411924 46 API calls 3 library calls 84801->84832 84804->84744 84806 418215 __getstream 84805->84806 84807 418225 84806->84807 84808 41823d 84806->84808 84833 418901 46 API calls 2 library calls 84807->84833 84810 416b04 __malloc_crt 45 API calls 84808->84810 84813 41824b __getstream 84808->84813 84812 418256 84810->84812 84811 41822a 84834 418752 46 API calls 9 library calls 84811->84834 84815 41825d 84812->84815 84816 41826c 84812->84816 84813->84801 84836 417f77 46 API calls __getptd_noexit 84815->84836 84820 4182cb __lock 45 API calls 84816->84820 84817 418231 84835 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 84817->84835 84822 418273 84820->84822 84823 4182a6 84822->84823 84824 41827b InitializeCriticalSectionAndSpinCount 84822->84824 84825 413748 _free 45 API calls 84823->84825 84826 418297 84824->84826 84827 41828b 84824->84827 84825->84826 84838 4182c2 LeaveCriticalSection _doexit 84826->84838 84828 413748 _free 45 API calls 84827->84828 84829 418291 84828->84829 84837 417f77 46 API calls __getptd_noexit 84829->84837 84833->84811 84834->84817 84836->84813 84837->84826 84838->84813 84839->84749 84840->84751 85023 40e6e0 84841->85023 84845 401f41 GetModuleFileNameW 85041 410100 84845->85041 84847 401f5c 85053 410960 84847->85053 84850 401b10 52 API calls 84851 401f81 84850->84851 85056 401980 84851->85056 84853 401f8e 84854 408f40 VariantClear 84853->84854 84855 401f9d 84854->84855 84856 401b10 52 API calls 84855->84856 84857 401fb4 84856->84857 84858 401980 53 API calls 84857->84858 84859 401fc3 84858->84859 84860 401b10 52 API calls 84859->84860 84861 401fd2 84860->84861 85064 40c2c0 84861->85064 84863 401fe1 84864 40bc70 52 API calls 84863->84864 84865 401ff3 84864->84865 85082 401a10 84865->85082 84867 401ffe 85089 4114ab 84867->85089 84870 428b05 84872 401a10 52 API calls 84870->84872 84871 402017 84873 4114ab __wcsicoll 58 API calls 84871->84873 84874 428b18 84872->84874 84875 402022 84873->84875 84877 401a10 52 API calls 84874->84877 84875->84874 84876 40202d 84875->84876 84878 4114ab __wcsicoll 58 API calls 84876->84878 84879 428b33 84877->84879 84880 402038 84878->84880 84882 428b3b GetModuleFileNameW 84879->84882 84881 402043 84880->84881 84880->84882 84883 4114ab __wcsicoll 58 API calls 84881->84883 84884 401a10 52 API calls 84882->84884 84885 40204e 84883->84885 84886 428b6c 84884->84886 84887 402092 84885->84887 84893 401a10 52 API calls 84885->84893 84896 428b90 _wcscpy 84885->84896 84888 40e0a0 52 API calls 84886->84888 84889 4020a3 84887->84889 84887->84896 84890 428b7a 84888->84890 84892 428bc6 84889->84892 85097 40e830 53 API calls 84889->85097 84891 401a10 52 API calls 84890->84891 84895 428b88 84891->84895 84894 402073 _wcscpy 84893->84894 84901 401a10 52 API calls 84894->84901 84895->84896 84898 401a10 52 API calls 84896->84898 84906 4020d0 84898->84906 84899 4020bb 85098 40cf00 53 API calls 84899->85098 84901->84887 84902 4020c6 84903 408f40 VariantClear 84902->84903 84903->84906 84905 402110 84908 408f40 VariantClear 84905->84908 84906->84905 84909 401a10 52 API calls 84906->84909 85099 40cf00 53 API calls 84906->85099 85100 40e6a0 53 API calls 84906->85100 84910 402120 moneypunct 84908->84910 84909->84906 84910->84755 84912 4295c9 __wctomb_s_l 84911->84912 84913 40f53c 84911->84913 84915 4295d9 GetOpenFileNameW 84912->84915 85777 410120 84913->85777 84915->84913 84917 40d5f5 84915->84917 84916 40f545 85781 4102b0 SHGetMalloc 84916->85781 84917->84763 84917->84765 84919 40f54c 85786 410190 GetFullPathNameW 84919->85786 84921 40f559 85797 40f570 84921->85797 85859 402400 84923->85859 84925 40146f 84928 428c29 _wcscat 84925->84928 85868 401500 84925->85868 84927 40147c 84927->84928 85876 40d440 84927->85876 84930 401489 84930->84928 84931 401491 GetFullPathNameW 84930->84931 84932 402160 52 API calls 84931->84932 84933 4014bb 84932->84933 84934 402160 52 API calls 84933->84934 84935 4014c8 84934->84935 84935->84928 84936 402160 52 API calls 84935->84936 84937 4014ee 84936->84937 84937->84765 84939 428361 84938->84939 84940 4103fc LoadImageW RegisterClassExW 84938->84940 85896 44395e EnumResourceNamesW LoadImageW 84939->85896 85895 410490 7 API calls 84940->85895 84943 40d651 84945 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 84943->84945 84944 428368 84945->84777 84947 409202 84946->84947 84948 42d7ad 84946->84948 85006 409216 moneypunct 84947->85006 86159 410940 331 API calls 84947->86159 86162 45e737 90 API calls 3 library calls 84948->86162 84951 409386 84952 40939c 84951->84952 86160 40f190 10 API calls 84951->86160 84952->84778 85012 401000 Shell_NotifyIconW __wctomb_s_l 84952->85012 84954 4095b2 84954->84952 84956 4095bf 84954->84956 84955 409253 PeekMessageW 84955->85006 86161 401a50 331 API calls 84956->86161 84958 42d8cd Sleep 84958->85006 84959 4095c6 LockWindowUpdate DestroyWindow GetMessageW 84959->84952 84962 4095f9 84959->84962 84961 42e13b 86180 40d410 VariantClear 84961->86180 84965 42e158 TranslateMessage DispatchMessageW GetMessageW 84962->84965 84965->84965 84966 42e188 84965->84966 84966->84952 84968 409567 PeekMessageW 84968->85006 84970 44c29d 52 API calls 85001 4094e0 84970->85001 84971 40e0a0 52 API calls 84971->85006 84972 46fdbf 108 API calls 84972->85001 84973 46f3c1 107 API calls 84973->85006 84975 42dcd2 WaitForSingleObject 84978 42dcf0 GetExitCodeProcess CloseHandle 84975->84978 84975->85006 84976 409551 TranslateMessage DispatchMessageW 84976->84968 84977 42dd3d Sleep 84977->85001 86169 40d410 VariantClear 84978->86169 84981 4094cf Sleep 84981->85001 84983 40d410 VariantClear 84983->85006 84984 408f40 VariantClear 84984->85001 84986 42d94d timeGetTime 86165 465124 53 API calls 84986->86165 84988 40c620 timeGetTime 84988->85001 84991 465124 53 API calls 84991->85001 84992 42dd89 CloseHandle 84992->85001 84993 47d33e 309 API calls 84993->85006 84995 42de19 GetExitCodeProcess CloseHandle 84995->85001 84997 401b10 52 API calls 84997->85001 84999 42de88 Sleep 84999->85006 85001->84970 85001->84972 85001->84984 85001->84988 85001->84991 85001->84992 85001->84995 85001->84997 85001->84999 85001->85006 85010 401980 53 API calls 85001->85010 86166 45178a 54 API calls 85001->86166 86167 47d33e 331 API calls 85001->86167 86168 453bc6 54 API calls 85001->86168 86170 40d410 VariantClear 85001->86170 86171 443d19 67 API calls _wcslen 85001->86171 86172 4574b4 VariantClear 85001->86172 86173 403cd0 85001->86173 86177 4731e1 VariantClear 85001->86177 86178 4331a2 6 API calls 85001->86178 85005 42e0cc VariantClear 85005->85006 85006->84951 85006->84955 85006->84958 85006->84961 85006->84968 85006->84971 85006->84973 85006->84975 85006->84976 85006->84977 85006->84981 85006->84983 85006->84986 85006->84993 85006->85001 85006->85005 85007 408f40 VariantClear 85006->85007 85008 45e737 90 API calls 85006->85008 85897 4091b0 85006->85897 85955 40afa0 85006->85955 85981 408fc0 85006->85981 86016 408cc0 85006->86016 86030 4096a0 85006->86030 86157 40d150 TranslateAcceleratorW 85006->86157 86158 40d170 IsDialogMessageW GetClassLongW 85006->86158 86163 465124 53 API calls 85006->86163 86164 40c620 timeGetTime 85006->86164 86179 40e270 VariantClear moneypunct 85006->86179 85007->85006 85008->85006 85010->85001 85012->84778 85013->84765 85014->84771 85016 401b16 _wcslen 85015->85016 85017 4115d7 52 API calls 85016->85017 85020 401b63 85016->85020 85018 401b4b _memmove 85017->85018 85019 4115d7 52 API calls 85018->85019 85019->85020 85021 40d200 52 API calls 2 library calls 85020->85021 85021->84787 85022->84790 85024 40bc70 52 API calls 85023->85024 85025 401f31 85024->85025 85026 402560 85025->85026 85027 40256d __write_nolock 85026->85027 85028 402160 52 API calls 85027->85028 85030 402593 85028->85030 85036 4025bd 85030->85036 85101 401c90 85030->85101 85031 4026f0 52 API calls 85031->85036 85032 4026a7 85033 401b10 52 API calls 85032->85033 85040 4026db 85032->85040 85035 4026d1 85033->85035 85034 401b10 52 API calls 85034->85036 85105 40d7c0 52 API calls 2 library calls 85035->85105 85036->85031 85036->85032 85036->85034 85038 401c90 52 API calls 85036->85038 85104 40d7c0 52 API calls 2 library calls 85036->85104 85038->85036 85040->84845 85106 40f760 85041->85106 85044 410118 85044->84847 85046 42805d 85047 42806a 85046->85047 85162 431e58 85046->85162 85049 413748 _free 46 API calls 85047->85049 85050 428078 85049->85050 85051 431e58 82 API calls 85050->85051 85052 428084 85051->85052 85052->84847 85054 4115d7 52 API calls 85053->85054 85055 401f74 85054->85055 85055->84850 85057 4019a3 85056->85057 85063 401985 85056->85063 85058 4019b8 85057->85058 85057->85063 85766 403e10 53 API calls 85058->85766 85060 40199f 85060->84853 85062 4019c4 85062->84853 85063->85060 85765 403e10 53 API calls 85063->85765 85065 40c2c7 85064->85065 85066 40c30e 85064->85066 85069 40c2d3 85065->85069 85070 426c79 85065->85070 85067 40c315 85066->85067 85068 426c2b 85066->85068 85071 40c321 85067->85071 85072 426c5a 85067->85072 85074 426c4b 85068->85074 85075 426c2e 85068->85075 85767 403ea0 52 API calls __cinit 85069->85767 85772 4534e3 52 API calls 85070->85772 85768 403ea0 52 API calls __cinit 85071->85768 85771 4534e3 52 API calls 85072->85771 85770 4534e3 52 API calls 85074->85770 85081 40c2de 85075->85081 85769 4534e3 52 API calls 85075->85769 85081->84863 85081->85081 85083 401a30 85082->85083 85084 401a17 85082->85084 85085 402160 52 API calls 85083->85085 85086 401a2d 85084->85086 85773 403c30 52 API calls _memmove 85084->85773 85088 401a3d 85085->85088 85086->84867 85088->84867 85090 411523 85089->85090 85091 4114ba 85089->85091 85776 4113a8 58 API calls 4 library calls 85090->85776 85096 40200c 85091->85096 85774 417f77 46 API calls __getptd_noexit 85091->85774 85094 4114c6 85775 417f25 10 API calls __write 85094->85775 85096->84870 85096->84871 85097->84899 85098->84902 85099->84906 85100->84906 85102 4026f0 52 API calls 85101->85102 85103 401c97 85102->85103 85103->85030 85104->85036 85105->85040 85166 40f6f0 85106->85166 85108 40f77b _strcat moneypunct 85174 40f850 85108->85174 85113 427c2a 85204 414d04 85113->85204 85115 40f7fc 85115->85113 85116 40f804 85115->85116 85191 414a46 85116->85191 85120 40f80e 85120->85044 85125 4528bd 85120->85125 85122 427c59 85210 414fe2 85122->85210 85124 427c79 85126 4150d1 _fseek 81 API calls 85125->85126 85127 452930 85126->85127 85707 452719 85127->85707 85130 452948 85130->85046 85131 414d04 __fread_nolock 61 API calls 85132 452966 85131->85132 85133 414d04 __fread_nolock 61 API calls 85132->85133 85134 452976 85133->85134 85135 414d04 __fread_nolock 61 API calls 85134->85135 85136 45298f 85135->85136 85137 414d04 __fread_nolock 61 API calls 85136->85137 85138 4529aa 85137->85138 85139 4150d1 _fseek 81 API calls 85138->85139 85140 4529c4 85139->85140 85141 4135bb _malloc 46 API calls 85140->85141 85142 4529cf 85141->85142 85143 4135bb _malloc 46 API calls 85142->85143 85144 4529db 85143->85144 85145 414d04 __fread_nolock 61 API calls 85144->85145 85146 4529ec 85145->85146 85147 44afef GetSystemTimeAsFileTime 85146->85147 85148 452a00 85147->85148 85149 452a36 85148->85149 85150 452a13 85148->85150 85151 452aa5 85149->85151 85152 452a3c 85149->85152 85153 413748 _free 46 API calls 85150->85153 85155 413748 _free 46 API calls 85151->85155 85713 44b1a9 85152->85713 85156 452a1c 85153->85156 85158 452aa3 85155->85158 85159 413748 _free 46 API calls 85156->85159 85157 452a9d 85160 413748 _free 46 API calls 85157->85160 85158->85046 85161 452a25 85159->85161 85160->85158 85161->85046 85163 431e64 85162->85163 85164 431e6a 85162->85164 85165 414a46 __fcloseall 82 API calls 85163->85165 85164->85047 85165->85164 85167 425de2 85166->85167 85168 40f6fc _wcslen 85166->85168 85167->85108 85169 40f710 WideCharToMultiByte 85168->85169 85170 40f756 85169->85170 85171 40f728 85169->85171 85170->85108 85172 4115d7 52 API calls 85171->85172 85173 40f735 WideCharToMultiByte 85172->85173 85173->85108 85176 40f85d __wctomb_s_l _strlen 85174->85176 85175 426b3b 85176->85175 85178 40f7ab 85176->85178 85223 414db8 85176->85223 85179 4149c2 85178->85179 85235 414904 85179->85235 85181 40f7e9 85181->85113 85182 40f5c0 85181->85182 85187 40f5cd _strcat __write_nolock _memmove 85182->85187 85183 414d04 __fread_nolock 61 API calls 85183->85187 85185 425d11 85186 4150d1 _fseek 81 API calls 85185->85186 85188 425d33 85186->85188 85187->85183 85187->85185 85190 40f691 __tzset_nolock 85187->85190 85323 4150d1 85187->85323 85189 414d04 __fread_nolock 61 API calls 85188->85189 85189->85190 85190->85115 85192 414a52 __getstream 85191->85192 85193 414a64 85192->85193 85194 414a79 85192->85194 85463 417f77 46 API calls __getptd_noexit 85193->85463 85196 415471 __lock_file 47 API calls 85194->85196 85201 414a74 __getstream 85194->85201 85199 414a92 85196->85199 85197 414a69 85464 417f25 10 API calls __write 85197->85464 85447 4149d9 85199->85447 85201->85120 85532 414c76 85204->85532 85206 414d1c 85207 44afef 85206->85207 85700 442c5a 85207->85700 85209 44b00d 85209->85122 85211 414fee __getstream 85210->85211 85212 414ffa 85211->85212 85213 41500f 85211->85213 85704 417f77 46 API calls __getptd_noexit 85212->85704 85215 415471 __lock_file 47 API calls 85213->85215 85217 415017 85215->85217 85216 414fff 85705 417f25 10 API calls __write 85216->85705 85219 414e4e __ftell_nolock 51 API calls 85217->85219 85220 415024 85219->85220 85706 41503d LeaveCriticalSection LeaveCriticalSection _fseek 85220->85706 85222 41500a __getstream 85222->85124 85224 414dd6 85223->85224 85225 414deb 85223->85225 85232 417f77 46 API calls __getptd_noexit 85224->85232 85225->85224 85229 414df2 85225->85229 85227 414ddb 85233 417f25 10 API calls __write 85227->85233 85230 414de6 85229->85230 85234 418f98 77 API calls 6 library calls 85229->85234 85230->85176 85232->85227 85233->85230 85234->85230 85238 414910 __getstream 85235->85238 85236 414923 85291 417f77 46 API calls __getptd_noexit 85236->85291 85238->85236 85240 414951 85238->85240 85239 414928 85292 417f25 10 API calls __write 85239->85292 85254 41d4d1 85240->85254 85243 414956 85244 41496a 85243->85244 85245 41495d 85243->85245 85247 414992 85244->85247 85248 414972 85244->85248 85293 417f77 46 API calls __getptd_noexit 85245->85293 85271 41d218 85247->85271 85294 417f77 46 API calls __getptd_noexit 85248->85294 85253 414933 @_EH4_CallFilterFunc@8 __getstream 85253->85181 85255 41d4dd __getstream 85254->85255 85256 4182cb __lock 46 API calls 85255->85256 85257 41d4eb 85256->85257 85258 41d567 85257->85258 85265 418209 __mtinitlocknum 46 API calls 85257->85265 85269 41d560 85257->85269 85299 4154b2 47 API calls __lock 85257->85299 85300 415520 LeaveCriticalSection LeaveCriticalSection _doexit 85257->85300 85259 416b04 __malloc_crt 46 API calls 85258->85259 85261 41d56e 85259->85261 85262 41d57c InitializeCriticalSectionAndSpinCount 85261->85262 85261->85269 85263 41d59c 85262->85263 85264 41d5af EnterCriticalSection 85262->85264 85268 413748 _free 46 API calls 85263->85268 85264->85269 85265->85257 85267 41d5f0 __getstream 85267->85243 85268->85269 85296 41d5fb 85269->85296 85272 41d23a 85271->85272 85273 41d255 85272->85273 85285 41d26c __wopenfile 85272->85285 85305 417f77 46 API calls __getptd_noexit 85273->85305 85275 41d421 85278 41d47a 85275->85278 85279 41d48c 85275->85279 85276 41d25a 85306 417f25 10 API calls __write 85276->85306 85310 417f77 46 API calls __getptd_noexit 85278->85310 85302 422bf9 85279->85302 85282 41499d 85295 4149b8 LeaveCriticalSection LeaveCriticalSection _fseek 85282->85295 85283 41d47f 85311 417f25 10 API calls __write 85283->85311 85285->85275 85285->85278 85307 41341f 58 API calls 3 library calls 85285->85307 85287 41d41a 85287->85275 85308 41341f 58 API calls 3 library calls 85287->85308 85289 41d439 85289->85275 85309 41341f 58 API calls 3 library calls 85289->85309 85291->85239 85292->85253 85293->85253 85294->85253 85295->85253 85301 4181f2 LeaveCriticalSection 85296->85301 85298 41d602 85298->85267 85299->85257 85300->85257 85301->85298 85312 422b35 85302->85312 85304 422c14 85304->85282 85305->85276 85306->85282 85307->85287 85308->85289 85309->85275 85310->85283 85311->85282 85315 422b41 __getstream 85312->85315 85313 422b54 85314 417f77 __dosmaperr 46 API calls 85313->85314 85316 422b59 85314->85316 85315->85313 85317 422b8a 85315->85317 85318 417f25 __write 10 API calls 85316->85318 85319 422400 __tsopen_nolock 109 API calls 85317->85319 85322 422b63 __getstream 85318->85322 85320 422ba4 85319->85320 85321 422bcb __wsopen_helper LeaveCriticalSection 85320->85321 85321->85322 85322->85304 85326 4150dd __getstream 85323->85326 85324 4150e9 85354 417f77 46 API calls __getptd_noexit 85324->85354 85326->85324 85327 41510f 85326->85327 85336 415471 85327->85336 85328 4150ee 85355 417f25 10 API calls __write 85328->85355 85335 4150f9 __getstream 85335->85187 85337 415483 85336->85337 85338 4154a5 EnterCriticalSection 85336->85338 85337->85338 85339 41548b 85337->85339 85340 415117 85338->85340 85341 4182cb __lock 46 API calls 85339->85341 85342 415047 85340->85342 85341->85340 85343 415067 85342->85343 85344 415057 85342->85344 85349 415079 85343->85349 85357 414e4e 85343->85357 85412 417f77 46 API calls __getptd_noexit 85344->85412 85348 41505c 85356 415143 LeaveCriticalSection LeaveCriticalSection _fseek 85348->85356 85374 41443c 85349->85374 85352 4150b9 85387 41e1f4 85352->85387 85354->85328 85355->85335 85356->85335 85358 414e61 85357->85358 85359 414e79 85357->85359 85413 417f77 46 API calls __getptd_noexit 85358->85413 85360 414139 __fputwc_nolock 46 API calls 85359->85360 85362 414e80 85360->85362 85365 41e1f4 __write 51 API calls 85362->85365 85363 414e66 85414 417f25 10 API calls __write 85363->85414 85366 414e97 85365->85366 85367 414f09 85366->85367 85369 414ec9 85366->85369 85373 414e71 85366->85373 85415 417f77 46 API calls __getptd_noexit 85367->85415 85370 41e1f4 __write 51 API calls 85369->85370 85369->85373 85371 414f64 85370->85371 85372 41e1f4 __write 51 API calls 85371->85372 85371->85373 85372->85373 85373->85349 85375 414455 85374->85375 85379 414477 85374->85379 85376 414139 __fputwc_nolock 46 API calls 85375->85376 85375->85379 85377 414470 85376->85377 85416 41b7b2 77 API calls 5 library calls 85377->85416 85380 414139 85379->85380 85381 414145 85380->85381 85382 41415a 85380->85382 85417 417f77 46 API calls __getptd_noexit 85381->85417 85382->85352 85384 41414a 85418 417f25 10 API calls __write 85384->85418 85386 414155 85386->85352 85388 41e200 __getstream 85387->85388 85389 41e223 85388->85389 85390 41e208 85388->85390 85392 41e22f 85389->85392 85395 41e269 85389->85395 85439 417f8a 46 API calls __getptd_noexit 85390->85439 85441 417f8a 46 API calls __getptd_noexit 85392->85441 85393 41e20d 85440 417f77 46 API calls __getptd_noexit 85393->85440 85419 41ae56 85395->85419 85397 41e234 85442 417f77 46 API calls __getptd_noexit 85397->85442 85400 41e23c 85443 417f25 10 API calls __write 85400->85443 85401 41e26f 85403 41e291 85401->85403 85404 41e27d 85401->85404 85444 417f77 46 API calls __getptd_noexit 85403->85444 85429 41e17f 85404->85429 85405 41e215 __getstream 85405->85348 85408 41e289 85446 41e2c0 LeaveCriticalSection __unlock_fhandle 85408->85446 85409 41e296 85445 417f8a 46 API calls __getptd_noexit 85409->85445 85412->85348 85413->85363 85414->85373 85415->85373 85416->85379 85417->85384 85418->85386 85420 41ae62 __getstream 85419->85420 85421 41aebc 85420->85421 85422 4182cb __lock 46 API calls 85420->85422 85423 41aec1 EnterCriticalSection 85421->85423 85427 41aede __getstream 85421->85427 85424 41ae8e 85422->85424 85423->85427 85425 41aeaa 85424->85425 85426 41ae97 InitializeCriticalSectionAndSpinCount 85424->85426 85428 41aeec ___lock_fhandle LeaveCriticalSection 85425->85428 85426->85425 85427->85401 85428->85421 85430 41aded __chsize_nolock 46 API calls 85429->85430 85431 41e18e 85430->85431 85432 41e1a4 SetFilePointer 85431->85432 85433 41e194 85431->85433 85435 41e1c3 85432->85435 85436 41e1bb GetLastError 85432->85436 85434 417f77 __dosmaperr 46 API calls 85433->85434 85437 41e199 85434->85437 85435->85437 85438 417f9d __dosmaperr 46 API calls 85435->85438 85436->85435 85437->85408 85438->85437 85439->85393 85440->85405 85441->85397 85442->85400 85443->85405 85444->85409 85445->85408 85446->85405 85448 4149ea 85447->85448 85449 4149fe 85447->85449 85493 417f77 46 API calls __getptd_noexit 85448->85493 85451 4149fa 85449->85451 85453 41443c __flush 77 API calls 85449->85453 85465 414ab2 LeaveCriticalSection LeaveCriticalSection _fseek 85451->85465 85452 4149ef 85494 417f25 10 API calls __write 85452->85494 85455 414a0a 85453->85455 85466 41d8c2 85455->85466 85458 414139 __fputwc_nolock 46 API calls 85459 414a18 85458->85459 85470 41d7fe 85459->85470 85461 414a1e 85461->85451 85462 413748 _free 46 API calls 85461->85462 85462->85451 85463->85197 85464->85201 85465->85201 85467 414a12 85466->85467 85468 41d8d2 85466->85468 85467->85458 85468->85467 85469 413748 _free 46 API calls 85468->85469 85469->85467 85471 41d80a __getstream 85470->85471 85472 41d812 85471->85472 85475 41d82d 85471->85475 85510 417f8a 46 API calls __getptd_noexit 85472->85510 85473 41d839 85512 417f8a 46 API calls __getptd_noexit 85473->85512 85475->85473 85479 41d873 85475->85479 85477 41d817 85511 417f77 46 API calls __getptd_noexit 85477->85511 85478 41d83e 85513 417f77 46 API calls __getptd_noexit 85478->85513 85482 41ae56 ___lock_fhandle 48 API calls 85479->85482 85484 41d879 85482->85484 85483 41d846 85514 417f25 10 API calls __write 85483->85514 85486 41d893 85484->85486 85487 41d887 85484->85487 85515 417f77 46 API calls __getptd_noexit 85486->85515 85495 41d762 85487->85495 85490 41d81f __getstream 85490->85461 85491 41d88d 85516 41d8ba LeaveCriticalSection __unlock_fhandle 85491->85516 85493->85452 85494->85451 85517 41aded 85495->85517 85497 41d7c8 85530 41ad67 47 API calls __dosmaperr 85497->85530 85499 41d772 85499->85497 85502 41aded __chsize_nolock 46 API calls 85499->85502 85509 41d7a6 85499->85509 85500 41aded __chsize_nolock 46 API calls 85503 41d7b2 CloseHandle 85500->85503 85501 41d7d0 85508 41d7f2 85501->85508 85531 417f9d 46 API calls __dosmaperr 85501->85531 85504 41d79d 85502->85504 85503->85497 85505 41d7be GetLastError 85503->85505 85507 41aded __chsize_nolock 46 API calls 85504->85507 85505->85497 85507->85509 85508->85491 85509->85497 85509->85500 85510->85477 85511->85490 85512->85478 85513->85483 85514->85490 85515->85491 85516->85490 85518 41ae12 85517->85518 85519 41adfa 85517->85519 85522 417f8a __dosmaperr 46 API calls 85518->85522 85525 41ae51 85518->85525 85520 417f8a __dosmaperr 46 API calls 85519->85520 85521 41adff 85520->85521 85523 417f77 __dosmaperr 46 API calls 85521->85523 85524 41ae23 85522->85524 85526 41ae07 85523->85526 85527 417f77 __dosmaperr 46 API calls 85524->85527 85525->85499 85526->85499 85528 41ae2b 85527->85528 85529 417f25 __write 10 API calls 85528->85529 85529->85526 85530->85501 85531->85508 85533 414c82 __getstream 85532->85533 85534 414cc3 85533->85534 85535 414c96 __wctomb_s_l 85533->85535 85536 414cbb __getstream 85533->85536 85537 415471 __lock_file 47 API calls 85534->85537 85559 417f77 46 API calls __getptd_noexit 85535->85559 85536->85206 85539 414ccb 85537->85539 85545 414aba 85539->85545 85540 414cb0 85560 417f25 10 API calls __write 85540->85560 85546 414af2 85545->85546 85549 414ad8 __wctomb_s_l 85545->85549 85561 414cfa LeaveCriticalSection LeaveCriticalSection _fseek 85546->85561 85547 414ae2 85612 417f77 46 API calls __getptd_noexit 85547->85612 85549->85546 85549->85547 85551 414b2d 85549->85551 85551->85546 85553 414c38 __wctomb_s_l 85551->85553 85554 414139 __fputwc_nolock 46 API calls 85551->85554 85562 41dfcc 85551->85562 85592 41d8f3 85551->85592 85614 41e0c2 46 API calls 4 library calls 85551->85614 85615 417f77 46 API calls __getptd_noexit 85553->85615 85554->85551 85558 414ae7 85613 417f25 10 API calls __write 85558->85613 85559->85540 85560->85536 85561->85536 85563 41dfd8 __getstream 85562->85563 85564 41dfe0 85563->85564 85565 41dffb 85563->85565 85685 417f8a 46 API calls __getptd_noexit 85564->85685 85567 41e007 85565->85567 85570 41e041 85565->85570 85687 417f8a 46 API calls __getptd_noexit 85567->85687 85568 41dfe5 85686 417f77 46 API calls __getptd_noexit 85568->85686 85573 41e063 85570->85573 85574 41e04e 85570->85574 85572 41e00c 85688 417f77 46 API calls __getptd_noexit 85572->85688 85578 41ae56 ___lock_fhandle 48 API calls 85573->85578 85690 417f8a 46 API calls __getptd_noexit 85574->85690 85575 41dfed __getstream 85575->85551 85581 41e069 85578->85581 85579 41e014 85689 417f25 10 API calls __write 85579->85689 85580 41e053 85691 417f77 46 API calls __getptd_noexit 85580->85691 85584 41e077 85581->85584 85585 41e08b 85581->85585 85616 41da15 85584->85616 85692 417f77 46 API calls __getptd_noexit 85585->85692 85588 41e090 85693 417f8a 46 API calls __getptd_noexit 85588->85693 85589 41e083 85694 41e0ba LeaveCriticalSection __unlock_fhandle 85589->85694 85593 41d900 85592->85593 85596 41d915 85592->85596 85698 417f77 46 API calls __getptd_noexit 85593->85698 85595 41d905 85699 417f25 10 API calls __write 85595->85699 85599 41d94a 85596->85599 85606 41d910 85596->85606 85695 420603 85596->85695 85600 414139 __fputwc_nolock 46 API calls 85599->85600 85601 41d95e 85600->85601 85602 41dfcc __read 59 API calls 85601->85602 85603 41d965 85602->85603 85604 414139 __fputwc_nolock 46 API calls 85603->85604 85603->85606 85605 41d988 85604->85605 85605->85606 85607 414139 __fputwc_nolock 46 API calls 85605->85607 85606->85551 85608 41d994 85607->85608 85608->85606 85609 414139 __fputwc_nolock 46 API calls 85608->85609 85610 41d9a1 85609->85610 85611 414139 __fputwc_nolock 46 API calls 85610->85611 85611->85606 85612->85558 85613->85546 85614->85551 85615->85558 85617 41da31 85616->85617 85618 41da4c 85616->85618 85620 417f8a __dosmaperr 46 API calls 85617->85620 85619 41da5b 85618->85619 85621 41da7a 85618->85621 85622 417f8a __dosmaperr 46 API calls 85619->85622 85623 41da36 85620->85623 85625 41da98 85621->85625 85636 41daac 85621->85636 85624 41da60 85622->85624 85626 417f77 __dosmaperr 46 API calls 85623->85626 85628 417f77 __dosmaperr 46 API calls 85624->85628 85629 417f8a __dosmaperr 46 API calls 85625->85629 85637 41da3e 85626->85637 85627 41db02 85631 417f8a __dosmaperr 46 API calls 85627->85631 85630 41da67 85628->85630 85632 41da9d 85629->85632 85633 417f25 __write 10 API calls 85630->85633 85634 41db07 85631->85634 85635 417f77 __dosmaperr 46 API calls 85632->85635 85633->85637 85638 417f77 __dosmaperr 46 API calls 85634->85638 85639 41daa4 85635->85639 85636->85627 85636->85637 85640 41dae1 85636->85640 85641 41db1b 85636->85641 85637->85589 85638->85639 85642 417f25 __write 10 API calls 85639->85642 85640->85627 85645 41daec ReadFile 85640->85645 85644 416b04 __malloc_crt 46 API calls 85641->85644 85642->85637 85646 41db31 85644->85646 85647 41dc17 85645->85647 85648 41df8f GetLastError 85645->85648 85651 41db59 85646->85651 85652 41db3b 85646->85652 85647->85648 85655 41dc2b 85647->85655 85649 41de16 85648->85649 85650 41df9c 85648->85650 85659 417f9d __dosmaperr 46 API calls 85649->85659 85665 41dd9b 85649->85665 85653 417f77 __dosmaperr 46 API calls 85650->85653 85656 420494 __lseeki64_nolock 48 API calls 85651->85656 85654 417f77 __dosmaperr 46 API calls 85652->85654 85657 41dfa1 85653->85657 85658 41db40 85654->85658 85664 41dc47 85655->85664 85655->85665 85671 41de5b 85655->85671 85660 41db67 85656->85660 85661 417f8a __dosmaperr 46 API calls 85657->85661 85662 417f8a __dosmaperr 46 API calls 85658->85662 85659->85665 85660->85645 85661->85665 85662->85637 85663 413748 _free 46 API calls 85663->85637 85666 41dcab ReadFile 85664->85666 85673 41dd28 85664->85673 85665->85637 85665->85663 85670 41dcc9 GetLastError 85666->85670 85682 41dcd3 85666->85682 85667 41ded0 ReadFile 85668 41deef GetLastError 85667->85668 85676 41def9 85667->85676 85668->85671 85668->85676 85669 41ddec MultiByteToWideChar 85669->85665 85672 41de10 GetLastError 85669->85672 85670->85664 85670->85682 85671->85665 85671->85667 85672->85649 85673->85665 85674 41dda3 85673->85674 85675 41dd96 85673->85675 85683 41dd60 85673->85683 85680 41ddda 85674->85680 85674->85683 85677 417f77 __dosmaperr 46 API calls 85675->85677 85676->85671 85679 420494 __lseeki64_nolock 48 API calls 85676->85679 85677->85665 85678 420494 __lseeki64_nolock 48 API calls 85678->85682 85679->85676 85681 420494 __lseeki64_nolock 48 API calls 85680->85681 85684 41dde9 85681->85684 85682->85664 85682->85678 85683->85669 85684->85669 85685->85568 85686->85575 85687->85572 85688->85579 85689->85575 85690->85580 85691->85579 85692->85588 85693->85589 85694->85575 85696 416b04 __malloc_crt 46 API calls 85695->85696 85697 420618 85696->85697 85697->85599 85698->85595 85699->85606 85703 4148b3 GetSystemTimeAsFileTime __aulldiv 85700->85703 85702 442c6b 85702->85209 85703->85702 85704->85216 85705->85222 85706->85222 85712 45272f __tzset_nolock _wcscpy 85707->85712 85708 414d04 61 API calls __fread_nolock 85708->85712 85709 44afef GetSystemTimeAsFileTime 85709->85712 85710 4528a4 85710->85130 85710->85131 85711 4150d1 81 API calls _fseek 85711->85712 85712->85708 85712->85709 85712->85710 85712->85711 85714 44b1bc 85713->85714 85715 44b1ca 85713->85715 85716 4149c2 116 API calls 85714->85716 85717 44b1e1 85715->85717 85718 4149c2 116 API calls 85715->85718 85719 44b1d8 85715->85719 85716->85715 85748 4321a4 85717->85748 85720 44b2db 85718->85720 85719->85157 85720->85717 85722 44b2e9 85720->85722 85724 44b2f6 85722->85724 85728 414a46 __fcloseall 82 API calls 85722->85728 85723 44b224 85725 44b253 85723->85725 85726 44b228 85723->85726 85724->85157 85752 43213d 85725->85752 85727 44b235 85726->85727 85730 414a46 __fcloseall 82 API calls 85726->85730 85731 44b245 85727->85731 85733 414a46 __fcloseall 82 API calls 85727->85733 85728->85724 85730->85727 85731->85157 85732 44b25a 85734 44b260 85732->85734 85735 44b289 85732->85735 85733->85731 85737 44b26d 85734->85737 85740 414a46 __fcloseall 82 API calls 85734->85740 85762 44b0bf 87 API calls 85735->85762 85738 44b27d 85737->85738 85741 414a46 __fcloseall 82 API calls 85737->85741 85738->85157 85739 44b28f 85763 4320f8 46 API calls _free 85739->85763 85740->85737 85741->85738 85743 44b295 85744 44b2a2 85743->85744 85745 414a46 __fcloseall 82 API calls 85743->85745 85746 44b2b2 85744->85746 85747 414a46 __fcloseall 82 API calls 85744->85747 85745->85744 85746->85157 85747->85746 85749 4321b4 __tzset_nolock _memmove 85748->85749 85750 4321cb 85748->85750 85749->85723 85751 414d04 __fread_nolock 61 API calls 85750->85751 85751->85749 85753 4135bb _malloc 46 API calls 85752->85753 85754 432150 85753->85754 85755 4135bb _malloc 46 API calls 85754->85755 85756 432162 85755->85756 85757 4135bb _malloc 46 API calls 85756->85757 85758 432174 85757->85758 85761 432189 85758->85761 85764 4320f8 46 API calls _free 85758->85764 85760 432198 85760->85732 85761->85732 85762->85739 85763->85743 85764->85760 85765->85060 85766->85062 85767->85081 85768->85081 85769->85081 85770->85072 85771->85081 85772->85081 85773->85086 85774->85094 85775->85096 85776->85096 85826 410160 85777->85826 85779 41012f GetFullPathNameW 85780 410147 moneypunct 85779->85780 85780->84916 85782 4102cb SHGetDesktopFolder 85781->85782 85785 410333 _wcsncpy 85781->85785 85783 4102e0 _wcsncpy 85782->85783 85782->85785 85784 41031c SHGetPathFromIDListW 85783->85784 85783->85785 85784->85785 85785->84919 85787 4101bb 85786->85787 85789 425f4a 85786->85789 85788 410160 52 API calls 85787->85788 85790 4101c7 85788->85790 85791 4114ab __wcsicoll 58 API calls 85789->85791 85794 425f6e 85789->85794 85830 410200 52 API calls 2 library calls 85790->85830 85791->85789 85793 4101d6 85831 410200 52 API calls 2 library calls 85793->85831 85794->84921 85796 4101e9 85796->84921 85798 40f760 126 API calls 85797->85798 85799 40f584 85798->85799 85800 429335 85799->85800 85801 40f58c 85799->85801 85802 4528bd 118 API calls 85800->85802 85803 40f598 85801->85803 85804 429358 85801->85804 85805 42934b 85802->85805 85856 4033c0 113 API calls 7 library calls 85803->85856 85857 434034 86 API calls _wprintf 85804->85857 85808 429373 85805->85808 85809 42934f 85805->85809 85813 4115d7 52 API calls 85808->85813 85812 431e58 82 API calls 85809->85812 85810 429369 85810->85808 85811 40f5b4 85811->84917 85812->85804 85825 4293c5 moneypunct 85813->85825 85814 42959c 85815 413748 _free 46 API calls 85814->85815 85816 4295a5 85815->85816 85817 431e58 82 API calls 85816->85817 85818 4295b1 85817->85818 85822 401b10 52 API calls 85822->85825 85825->85814 85825->85822 85832 444af8 85825->85832 85835 44b41c 85825->85835 85842 402780 85825->85842 85850 4022d0 85825->85850 85858 44c7dd 64 API calls 3 library calls 85825->85858 85827 410167 _wcslen 85826->85827 85828 4115d7 52 API calls 85827->85828 85829 41017e _wcscpy 85828->85829 85829->85779 85830->85793 85831->85796 85833 4115d7 52 API calls 85832->85833 85834 444b27 _memmove 85833->85834 85834->85825 85836 44b429 85835->85836 85837 4115d7 52 API calls 85836->85837 85838 44b440 85837->85838 85839 44b45e 85838->85839 85840 401b10 52 API calls 85838->85840 85839->85825 85841 44b453 85840->85841 85841->85825 85843 402827 85842->85843 85848 402790 moneypunct _memmove 85842->85848 85845 4115d7 52 API calls 85843->85845 85844 4115d7 52 API calls 85846 402797 85844->85846 85845->85848 85847 4115d7 52 API calls 85846->85847 85849 4027bd 85846->85849 85847->85849 85848->85844 85849->85825 85851 4022e0 85850->85851 85853 40239d 85850->85853 85852 4115d7 52 API calls 85851->85852 85851->85853 85854 402320 moneypunct 85851->85854 85852->85854 85853->85825 85854->85853 85855 4115d7 52 API calls 85854->85855 85855->85854 85856->85811 85857->85810 85858->85825 85860 402539 moneypunct 85859->85860 85861 402417 85859->85861 85860->84925 85861->85860 85862 4115d7 52 API calls 85861->85862 85863 402443 85862->85863 85864 4115d7 52 API calls 85863->85864 85866 4024b4 85864->85866 85866->85860 85867 4022d0 52 API calls 85866->85867 85888 402880 95 API calls 2 library calls 85866->85888 85867->85866 85872 401566 85868->85872 85869 401794 85889 40e9a0 90 API calls 85869->85889 85872->85869 85873 4010a0 52 API calls 85872->85873 85874 40167a 85872->85874 85873->85872 85875 4017c0 85874->85875 85890 45e737 90 API calls 3 library calls 85874->85890 85875->84927 85877 40bc70 52 API calls 85876->85877 85886 40d451 85877->85886 85878 40d50f 85893 410600 52 API calls 85878->85893 85880 427c01 85894 45e737 90 API calls 3 library calls 85880->85894 85881 40e0a0 52 API calls 85881->85886 85883 401b10 52 API calls 85883->85886 85884 40d519 85884->84930 85886->85878 85886->85880 85886->85881 85886->85883 85886->85884 85891 40f310 53 API calls 85886->85891 85892 40d860 91 API calls 85886->85892 85888->85866 85889->85874 85890->85875 85891->85886 85892->85886 85893->85884 85894->85884 85895->84943 85896->84944 85898 42c5fe 85897->85898 85913 4091c6 85897->85913 85899 40bc70 52 API calls 85898->85899 85898->85913 85900 42c64e InterlockedIncrement 85899->85900 85901 42c665 85900->85901 85906 42c697 85900->85906 85903 42c672 InterlockedDecrement Sleep InterlockedIncrement 85901->85903 85901->85906 85902 42c737 InterlockedDecrement 85904 42c74a 85902->85904 85903->85901 85903->85906 85907 408f40 VariantClear 85904->85907 85905 42c731 85905->85902 85906->85902 85906->85905 86181 408e80 85906->86181 85909 42c752 85907->85909 86190 410c60 VariantClear moneypunct 85909->86190 85913->85006 85914 42c6db 85915 402160 52 API calls 85914->85915 85916 42c6e5 85915->85916 86186 45340c 85 API calls 85916->86186 85918 42c6f1 86187 40d200 52 API calls 2 library calls 85918->86187 85920 42c6fb 86188 465124 53 API calls 85920->86188 85922 42c715 85923 42c76a 85922->85923 85924 42c719 85922->85924 85925 401b10 52 API calls 85923->85925 86189 46fe32 VariantClear 85924->86189 85927 42c77e 85925->85927 85928 401980 53 API calls 85927->85928 85934 42c796 85928->85934 85929 42c812 86192 46fe32 VariantClear 85929->86192 85931 42c82a InterlockedDecrement 86193 46ff07 54 API calls 85931->86193 85933 42c864 86194 45e737 90 API calls 3 library calls 85933->86194 85934->85929 85934->85933 86191 40ba10 52 API calls 2 library calls 85934->86191 85935 42c849 85937 42c9ec 85935->85937 85944 408f40 VariantClear 85935->85944 85947 402780 52 API calls 85935->85947 85952 401980 53 API calls 85935->85952 86196 40a780 85935->86196 86237 47d33e 331 API calls 85937->86237 85940 42c9fe 86238 46feb1 VariantClear VariantClear 85940->86238 85942 42ca08 85945 401b10 52 API calls 85942->85945 85943 42c874 85946 408f40 VariantClear 85943->85946 85954 42ca59 85943->85954 85944->85935 85948 42ca15 85945->85948 85949 42c891 85946->85949 85947->85935 85950 40c2c0 52 API calls 85948->85950 86195 410c60 VariantClear moneypunct 85949->86195 85950->85943 85952->85935 85954->85954 85956 40afc4 85955->85956 85957 40b156 85955->85957 85959 40afd5 85956->85959 85961 42d1e3 85956->85961 86248 45e737 90 API calls 3 library calls 85957->86248 85964 40a780 194 API calls 85959->85964 85977 40b11a moneypunct 85959->85977 86249 45e737 90 API calls 3 library calls 85961->86249 85962 42d1f8 85968 408f40 VariantClear 85962->85968 85963 40b143 85963->85006 85966 40b00a 85964->85966 85966->85962 85969 40b012 85966->85969 85967 42d4db 85967->85967 85968->85963 85970 40b04a 85969->85970 85971 42d231 VariantClear 85969->85971 85972 40b094 moneypunct 85969->85972 85980 40b05c moneypunct 85970->85980 86250 40e270 VariantClear moneypunct 85970->86250 85971->85980 85973 40b108 85972->85973 85976 42d425 moneypunct 85972->85976 85973->85977 86251 40e270 VariantClear moneypunct 85973->86251 85974 42d45a VariantClear 85974->85977 85976->85974 85976->85977 85977->85963 86252 45e737 90 API calls 3 library calls 85977->86252 85978 4115d7 52 API calls 85978->85972 85980->85972 85980->85978 85982 40900d 85981->85982 85983 408fff 85981->85983 85986 42c3f6 85982->85986 85988 42c44a 85982->85988 85989 40a780 194 API calls 85982->85989 85992 42c47b 85982->85992 85994 42c4cb 85982->85994 85995 42c564 85982->85995 85998 42c548 85982->85998 86001 409112 85982->86001 86003 42c528 85982->86003 86005 4090df 85982->86005 86006 4090ea 85982->86006 86015 4090f2 moneypunct 85982->86015 86255 4534e3 52 API calls 85982->86255 86257 40c4e0 194 API calls 85982->86257 86253 403ea0 52 API calls __cinit 85983->86253 86256 45e737 90 API calls 3 library calls 85986->86256 86258 45e737 90 API calls 3 library calls 85988->86258 85989->85982 86259 451b42 61 API calls 85992->86259 86261 47faae 233 API calls 85994->86261 85999 408f40 VariantClear 85995->85999 85996 42c491 85996->86015 86260 45e737 90 API calls 3 library calls 85996->86260 86264 45e737 90 API calls 3 library calls 85998->86264 85999->86015 86000 42c4da 86000->86015 86262 45e737 90 API calls 3 library calls 86000->86262 86001->85998 86008 40912b 86001->86008 86263 45e737 90 API calls 3 library calls 86003->86263 86005->86006 86010 408e80 VariantClear 86005->86010 86011 408f40 VariantClear 86006->86011 86008->86015 86254 403e10 53 API calls 86008->86254 86010->86006 86011->86015 86013 40914b 86014 408f40 VariantClear 86013->86014 86014->86015 86015->85006 86265 408d90 86016->86265 86018 429778 86294 410c60 VariantClear moneypunct 86018->86294 86020 429780 86021 408cf9 86021->86018 86022 42976c 86021->86022 86024 408d2d 86021->86024 86293 45e737 90 API calls 3 library calls 86022->86293 86281 403d10 86024->86281 86027 408d71 moneypunct 86027->85006 86028 408f40 VariantClear 86029 408d45 moneypunct 86028->86029 86029->86027 86029->86028 86031 4096c6 _wcslen 86030->86031 86032 4115d7 52 API calls 86031->86032 86093 40a70c moneypunct _memmove 86031->86093 86033 4096fa _memmove 86032->86033 86035 4115d7 52 API calls 86033->86035 86034 4013a0 52 API calls 86036 4297aa 86034->86036 86037 40971b 86035->86037 86039 4115d7 52 API calls 86036->86039 86038 409749 CharUpperBuffW 86037->86038 86041 40976a moneypunct 86037->86041 86037->86093 86038->86041 86080 4297d1 _memmove 86039->86080 86088 4097e5 moneypunct 86041->86088 86574 47dcbb 196 API calls 86041->86574 86043 408f40 VariantClear 86044 42ae92 86043->86044 86601 410c60 VariantClear moneypunct 86044->86601 86046 42aea4 86047 409aa2 86049 4115d7 52 API calls 86047->86049 86053 409afe 86047->86053 86047->86080 86048 40a689 86050 4115d7 52 API calls 86048->86050 86049->86053 86066 40a6af moneypunct _memmove 86050->86066 86051 409b2a 86055 429dbe 86051->86055 86123 409b4d moneypunct _memmove 86051->86123 86582 40b400 VariantClear VariantClear moneypunct 86051->86582 86052 40c2c0 52 API calls 86052->86088 86053->86051 86054 4115d7 52 API calls 86053->86054 86056 429d31 86054->86056 86061 429dd3 86055->86061 86583 40b400 VariantClear VariantClear moneypunct 86055->86583 86060 429d42 86056->86060 86579 44a801 52 API calls 86056->86579 86057 429a46 VariantClear 86057->86088 86058 409fd2 86063 40a045 86058->86063 86117 42a3f5 86058->86117 86071 40e0a0 52 API calls 86060->86071 86061->86123 86584 40e1c0 VariantClear moneypunct 86061->86584 86068 4115d7 52 API calls 86063->86068 86064 408f40 VariantClear 86064->86088 86073 4115d7 52 API calls 86066->86073 86074 40a04c 86068->86074 86069 4115d7 52 API calls 86069->86088 86075 429d57 86071->86075 86073->86093 86079 40a0a7 86074->86079 86083 4091e0 317 API calls 86074->86083 86580 453443 52 API calls 86075->86580 86077 42a42f 86588 45e737 90 API calls 3 library calls 86077->86588 86103 40a0af 86079->86103 86589 40c790 VariantClear moneypunct 86079->86589 86600 45e737 90 API calls 3 library calls 86080->86600 86081 4299d9 86085 408f40 VariantClear 86081->86085 86083->86079 86084 429abd 86084->85006 86089 4299e2 86085->86089 86086 429d88 86581 453443 52 API calls 86086->86581 86088->86047 86088->86048 86088->86052 86088->86057 86088->86064 86088->86066 86088->86069 86088->86080 86088->86081 86088->86084 86095 40a780 194 API calls 86088->86095 86097 42a452 86088->86097 86575 40c4e0 194 API calls 86088->86575 86577 40ba10 52 API calls 2 library calls 86088->86577 86578 40e270 VariantClear moneypunct 86088->86578 86576 410c60 VariantClear moneypunct 86089->86576 86093->86034 86095->86088 86096 402780 52 API calls 86096->86123 86097->86043 86098 44a801 52 API calls 86098->86123 86100 408f40 VariantClear 86131 40a162 moneypunct _memmove 86100->86131 86101 41130a 51 API calls __cinit 86101->86123 86102 4115d7 52 API calls 86102->86123 86104 40a11b 86103->86104 86106 42a4b4 VariantClear 86103->86106 86103->86131 86111 40a12d moneypunct 86104->86111 86590 40e270 VariantClear moneypunct 86104->86590 86105 40a780 194 API calls 86105->86123 86106->86111 86107 401980 53 API calls 86107->86123 86108 408e80 VariantClear 86108->86123 86110 4115d7 52 API calls 86110->86131 86111->86110 86111->86131 86112 408e80 VariantClear 86112->86131 86114 42a74d VariantClear 86114->86131 86115 40a368 86116 42aad4 86115->86116 86125 40a397 86115->86125 86593 46fe90 VariantClear VariantClear moneypunct 86116->86593 86587 47390f VariantClear 86117->86587 86118 42a886 VariantClear 86118->86131 86119 42a7e4 VariantClear 86119->86131 86120 40a3ce 86135 40a3d9 moneypunct 86120->86135 86594 40b400 VariantClear VariantClear moneypunct 86120->86594 86122 409c95 86122->85006 86123->86058 86123->86077 86123->86093 86123->86096 86123->86098 86123->86101 86123->86102 86123->86105 86123->86107 86123->86108 86123->86117 86123->86122 86585 45f508 52 API calls 86123->86585 86586 403e10 53 API calls 86123->86586 86124 40e270 VariantClear 86124->86131 86125->86120 86150 40a42c moneypunct 86125->86150 86573 40b400 VariantClear VariantClear moneypunct 86125->86573 86128 4115d7 52 API calls 86128->86131 86129 42abaf 86133 42abd4 VariantClear 86129->86133 86141 40a4ee moneypunct 86129->86141 86130 4115d7 52 API calls 86134 42a5a6 VariantInit VariantCopy 86130->86134 86131->86100 86131->86112 86131->86114 86131->86115 86131->86116 86131->86118 86131->86119 86131->86124 86131->86128 86131->86130 86591 470870 52 API calls 86131->86591 86592 44ccf1 VariantClear moneypunct 86131->86592 86132 40a4dc 86132->86141 86596 40e270 VariantClear moneypunct 86132->86596 86133->86141 86134->86131 86137 42a5c6 VariantClear 86134->86137 86136 40a41a 86135->86136 86143 42ab44 VariantClear 86135->86143 86135->86150 86136->86150 86595 40e270 VariantClear moneypunct 86136->86595 86137->86131 86138 42ac4f 86144 42ac79 VariantClear 86138->86144 86148 40a546 moneypunct 86138->86148 86141->86138 86142 40a534 86141->86142 86142->86148 86597 40e270 VariantClear moneypunct 86142->86597 86143->86150 86144->86148 86145 42ad28 86151 42ad4e VariantClear 86145->86151 86156 40a583 moneypunct 86145->86156 86148->86145 86149 40a571 86148->86149 86149->86156 86598 40e270 VariantClear moneypunct 86149->86598 86150->86129 86150->86132 86151->86156 86153 40a650 moneypunct 86153->85006 86154 42ae0e VariantClear 86154->86156 86156->86153 86156->86154 86599 40e270 VariantClear moneypunct 86156->86599 86157->85006 86158->85006 86159->85006 86160->84954 86161->84959 86162->85006 86163->85006 86164->85006 86165->85006 86166->85001 86167->85001 86168->85001 86169->85001 86170->85001 86171->85001 86172->85001 86174 403cdf 86173->86174 86175 408f40 VariantClear 86174->86175 86176 403ce7 86175->86176 86176->84999 86177->85001 86178->85001 86179->85006 86180->84951 86182 408e88 86181->86182 86184 408e94 86181->86184 86183 408f40 VariantClear 86182->86183 86183->86184 86185 45340c 85 API calls 86184->86185 86185->85914 86186->85918 86187->85920 86188->85922 86189->85905 86190->85913 86191->85934 86192->85931 86193->85935 86194->85943 86195->85913 86197 40a7a6 86196->86197 86198 40ae8c 86196->86198 86200 4115d7 52 API calls 86197->86200 86239 41130a 51 API calls __cinit 86198->86239 86222 40a7c6 moneypunct _memmove 86200->86222 86201 40a86d 86203 40abd1 86201->86203 86219 40a878 moneypunct 86201->86219 86202 408e80 VariantClear 86202->86222 86244 45e737 90 API calls 3 library calls 86203->86244 86205 40bc10 53 API calls 86205->86222 86206 401b10 52 API calls 86206->86222 86207 4115d7 52 API calls 86207->86222 86208 40b5f0 89 API calls 86208->86222 86209 42b791 VariantClear 86209->86222 86210 42ba2d VariantClear 86210->86222 86211 408f40 VariantClear 86211->86219 86212 42b459 VariantClear 86212->86222 86213 40a884 moneypunct 86213->85935 86214 408cc0 187 API calls 86214->86222 86215 42b6f6 VariantClear 86215->86222 86217 42bc5b 86217->85935 86218 42bb6a 86247 44b92d VariantClear 86218->86247 86219->86211 86219->86213 86220 40e270 VariantClear 86220->86222 86221 42bbf5 86245 45e737 90 API calls 3 library calls 86221->86245 86222->86201 86222->86202 86222->86203 86222->86205 86222->86206 86222->86207 86222->86208 86222->86209 86222->86210 86222->86212 86222->86214 86222->86215 86222->86218 86222->86220 86222->86221 86224 4115d7 52 API calls 86222->86224 86225 408f40 VariantClear 86222->86225 86231 42bc37 86222->86231 86236 4530c9 VariantClear 86222->86236 86240 45308a 53 API calls 86222->86240 86241 470870 52 API calls 86222->86241 86242 457f66 87 API calls __write_nolock 86222->86242 86243 472f47 127 API calls 86222->86243 86226 42b5b3 VariantInit VariantCopy 86224->86226 86225->86222 86226->86222 86229 42b5d7 VariantClear 86226->86229 86229->86222 86246 45e737 90 API calls 3 library calls 86231->86246 86234 42bc48 86234->86218 86235 408f40 VariantClear 86234->86235 86235->86218 86236->86222 86237->85940 86238->85942 86239->86222 86240->86222 86241->86222 86242->86222 86243->86222 86244->86218 86245->86218 86246->86234 86247->86217 86248->85961 86249->85962 86250->85980 86251->85977 86252->85967 86253->85982 86254->86013 86255->85982 86256->86015 86257->85982 86258->86015 86259->85996 86260->86015 86261->86000 86262->86015 86263->86015 86264->85995 86266 4289d2 86265->86266 86267 408db3 86265->86267 86297 45e737 90 API calls 3 library calls 86266->86297 86295 40bec0 90 API calls 86267->86295 86270 4289e5 86298 45e737 90 API calls 3 library calls 86270->86298 86271 408e5a 86271->86021 86274 428a05 86276 408f40 VariantClear 86274->86276 86275 408dc9 86275->86270 86275->86271 86275->86274 86277 40a780 194 API calls 86275->86277 86278 408e64 86275->86278 86280 408f40 VariantClear 86275->86280 86296 40ba10 52 API calls 2 library calls 86275->86296 86276->86271 86277->86275 86279 408f40 VariantClear 86278->86279 86279->86271 86280->86275 86282 408f40 VariantClear 86281->86282 86283 403d20 86282->86283 86284 403cd0 VariantClear 86283->86284 86285 403d4d 86284->86285 86288 4013c0 52 API calls 86285->86288 86299 467897 86285->86299 86343 4755ad 86285->86343 86346 46e91c 86285->86346 86349 45e17d 86285->86349 86359 40de10 86285->86359 86286 403d76 86286->86018 86286->86029 86288->86286 86293->86018 86294->86020 86295->86275 86296->86275 86297->86270 86298->86274 86300 4678bb 86299->86300 86332 467954 86300->86332 86380 45340c 85 API calls 86300->86380 86301 4115d7 52 API calls 86302 467989 86301->86302 86304 467995 86302->86304 86384 40da60 53 API calls 86302->86384 86364 4533eb 86304->86364 86305 4678f6 86307 413a0e __wsplitpath 46 API calls 86305->86307 86309 4678fc 86307->86309 86311 401b10 52 API calls 86309->86311 86313 46790c 86311->86313 86381 40d200 52 API calls 2 library calls 86313->86381 86316 4679c7 GetLastError 86319 403cd0 VariantClear 86316->86319 86317 467a05 86320 467a2c 86317->86320 86321 467a4b 86317->86321 86318 467917 86318->86332 86382 4339fa GetFileAttributesW FindFirstFileW FindClose 86318->86382 86322 4679dc 86319->86322 86325 4115d7 52 API calls 86320->86325 86326 4115d7 52 API calls 86321->86326 86327 4679e6 86322->86327 86385 44ae3e 86322->86385 86324 467928 86330 46792f 86324->86330 86324->86332 86334 467a31 86325->86334 86328 467a49 86326->86328 86331 408f40 VariantClear 86327->86331 86338 408f40 VariantClear 86328->86338 86383 4335cd 56 API calls 3 library calls 86330->86383 86332->86301 86333 467964 86332->86333 86333->86286 86339 467939 86339->86332 86341 408f40 VariantClear 86339->86341 86342 467947 86341->86342 86342->86332 86412 475077 86343->86412 86345 4755c0 86345->86286 86513 46e785 86346->86513 86348 46e92f 86348->86286 86350 45e198 86349->86350 86351 45e19c 86350->86351 86352 45e1b8 86350->86352 86353 408f40 VariantClear 86351->86353 86354 45e1cc 86352->86354 86355 45e1db FindClose 86352->86355 86356 45e1a4 86353->86356 86357 44ae3e CloseHandle 86354->86357 86358 45e1d9 moneypunct 86354->86358 86355->86358 86356->86286 86357->86358 86358->86286 86360 4115d7 52 API calls 86359->86360 86361 40de23 86360->86361 86362 40da20 CloseHandle 86361->86362 86363 40de2e 86362->86363 86363->86286 86365 453404 86364->86365 86366 4533f8 86364->86366 86368 40de40 86365->86368 86366->86365 86389 4531b1 85 API calls 5 library calls 86366->86389 86390 40da20 86368->86390 86370 40de4e 86394 40f110 86370->86394 86373 4264fa 86375 40de84 86403 40e080 SetFilePointerEx SetFilePointerEx 86375->86403 86377 40de8b 86404 40f160 SetFilePointerEx SetFilePointerEx WriteFile 86377->86404 86379 40de90 86379->86316 86379->86317 86380->86305 86381->86318 86382->86324 86383->86339 86384->86304 86386 44ae4b moneypunct 86385->86386 86406 443fdf 86385->86406 86386->86327 86389->86365 86391 40da37 86390->86391 86392 40da29 86390->86392 86391->86392 86393 40da3c CloseHandle 86391->86393 86392->86370 86393->86370 86395 40f125 CreateFileW 86394->86395 86396 42630c 86394->86396 86398 40de74 86395->86398 86397 426311 CreateFileW 86396->86397 86396->86398 86397->86398 86399 426337 86397->86399 86398->86373 86402 40dea0 55 API calls moneypunct 86398->86402 86405 40df90 SetFilePointerEx SetFilePointerEx 86399->86405 86401 426342 86401->86398 86402->86375 86403->86377 86404->86379 86405->86401 86413 4533eb 85 API calls 86412->86413 86414 4750b8 86413->86414 86415 4750ee 86414->86415 86416 475129 86414->86416 86418 408f40 VariantClear 86415->86418 86465 4646e0 86416->86465 86423 4750f5 86418->86423 86419 47515e 86420 475162 86419->86420 86458 47518e 86419->86458 86421 408f40 VariantClear 86420->86421 86452 475169 86421->86452 86422 475357 86424 475365 86422->86424 86425 4754ea 86422->86425 86423->86345 86499 44b3ac 57 API calls 86424->86499 86505 464812 92 API calls 86425->86505 86429 4754fc 86430 475374 86429->86430 86432 475508 86429->86432 86478 430d31 86430->86478 86431 4533eb 85 API calls 86431->86458 86433 408f40 VariantClear 86432->86433 86436 47550f 86433->86436 86436->86452 86437 475388 86485 4577e9 86437->86485 86439 47539e 86493 410cfc 86439->86493 86440 475480 86442 408f40 VariantClear 86440->86442 86442->86452 86450 4754b5 86451 408f40 VariantClear 86450->86451 86451->86452 86452->86345 86458->86422 86458->86431 86458->86440 86458->86450 86458->86458 86497 436299 52 API calls 2 library calls 86458->86497 86498 463ad5 64 API calls __wcsicoll 86458->86498 86508 4536f7 53 API calls 86465->86508 86467 4646fc 86509 4426cd 59 API calls _wcslen 86467->86509 86469 464711 86471 40bc70 52 API calls 86469->86471 86477 46474b 86469->86477 86472 46472c 86471->86472 86510 461465 52 API calls _memmove 86472->86510 86474 464741 86475 40c600 52 API calls 86474->86475 86475->86477 86476 464793 86476->86419 86477->86476 86511 463ad5 64 API calls __wcsicoll 86477->86511 86479 430db2 86478->86479 86480 430d54 86478->86480 86479->86437 86481 4115d7 52 API calls 86480->86481 86482 430d74 86481->86482 86483 430da9 86482->86483 86484 4115d7 52 API calls 86482->86484 86483->86437 86484->86482 86486 457a84 86485->86486 86491 45780c _strcat moneypunct _wcslen _wcscpy 86485->86491 86486->86439 86487 45340c 85 API calls 86487->86491 86488 443006 57 API calls 86488->86491 86490 4135bb 46 API calls _malloc 86490->86491 86491->86486 86491->86487 86491->86488 86491->86490 86492 40f6f0 54 API calls 86491->86492 86512 44b3ac 57 API calls 86491->86512 86492->86491 86497->86458 86498->86458 86499->86430 86505->86429 86508->86467 86509->86469 86510->86474 86511->86476 86512->86491 86514 46e7a2 86513->86514 86515 4115d7 52 API calls 86514->86515 86517 46e802 86514->86517 86516 46e7ad 86515->86516 86519 46e7b9 86516->86519 86561 40da60 53 API calls 86516->86561 86518 46e7e5 86517->86518 86526 46e82f 86517->86526 86521 408f40 VariantClear 86518->86521 86522 4533eb 85 API calls 86519->86522 86523 46e7ea 86521->86523 86524 46e7ca 86522->86524 86523->86348 86527 40de40 60 API calls 86524->86527 86525 46e8b5 86554 4680ed 86525->86554 86526->86525 86528 46e845 86526->86528 86529 46e7d7 86527->86529 86532 4533eb 85 API calls 86528->86532 86529->86526 86533 46e7db 86529->86533 86531 46e8bb 86558 443fbe 86531->86558 86534 46e84b 86532->86534 86533->86518 86536 44ae3e CloseHandle 86533->86536 86535 46e87a 86534->86535 86539 46e883 86534->86539 86562 4689f4 59 API calls 86535->86562 86536->86518 86540 4013c0 52 API calls 86539->86540 86542 46e88f 86540->86542 86544 40e0a0 52 API calls 86542->86544 86543 408f40 VariantClear 86552 46e881 86543->86552 86545 46e899 86544->86545 86563 40d200 52 API calls 2 library calls 86545->86563 86547 46e911 86547->86348 86548 46e8a5 86564 4689f4 59 API calls 86548->86564 86549 40da20 CloseHandle 86551 46e903 86549->86551 86553 44ae3e CloseHandle 86551->86553 86552->86547 86552->86549 86553->86547 86555 468100 86554->86555 86556 4680fa 86554->86556 86555->86531 86565 467ac4 55 API calls 2 library calls 86556->86565 86566 443e36 86558->86566 86560 443fd3 86560->86543 86560->86552 86561->86519 86562->86552 86563->86548 86564->86552 86565->86555 86569 443e19 86566->86569 86570 443e26 86569->86570 86571 443e32 WriteFile 86569->86571 86572 443db4 SetFilePointerEx SetFilePointerEx 86570->86572 86571->86560 86572->86571 86573->86120 86574->86041 86575->86088 86576->86153 86577->86088 86578->86088 86579->86060 86580->86086 86581->86051 86582->86055 86583->86061 86584->86123 86585->86123 86586->86123 86587->86077 86588->86097 86589->86079 86590->86111 86591->86131 86592->86131 86593->86120 86594->86135 86595->86150 86596->86141 86597->86148 86598->86156 86599->86156 86600->86097 86601->86046 86602 42d154 86606 480a8d 86602->86606 86604 42d161 86605 480a8d 194 API calls 86604->86605 86605->86604 86607 480ae4 86606->86607 86608 480b26 86606->86608 86609 480aeb 86607->86609 86610 480b15 86607->86610 86611 40bc70 52 API calls 86608->86611 86612 480aee 86609->86612 86613 480b04 86609->86613 86639 4805bf 194 API calls 86610->86639 86635 480b2e 86611->86635 86612->86608 86615 480af3 86612->86615 86638 47fea2 194 API calls __itow_s 86613->86638 86637 47f135 194 API calls 86615->86637 86617 40e0a0 52 API calls 86617->86635 86620 408f40 VariantClear 86621 481156 86620->86621 86623 408f40 VariantClear 86621->86623 86622 480aff 86622->86620 86624 48115e 86623->86624 86624->86604 86625 480ff5 86645 45e737 90 API calls 3 library calls 86625->86645 86626 401980 53 API calls 86626->86635 86628 40c2c0 52 API calls 86628->86635 86629 40e710 53 API calls 86629->86635 86630 40a780 194 API calls 86630->86635 86632 408e80 VariantClear 86632->86635 86635->86617 86635->86622 86635->86625 86635->86626 86635->86628 86635->86629 86635->86630 86635->86632 86640 45377f 52 API calls 86635->86640 86641 45e951 53 API calls 86635->86641 86642 40e830 53 API calls 86635->86642 86643 47925f 53 API calls 86635->86643 86644 47fcff 194 API calls 86635->86644 86637->86622 86638->86622 86639->86622 86640->86635 86641->86635 86642->86635 86643->86635 86644->86635 86645->86622 86646 42b14b 86653 40bc10 86646->86653 86648 42b159 86649 4096a0 331 API calls 86648->86649 86650 42b177 86649->86650 86664 44b92d VariantClear 86650->86664 86652 42bc5b 86654 40bc24 86653->86654 86655 40bc17 86653->86655 86657 40bc2a 86654->86657 86658 40bc3c 86654->86658 86656 408e80 VariantClear 86655->86656 86659 40bc1f 86656->86659 86660 408e80 VariantClear 86657->86660 86661 4115d7 52 API calls 86658->86661 86659->86648 86662 40bc33 86660->86662 86663 40bc43 86661->86663 86662->86648 86663->86648 86664->86652 86665 425b2b 86670 40f000 86665->86670 86669 425b3a 86671 4115d7 52 API calls 86670->86671 86672 40f007 86671->86672 86673 4276ea 86672->86673 86679 40f030 86672->86679 86678 41130a 51 API calls __cinit 86678->86669 86680 40f039 86679->86680 86681 40f01a 86679->86681 86709 41130a 51 API calls __cinit 86680->86709 86683 40e500 86681->86683 86684 40bc70 52 API calls 86683->86684 86685 40e515 GetVersionExW 86684->86685 86686 402160 52 API calls 86685->86686 86687 40e557 86686->86687 86710 40e660 86687->86710 86693 427674 86697 4276c6 GetSystemInfo 86693->86697 86695 40e5e0 86698 4276d5 GetSystemInfo 86695->86698 86724 40efd0 86695->86724 86696 40e5cd GetCurrentProcess 86731 40ef20 LoadLibraryA GetProcAddress 86696->86731 86697->86698 86702 40e629 86728 40ef90 86702->86728 86705 40e641 FreeLibrary 86706 40e644 86705->86706 86707 40e653 FreeLibrary 86706->86707 86708 40e656 86706->86708 86707->86708 86708->86678 86709->86681 86711 40e667 86710->86711 86712 42761d 86711->86712 86713 40c600 52 API calls 86711->86713 86714 40e55c 86713->86714 86715 40e680 86714->86715 86716 40e687 86715->86716 86717 427616 86716->86717 86718 40c600 52 API calls 86716->86718 86719 40e566 86718->86719 86719->86693 86720 40ef60 86719->86720 86721 40e5c8 86720->86721 86722 40ef66 LoadLibraryA 86720->86722 86721->86695 86721->86696 86722->86721 86723 40ef77 GetProcAddress 86722->86723 86723->86721 86725 40e620 86724->86725 86726 40efd6 LoadLibraryA 86724->86726 86725->86697 86725->86702 86726->86725 86727 40efe7 GetProcAddress 86726->86727 86727->86725 86732 40efb0 LoadLibraryA GetProcAddress 86728->86732 86730 40e632 GetNativeSystemInfo 86730->86705 86730->86706 86731->86695 86732->86730 86733 425b5e 86738 40c7f0 86733->86738 86737 425b6d 86773 40db10 52 API calls 86738->86773 86740 40c82a 86774 410ab0 6 API calls 86740->86774 86742 40c86d 86743 40bc70 52 API calls 86742->86743 86744 40c877 86743->86744 86745 40bc70 52 API calls 86744->86745 86746 40c881 86745->86746 86747 40bc70 52 API calls 86746->86747 86748 40c88b 86747->86748 86749 40bc70 52 API calls 86748->86749 86750 40c8d1 86749->86750 86751 40bc70 52 API calls 86750->86751 86752 40c991 86751->86752 86775 40d2c0 52 API calls 86752->86775 86754 40c99b 86776 40d0d0 53 API calls 86754->86776 86756 40c9c1 86757 40bc70 52 API calls 86756->86757 86758 40c9cb 86757->86758 86777 40e310 53 API calls 86758->86777 86760 40ca28 86761 408f40 VariantClear 86760->86761 86762 40ca30 86761->86762 86763 408f40 VariantClear 86762->86763 86764 40ca38 GetStdHandle 86763->86764 86765 429630 86764->86765 86766 40ca87 86764->86766 86765->86766 86767 429639 86765->86767 86772 41130a 51 API calls __cinit 86766->86772 86778 4432c0 57 API calls 86767->86778 86769 429641 86779 44b6ab CreateThread 86769->86779 86771 42964f CloseHandle 86771->86766 86772->86737 86773->86740 86774->86742 86775->86754 86776->86756 86777->86760 86778->86769 86779->86771 86780 44b5cb 58 API calls 86779->86780 86781 425b6f 86786 40dc90 86781->86786 86785 425b7e 86787 40bc70 52 API calls 86786->86787 86788 40dd03 86787->86788 86795 40f210 86788->86795 86790 426a97 86792 40dd96 86792->86790 86793 40ddb7 86792->86793 86798 40dc00 52 API calls 2 library calls 86792->86798 86794 41130a 51 API calls __cinit 86793->86794 86794->86785 86799 40f250 RegOpenKeyExW 86795->86799 86797 40f230 86797->86792 86798->86792 86800 425e17 86799->86800 86801 40f275 RegQueryValueExW 86799->86801 86800->86797 86802 40f2c3 RegCloseKey 86801->86802 86803 40f298 86801->86803 86802->86797 86804 40f2a9 RegCloseKey 86803->86804 86805 425e1d 86803->86805 86804->86797 86806 40f5820 86807 40f3470 GetPEB 86806->86807 86808 40f590c 86807->86808 86820 40f5710 86808->86820 86821 40f5719 Sleep 86820->86821 86822 40f5727 86821->86822
            APIs
            • _wcslen.LIBCMT ref: 004096C1
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • _memmove.LIBCMT ref: 0040970C
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
              • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
            • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
            • _memmove.LIBCMT ref: 00409D96
            • _memmove.LIBCMT ref: 0040A6C4
            • _memmove.LIBCMT ref: 004297E5
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
            • String ID:
            • API String ID: 2383988440-0
            • Opcode ID: c80423eaff0593ad1daf6fa7b1063788de4f89018b33fd36f38930ce8cd7e028
            • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
            • Opcode Fuzzy Hash: c80423eaff0593ad1daf6fa7b1063788de4f89018b33fd36f38930ce8cd7e028
            • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

            Control-flow Graph

            APIs
            • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
              • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
              • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
              • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
              • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
              • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
              • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
            • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
            • GetFullPathNameW.KERNEL32(004A7F6C,00000104,?,004A7F50,004A7F54), ref: 0040D625
              • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
            • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
            • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
            • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
            • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
            • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
              • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
              • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
              • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
              • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
              • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
              • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
              • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
              • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
              • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
              • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
              • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
              • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
            Strings
            • This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support., xrefs: 0042E1C2
            • runas, xrefs: 0042E2AD, 0042E2DC
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
            • String ID: This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
            • API String ID: 2495805114-3383388033
            • Opcode ID: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
            • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
            • Opcode Fuzzy Hash: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
            • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1904 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 1913 40e582-40e583 1904->1913 1914 427674-427679 1904->1914 1917 40e585-40e596 1913->1917 1918 40e5ba-40e5cb call 40ef60 1913->1918 1915 427683-427686 1914->1915 1916 42767b-427681 1914->1916 1920 427693-427696 1915->1920 1921 427688-427691 1915->1921 1919 4276b4-4276be 1916->1919 1922 427625-427629 1917->1922 1923 40e59c-40e59f 1917->1923 1936 40e5ec-40e60c 1918->1936 1937 40e5cd-40e5e6 GetCurrentProcess call 40ef20 1918->1937 1938 4276c6-4276ca GetSystemInfo 1919->1938 1920->1919 1927 427698-4276a8 1920->1927 1921->1919 1929 427636-427640 1922->1929 1930 42762b-427631 1922->1930 1925 40e5a5-40e5ae 1923->1925 1926 427654-427657 1923->1926 1932 40e5b4 1925->1932 1933 427645-42764f 1925->1933 1926->1918 1931 42765d-42766f 1926->1931 1934 4276b0 1927->1934 1935 4276aa-4276ae 1927->1935 1929->1918 1930->1918 1931->1918 1932->1918 1933->1918 1934->1919 1935->1919 1939 40e612-40e623 call 40efd0 1936->1939 1940 4276d5-4276df GetSystemInfo 1936->1940 1937->1936 1947 40e5e8 1937->1947 1938->1940 1939->1938 1946 40e629-40e63f call 40ef90 GetNativeSystemInfo 1939->1946 1950 40e641-40e642 FreeLibrary 1946->1950 1951 40e644-40e651 1946->1951 1947->1936 1950->1951 1952 40e653-40e654 FreeLibrary 1951->1952 1953 40e656-40e65d 1951->1953 1952->1953
            APIs
            • GetVersionExW.KERNEL32(?), ref: 0040E52A
              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
            • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
            • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
            • FreeLibrary.KERNEL32(?), ref: 0040E642
            • FreeLibrary.KERNEL32(?), ref: 0040E654
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
            • String ID: 0SH
            • API String ID: 3363477735-851180471
            • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
            • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
            • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
            • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
            APIs
            • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
            • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: IsThemeActive$uxtheme.dll
            • API String ID: 2574300362-3542929980
            • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
            • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
            • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
            • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
            APIs
            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
            • Sleep.KERNEL32(0000000A,?), ref: 004094D1
            • TranslateMessage.USER32(?), ref: 00409556
            • DispatchMessageW.USER32(?), ref: 00409561
            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Message$Peek$DispatchSleepTranslate
            • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
            • API String ID: 1762048999-758534266
            • Opcode ID: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
            • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
            • Opcode Fuzzy Hash: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
            • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

            Control-flow Graph

            APIs
            • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • __wcsicoll.LIBCMT ref: 00402007
            • __wcsicoll.LIBCMT ref: 0040201D
            • __wcsicoll.LIBCMT ref: 00402033
              • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
            • __wcsicoll.LIBCMT ref: 00402049
            • _wcscpy.LIBCMT ref: 0040207C
            • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104), ref: 00428B5B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
            • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$CMDLINE$CMDLINERAW
            • API String ID: 3948761352-1609664196
            • Opcode ID: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
            • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
            • Opcode Fuzzy Hash: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
            • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

            Control-flow Graph

            APIs
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
            • __wsplitpath.LIBCMT ref: 0040E41C
              • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
            • _wcsncat.LIBCMT ref: 0040E433
            • __wmakepath.LIBCMT ref: 0040E44F
              • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
              • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
            • _wcscpy.LIBCMT ref: 0040E487
              • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
            • _wcscat.LIBCMT ref: 00427541
            • _wcslen.LIBCMT ref: 00427551
            • _wcslen.LIBCMT ref: 00427562
            • _wcscat.LIBCMT ref: 0042757C
            • _wcsncpy.LIBCMT ref: 004275BC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
            • String ID: Include$\
            • API String ID: 3173733714-3429789819
            • Opcode ID: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
            • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
            • Opcode Fuzzy Hash: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
            • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

            Control-flow Graph

            APIs
            • _fseek.LIBCMT ref: 0045292B
              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
              • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
              • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
            • __fread_nolock.LIBCMT ref: 00452961
            • __fread_nolock.LIBCMT ref: 00452971
            • __fread_nolock.LIBCMT ref: 0045298A
            • __fread_nolock.LIBCMT ref: 004529A5
            • _fseek.LIBCMT ref: 004529BF
            • _malloc.LIBCMT ref: 004529CA
            • _malloc.LIBCMT ref: 004529D6
            • __fread_nolock.LIBCMT ref: 004529E7
            • _free.LIBCMT ref: 00452A17
            • _free.LIBCMT ref: 00452A20
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
            • String ID:
            • API String ID: 1255752989-0
            • Opcode ID: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
            • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
            • Opcode Fuzzy Hash: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
            • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: __fread_nolock$_fseek_wcscpy
            • String ID: FILE
            • API String ID: 3888824918-3121273764
            • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
            • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
            • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
            • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

            Control-flow Graph

            APIs
            • GetSysColorBrush.USER32(0000000F), ref: 004104C3
            • RegisterClassExW.USER32(00000030), ref: 004104ED
            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
            • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
            • LoadIconW.USER32(00400000,000000A9), ref: 00410542
            • ImageList_ReplaceIcon.COMCTL32(00AAFC80,000000FF,00000000), ref: 00410552
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
            • API String ID: 2914291525-1005189915
            • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
            • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
            • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
            • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

            Control-flow Graph

            APIs
            • GetSysColorBrush.USER32(0000000F), ref: 0041039B
            • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
            • LoadIconW.USER32(?,00000063), ref: 004103C0
            • LoadIconW.USER32(?,000000A4), ref: 004103D3
            • LoadIconW.USER32(?,000000A2), ref: 004103E6
            • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
            • RegisterClassExW.USER32(?), ref: 0041045D
              • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
              • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
              • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
              • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
              • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
              • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
              • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(00AAFC80,000000FF,00000000), ref: 00410552
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
            • String ID: #$0$AutoIt v3
            • API String ID: 423443420-4155596026
            • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
            • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
            • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
            • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _malloc
            • String ID: Default
            • API String ID: 1579825452-753088835
            • Opcode ID: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
            • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
            • Opcode Fuzzy Hash: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
            • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1954 40f5c0-40f5cf call 422240 1957 40f5d0-40f5e8 1954->1957 1957->1957 1958 40f5ea-40f613 call 413650 call 410e60 1957->1958 1963 40f614-40f633 call 414d04 1958->1963 1966 40f691 1963->1966 1967 40f635-40f63c 1963->1967 1970 40f696-40f69c 1966->1970 1968 40f660-40f674 call 4150d1 1967->1968 1969 40f63e 1967->1969 1974 40f679-40f67c 1968->1974 1971 40f640 1969->1971 1973 40f642-40f650 1971->1973 1975 40f652-40f655 1973->1975 1976 40f67e-40f68c 1973->1976 1974->1963 1977 40f65b-40f65e 1975->1977 1978 425d1e-425d3e call 4150d1 call 414d04 1975->1978 1979 40f68e-40f68f 1976->1979 1980 40f69f-40f6ad 1976->1980 1977->1968 1977->1971 1991 425d43-425d5f call 414d30 1978->1991 1979->1975 1982 40f6b4-40f6c2 1980->1982 1983 40f6af-40f6b2 1980->1983 1984 425d16 1982->1984 1985 40f6c8-40f6d6 1982->1985 1983->1975 1984->1978 1987 425d05-425d0b 1985->1987 1988 40f6dc-40f6df 1985->1988 1987->1973 1990 425d11 1987->1990 1988->1975 1990->1984 1991->1970
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: __fread_nolock_fseek_memmove_strcat
            • String ID: AU3!$EA06
            • API String ID: 1268643489-2658333250
            • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
            • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
            • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
            • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1994 401100-401111 1995 401113-401119 1994->1995 1996 401179-401180 1994->1996 1997 401144-40114a 1995->1997 1998 40111b-40111e 1995->1998 1996->1995 1999 401182 1996->1999 2001 401184-40118e call 401250 1997->2001 2002 40114c-40114f 1997->2002 1998->1997 2000 401120-401126 1998->2000 2003 40112c-401141 DefWindowProcW 1999->2003 2000->2003 2004 42b038-42b03f 2000->2004 2013 401193-40119a 2001->2013 2005 401151-401157 2002->2005 2006 40119d 2002->2006 2004->2003 2012 42b045-42b059 call 401000 call 40e0c0 2004->2012 2010 401219-40121f 2005->2010 2011 40115d 2005->2011 2008 4011a3-4011a9 2006->2008 2009 42afb4-42afc5 call 40f190 2006->2009 2008->2000 2014 4011af 2008->2014 2009->2013 2010->2000 2017 401225-42b06d call 468b0e 2010->2017 2015 401163-401166 2011->2015 2016 42b01d-42b024 2011->2016 2012->2003 2014->2000 2020 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 2014->2020 2021 4011db-401202 SetTimer RegisterWindowMessageW 2014->2021 2023 42afe9-42b018 call 40f190 call 401a50 2015->2023 2024 40116c-401172 2015->2024 2016->2003 2022 42b02a-42b033 call 4370f4 2016->2022 2017->2013 2021->2013 2031 401204-401216 CreatePopupMenu 2021->2031 2022->2003 2023->2003 2024->2000 2033 401174-42afde call 45fd57 2024->2033 2033->2003 2045 42afe4 2033->2045 2045->2013
            APIs
            • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
            • KillTimer.USER32(?,00000001,?), ref: 004011B9
            • PostQuitMessage.USER32(00000000), ref: 004011CB
            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
            • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
            • CreatePopupMenu.USER32 ref: 00401204
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
            • String ID: TaskbarCreated
            • API String ID: 129472671-2362178303
            • Opcode ID: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
            • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
            • Opcode Fuzzy Hash: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
            • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2046 4115d7-4115df 2047 4115ee-4115f9 call 4135bb 2046->2047 2050 4115e1-4115ec call 411988 2047->2050 2051 4115fb-4115fc 2047->2051 2050->2047 2054 4115fd-41160e 2050->2054 2055 411610-41163b call 417fc0 call 41130a 2054->2055 2056 41163c-411656 call 4180af call 418105 2054->2056 2055->2056
            APIs
            • _malloc.LIBCMT ref: 004115F1
              • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
              • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
              • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
            • std::exception::exception.LIBCMT ref: 00411626
            • std::exception::exception.LIBCMT ref: 00411640
            • __CxxThrowException@8.LIBCMT ref: 00411651
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
            • String ID: ,*H$4*H$@fI
            • API String ID: 615853336-1459471987
            • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
            • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
            • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
            • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2065 40f5a80-40f5b2e call 40f3470 2068 40f5b35-40f5b5b call 40f6990 CreateFileW 2065->2068 2071 40f5b5d 2068->2071 2072 40f5b62-40f5b72 2068->2072 2073 40f5cad-40f5cb1 2071->2073 2077 40f5b79-40f5b93 VirtualAlloc 2072->2077 2078 40f5b74 2072->2078 2075 40f5cf3-40f5cf6 2073->2075 2076 40f5cb3-40f5cb7 2073->2076 2079 40f5cf9-40f5d00 2075->2079 2080 40f5cb9-40f5cbc 2076->2080 2081 40f5cc3-40f5cc7 2076->2081 2082 40f5b9a-40f5bb1 ReadFile 2077->2082 2083 40f5b95 2077->2083 2078->2073 2084 40f5d55-40f5d6a 2079->2084 2085 40f5d02-40f5d0d 2079->2085 2080->2081 2086 40f5cc9-40f5cd3 2081->2086 2087 40f5cd7-40f5cdb 2081->2087 2092 40f5bb8-40f5bf8 VirtualAlloc 2082->2092 2093 40f5bb3 2082->2093 2083->2073 2088 40f5d6c-40f5d77 VirtualFree 2084->2088 2089 40f5d7a-40f5d82 2084->2089 2094 40f5d0f 2085->2094 2095 40f5d11-40f5d1d 2085->2095 2086->2087 2090 40f5cdd-40f5ce7 2087->2090 2091 40f5ceb 2087->2091 2088->2089 2090->2091 2091->2075 2096 40f5bff-40f5c1a call 40f6be0 2092->2096 2097 40f5bfa 2092->2097 2093->2073 2094->2084 2098 40f5d1f-40f5d2f 2095->2098 2099 40f5d31-40f5d3d 2095->2099 2105 40f5c25-40f5c2f 2096->2105 2097->2073 2101 40f5d53 2098->2101 2102 40f5d3f-40f5d48 2099->2102 2103 40f5d4a-40f5d50 2099->2103 2101->2079 2102->2101 2103->2101 2106 40f5c62-40f5c76 call 40f69f0 2105->2106 2107 40f5c31-40f5c60 call 40f6be0 2105->2107 2113 40f5c7a-40f5c7e 2106->2113 2114 40f5c78 2106->2114 2107->2105 2115 40f5c8a-40f5c8e 2113->2115 2116 40f5c80-40f5c84 CloseHandle 2113->2116 2114->2073 2117 40f5c9e-40f5ca7 2115->2117 2118 40f5c90-40f5c9b VirtualFree 2115->2118 2116->2115 2117->2068 2117->2073 2118->2117
            APIs
            • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 040F5B51
            • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 040F5D77
            Memory Dump Source
            • Source File: 00000000.00000002.1692367377.00000000040F3000.00000040.00000020.00020000.00000000.sdmp, Offset: 040F3000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_40f3000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CreateFileFreeVirtual
            • String ID:
            • API String ID: 204039940-0
            • Opcode ID: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
            • Instruction ID: d6c396543261d6462771bbec134f73bcfb3b0fa21e422939296ad95cf8ae63b8
            • Opcode Fuzzy Hash: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
            • Instruction Fuzzy Hash: C8A11770E10208EFDB14CFA4CC94BEEBBB5BF48304F208569E605BB681D775AA41CB95

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2119 40e4c0-40e4e5 call 403350 RegOpenKeyExW 2122 427190-4271ae RegQueryValueExW 2119->2122 2123 40e4eb-40e4f0 2119->2123 2124 4271b0-4271f5 call 4115d7 call 43652f RegQueryValueExW 2122->2124 2125 42721a-42722a RegCloseKey 2122->2125 2130 427210-427219 call 436508 2124->2130 2131 4271f7-42720e call 402160 2124->2131 2130->2125 2131->2130
            APIs
            • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
            • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: QueryValue$CloseOpen
            • String ID: Include$Software\AutoIt v3\AutoIt
            • API String ID: 1586453840-614718249
            • Opcode ID: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
            • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
            • Opcode Fuzzy Hash: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
            • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2136 410570-4105f1 CreateWindowExW * 2 ShowWindow * 2
            APIs
            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
            • ShowWindow.USER32(?,00000000), ref: 004105E4
            • ShowWindow.USER32(?,00000000), ref: 004105EE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Window$CreateShow
            • String ID: AutoIt v3$edit
            • API String ID: 1584632944-3779509399
            • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
            • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
            • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
            • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2137 40f5820-40f5982 call 40f3470 call 40f5710 CreateFileW 2144 40f5989-40f5999 2137->2144 2145 40f5984 2137->2145 2148 40f599b 2144->2148 2149 40f59a0-40f59ba VirtualAlloc 2144->2149 2146 40f5a39-40f5a3e 2145->2146 2148->2146 2150 40f59be-40f59d5 ReadFile 2149->2150 2151 40f59bc 2149->2151 2152 40f59d9-40f5a13 call 40f5750 call 40f4710 2150->2152 2153 40f59d7 2150->2153 2151->2146 2158 40f5a2f-40f5a37 ExitProcess 2152->2158 2159 40f5a15-40f5a2a call 40f57a0 2152->2159 2153->2146 2158->2146 2159->2158
            APIs
              • Part of subcall function 040F5710: Sleep.KERNELBASE(000001F4), ref: 040F5721
            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 040F5978
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1692367377.00000000040F3000.00000040.00000020.00020000.00000000.sdmp, Offset: 040F3000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_40f3000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CreateFileSleep
            • String ID: 4Z95EYIFLUZCWGZABJEX94Y
            • API String ID: 2694422964-2050610069
            • Opcode ID: 5f3f3ca265d637d9a2a5b881bd6c7fe5385be9bd200865894e437b331749fa76
            • Instruction ID: 099cc192261adff10565226f04937d00981a22eab2da0061ee0b79900dcf8d89
            • Opcode Fuzzy Hash: 5f3f3ca265d637d9a2a5b881bd6c7fe5385be9bd200865894e437b331749fa76
            • Instruction Fuzzy Hash: 9F618330D04288EAEF11DBE4DC54BEEBB75AF15304F044199E248BB2C1D7BA1B45CBA6
            APIs
            • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
            • _wcsncpy.LIBCMT ref: 00401C41
            • _wcscpy.LIBCMT ref: 00401C5D
            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
            • String ID: Line:
            • API String ID: 1874344091-1585850449
            • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
            • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
            • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
            • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
            APIs
            • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
            • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
            • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
            • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Close$OpenQueryValue
            • String ID: Control Panel\Mouse
            • API String ID: 1607946009-824357125
            • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
            • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
            • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
            • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
            APIs
            • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
            • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
            • _wcsncpy.LIBCMT ref: 004102ED
            • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
            • _wcsncpy.LIBCMT ref: 00410340
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _wcsncpy$DesktopFolderFromListMallocPath
            • String ID:
            • API String ID: 3170942423-0
            • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
            • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
            • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
            • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4
            APIs
            • CreateProcessW.KERNELBASE(?,00000000), ref: 040F4ECB
            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 040F4F61
            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 040F4F83
            Memory Dump Source
            • Source File: 00000000.00000002.1692367377.00000000040F3000.00000040.00000020.00020000.00000000.sdmp, Offset: 040F3000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_40f3000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Process$ContextCreateMemoryReadThreadWow64
            • String ID:
            • API String ID: 2438371351-0
            • Opcode ID: 75058a4f97cf2fcbd3f6bc15a6ffc08ef8895de4d25848071cc819695d886454
            • Instruction ID: 06e0ed9b1843e82f0d4350dc42406ffb4b6481b752fa4fd95a0ea7421a013c46
            • Opcode Fuzzy Hash: 75058a4f97cf2fcbd3f6bc15a6ffc08ef8895de4d25848071cc819695d886454
            • Instruction Fuzzy Hash: E3620C30A14258DBEB24CFA4CC50BDEB371EF58304F1091A9D60DEB691E776AE81CB59
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _memmove
            • String ID: Error:
            • API String ID: 4104443479-232661952
            • Opcode ID: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
            • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
            • Opcode Fuzzy Hash: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
            • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
            APIs
            • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
              • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
              • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
              • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
              • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
              • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
              • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
              • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
            • String ID: X$pWH
            • API String ID: 85490731-941433119
            • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
            • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
            • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
            • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
            APIs
            • _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • _memmove.LIBCMT ref: 00401B57
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
              • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
            • String ID: @EXITCODE
            • API String ID: 2734553683-3436989551
            • Opcode ID: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
            • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
            • Opcode Fuzzy Hash: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
            • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
            • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
            • Opcode Fuzzy Hash: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
            • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: __filbuf__getptd_noexit__read_memcpy_s
            • String ID:
            • API String ID: 1794320848-0
            • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
            • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
            • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
            • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
            APIs
            • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
            • TerminateProcess.KERNEL32(00000000), ref: 004753CE
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Process$CurrentTerminate
            • String ID:
            • API String ID: 2429186680-0
            • Opcode ID: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
            • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
            • Opcode Fuzzy Hash: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
            • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
            APIs
            • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: IconNotifyShell_
            • String ID:
            • API String ID: 1144537725-0
            • Opcode ID: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
            • Instruction ID: eb3a406907b17a2fb372061a5351d340f380801689ea858bebf243c914dbfa85
            • Opcode Fuzzy Hash: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
            • Instruction Fuzzy Hash: 16318F70608701DFD320CF25D855797BBE4BB85314F000C3EE5AA87391E7B8A958CB5A
            APIs
            • _malloc.LIBCMT ref: 0043214B
              • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
              • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
              • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
            • _malloc.LIBCMT ref: 0043215D
            • _malloc.LIBCMT ref: 0043216F
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _malloc$AllocateHeap
            • String ID:
            • API String ID: 680241177-0
            • Opcode ID: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
            • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
            • Opcode Fuzzy Hash: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
            • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
            APIs
              • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
            • _free.LIBCMT ref: 004295A0
              • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
              • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
              • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
              • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
              • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
              • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
            • String ID: >>>AUTOIT SCRIPT<<<
            • API String ID: 3938964917-2806939583
            • Opcode ID: 54ef76e4734de236163cd7b280f05d5101af8392224d903fd41af02c4ea86240
            • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
            • Opcode Fuzzy Hash: 54ef76e4734de236163cd7b280f05d5101af8392224d903fd41af02c4ea86240
            • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
            Strings
            • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _strcat
            • String ID: >>>AUTOIT NO CMDEXECUTE<<<
            • API String ID: 1765576173-2684727018
            • Opcode ID: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
            • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
            • Opcode Fuzzy Hash: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
            • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ClearVariant
            • String ID:
            • API String ID: 1473721057-0
            • Opcode ID: 30fb1b5656a8e298aebe1b45ed9f9297ed51282c110b4441b4c64d109fdc6671
            • Instruction ID: 76271617df0236ab3ccd2777984eb13d60b28668e4953fb9a85eec064aa2abc3
            • Opcode Fuzzy Hash: 30fb1b5656a8e298aebe1b45ed9f9297ed51282c110b4441b4c64d109fdc6671
            • Instruction Fuzzy Hash: F891A370A00204DFDB14DF65D884AAAB3B5EF09304F24C56BE915AB391D739EC41CBAE
            APIs
            • __wsplitpath.LIBCMT ref: 004678F7
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • GetLastError.KERNEL32(00000000,00000000), ref: 004679C7
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ErrorLast__wsplitpath_malloc
            • String ID:
            • API String ID: 4163294574-0
            • Opcode ID: b7e2b2e067b321cb14cd8dd870a284e502ce9d37bff932640fd458450c7e1011
            • Instruction ID: 5ded281afda408fdcd401bf2365ceabb828b89a129c607e264fb1023d06c7d2e
            • Opcode Fuzzy Hash: b7e2b2e067b321cb14cd8dd870a284e502ce9d37bff932640fd458450c7e1011
            • Instruction Fuzzy Hash: FB5126712083018BD710EF75C881A5BB3E5AF84318F044A6EF9559B381EB39ED09CB97
            APIs
              • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
              • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
              • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
            • _strcat.LIBCMT ref: 0040F786
              • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
              • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
            • String ID:
            • API String ID: 3199840319-0
            • Opcode ID: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
            • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
            • Opcode Fuzzy Hash: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
            • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
            APIs
            • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D779
            • FreeLibrary.KERNEL32(?), ref: 0040D78E
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: FreeInfoLibraryParametersSystem
            • String ID:
            • API String ID: 3403648963-0
            • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
            • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
            • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
            • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
            APIs
            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 0040F13A
            • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 00426326
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CreateFile
            • String ID:
            • API String ID: 823142352-0
            • Opcode ID: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
            • Instruction ID: 8a88c5525f76e0b0fff62cf48ad84dc7055e673dbb4ccc29545257d8619b8f55
            • Opcode Fuzzy Hash: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
            • Instruction Fuzzy Hash: 16011D70784310BAF2305A68DD0BF5266546B45B24F20473ABBE5BE2D1D2F86885870C
            APIs
              • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
            • __lock_file.LIBCMT ref: 00414A8D
              • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
            • __fclose_nolock.LIBCMT ref: 00414A98
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
            • String ID:
            • API String ID: 2800547568-0
            • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
            • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
            • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
            • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
            APIs
            • __lock_file.LIBCMT ref: 00415012
            • __ftell_nolock.LIBCMT ref: 0041501F
              • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: __ftell_nolock__getptd_noexit__lock_file
            • String ID:
            • API String ID: 2999321469-0
            • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
            • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
            • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
            • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
            APIs
            • CreateProcessW.KERNELBASE(?,00000000), ref: 040F4ECB
            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 040F4F61
            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 040F4F83
            Memory Dump Source
            • Source File: 00000000.00000002.1692367377.00000000040F3000.00000040.00000020.00020000.00000000.sdmp, Offset: 040F3000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_40f3000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Process$ContextCreateMemoryReadThreadWow64
            • String ID:
            • API String ID: 2438371351-0
            • Opcode ID: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
            • Instruction ID: 32da14997df4b49269ef66454719aea8011c298101a57269b54aff1600613775
            • Opcode Fuzzy Hash: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
            • Instruction Fuzzy Hash: D512ED24E24658C6EB24DF60D8507DEB232EF68300F1091E9910DEB7A5E77A5F81CF5A
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _memmove
            • String ID:
            • API String ID: 4104443479-0
            • Opcode ID: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
            • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
            • Opcode Fuzzy Hash: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
            • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ProtectVirtual
            • String ID:
            • API String ID: 544645111-0
            • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
            • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
            • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
            • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
            • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
            • Opcode Fuzzy Hash: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
            • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 35b7bc891c26268d2cb6d46035521dde4ecfc0337a7d2d2d45483da740e67eee
            • Instruction ID: fe3c5e01fee558804f1d0cd68762aa03bf47037873853bda5dcd607d85013340
            • Opcode Fuzzy Hash: 35b7bc891c26268d2cb6d46035521dde4ecfc0337a7d2d2d45483da740e67eee
            • Instruction Fuzzy Hash: 2D118B352046019FDB10DF69D884E96B3E9AF8A314F14856EFD298B362CB35FC41CB95
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: __lock_file
            • String ID:
            • API String ID: 3031932315-0
            • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
            • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
            • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
            • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
            APIs
            • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,004263D0,?,00487ACC,00000003,0040DE90,?,?,00000001), ref: 00443E54
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: FileWrite
            • String ID:
            • API String ID: 3934441357-0
            • Opcode ID: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
            • Instruction ID: f8d6e32d6ecef3e6c51c5ea05c7ff41eb941b2b6d152ec47b845c679c5cedb0e
            • Opcode Fuzzy Hash: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
            • Instruction Fuzzy Hash: 6BE01276100318ABDB10DF98D844FDA77BCEF48765F10891AFA048B200C7B4EA908BE4
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: __wfsopen
            • String ID:
            • API String ID: 197181222-0
            • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
            • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
            • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
            • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
            APIs
            • CloseHandle.KERNELBASE(?,?,00426FBF), ref: 0040DA3D
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CloseHandle
            • String ID:
            • API String ID: 2962429428-0
            • Opcode ID: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
            • Instruction ID: 552ddd844a8bbede063c80161f66c4637379340f91e2bb70a518b226642b2913
            • Opcode Fuzzy Hash: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
            • Instruction Fuzzy Hash: B9E045B4A04B008BC6308F5BE444416FBF8EEE46203108E1FD4A6C2A64C3B4A1498F50
            APIs
            • Sleep.KERNELBASE(000001F4), ref: 040F5721
            Memory Dump Source
            • Source File: 00000000.00000002.1692367377.00000000040F3000.00000040.00000020.00020000.00000000.sdmp, Offset: 040F3000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_40f3000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Sleep
            • String ID:
            • API String ID: 3472027048-0
            • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
            • Instruction ID: 441c84fdeb030874d0250dd455f65242ebd338129636d771fb3ce8811059a1f2
            • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
            • Instruction Fuzzy Hash: 6FE0BF7494020DEFDB00EFA4D9496DE7BB4EF04311F1005A1FD05E7681DB309E549A66
            APIs
            • Sleep.KERNELBASE(000001F4), ref: 040F5721
            Memory Dump Source
            • Source File: 00000000.00000002.1692367377.00000000040F3000.00000040.00000020.00020000.00000000.sdmp, Offset: 040F3000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_40f3000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Sleep
            • String ID:
            • API String ID: 3472027048-0
            • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
            • Instruction ID: df2764e0c99638eaf2779b20ed38e93f504e70bbf01e97c33561bcc30c8b8b64
            • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
            • Instruction Fuzzy Hash: 2CE0E67494020DEFDB00EFB4D94969E7FB4EF04301F100561FD01E2281D6309D509A62
            APIs
            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
            • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
            • GetKeyState.USER32(00000011), ref: 0047C92D
            • GetKeyState.USER32(00000009), ref: 0047C936
            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
            • GetKeyState.USER32(00000010), ref: 0047C953
            • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
            • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
            • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
            • _wcsncpy.LIBCMT ref: 0047CA29
            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
            • SendMessageW.USER32 ref: 0047CA7F
            • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
            • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
            • ImageList_SetDragCursorImage.COMCTL32(00AAFC80,00000000,00000000,00000000), ref: 0047CB9B
            • ImageList_BeginDrag.COMCTL32(00AAFC80,00000000,000000F8,000000F0), ref: 0047CBAC
            • SetCapture.USER32(?), ref: 0047CBB6
            • ClientToScreen.USER32(?,?), ref: 0047CC17
            • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
            • ReleaseCapture.USER32 ref: 0047CC3A
            • GetCursorPos.USER32(?), ref: 0047CC72
            • ScreenToClient.USER32(?,?), ref: 0047CC80
            • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
            • SendMessageW.USER32 ref: 0047CD12
            • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
            • SendMessageW.USER32 ref: 0047CD80
            • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
            • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
            • GetCursorPos.USER32(?), ref: 0047CDC8
            • ScreenToClient.USER32(?,?), ref: 0047CDD6
            • GetParent.USER32(00000000), ref: 0047CDF7
            • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
            • SendMessageW.USER32 ref: 0047CE93
            • ClientToScreen.USER32(?,?), ref: 0047CEEE
            • TrackPopupMenuEx.USER32(?,00000000,?,?,02F61AA8,00000000,?,?,?,?), ref: 0047CF1C
            • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
            • SendMessageW.USER32 ref: 0047CF6B
            • ClientToScreen.USER32(?,?), ref: 0047CFB5
            • TrackPopupMenuEx.USER32(?,00000080,?,?,02F61AA8,00000000,?,?,?,?), ref: 0047CFE6
            • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
            • String ID: @GUI_DRAGID$F
            • API String ID: 3100379633-4164748364
            • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
            • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
            • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
            • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
            APIs
            • GetForegroundWindow.USER32 ref: 00434420
            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
            • IsIconic.USER32(?), ref: 0043444F
            • ShowWindow.USER32(?,00000009), ref: 0043445C
            • SetForegroundWindow.USER32(?), ref: 0043446A
            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
            • GetCurrentThreadId.KERNEL32 ref: 00434485
            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
            • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
            • SetForegroundWindow.USER32(00000000), ref: 004344B7
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
            • keybd_event.USER32(00000012,00000000), ref: 004344CF
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
            • keybd_event.USER32(00000012,00000000), ref: 004344E6
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
            • keybd_event.USER32(00000012,00000000), ref: 004344FD
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
            • keybd_event.USER32(00000012,00000000), ref: 00434514
            • SetForegroundWindow.USER32(00000000), ref: 0043451E
            • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
            • String ID: Shell_TrayWnd
            • API String ID: 2889586943-2988720461
            • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
            • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
            • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
            • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
            APIs
            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
            • CloseHandle.KERNEL32(?), ref: 004463A0
            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
            • GetProcessWindowStation.USER32 ref: 004463D1
            • SetProcessWindowStation.USER32(00000000), ref: 004463DB
            • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
            • _wcslen.LIBCMT ref: 00446498
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • _wcsncpy.LIBCMT ref: 004464C0
            • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
            • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
            • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
            • UnloadUserProfile.USERENV(?,?), ref: 00446555
            • CloseWindowStation.USER32(00000000), ref: 0044656C
            • CloseDesktop.USER32(?), ref: 0044657A
            • SetProcessWindowStation.USER32(?), ref: 00446588
            • CloseHandle.KERNEL32(?), ref: 00446592
            • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
            • String ID: $@OH$default$winsta0
            • API String ID: 3324942560-3791954436
            • Opcode ID: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
            • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
            • Opcode Fuzzy Hash: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
            • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
            APIs
              • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
              • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 0043392E
              • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 00433950
              • Part of subcall function 00433908: __wcsicoll.LIBCMT ref: 00433974
              • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
            • _wcscat.LIBCMT ref: 0044BD94
            • _wcscat.LIBCMT ref: 0044BDBD
            • __wsplitpath.LIBCMT ref: 0044BDEA
            • FindFirstFileW.KERNEL32(?,?), ref: 0044BE02
            • _wcscpy.LIBCMT ref: 0044BE71
            • _wcscat.LIBCMT ref: 0044BE83
            • _wcscat.LIBCMT ref: 0044BE95
            • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC1
            • DeleteFileW.KERNEL32(?), ref: 0044BED3
            • MoveFileW.KERNEL32(?,?), ref: 0044BEF3
            • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0A
            • DeleteFileW.KERNEL32(?), ref: 0044BF15
            • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2C
            • FindClose.KERNEL32(00000000), ref: 0044BF33
            • MoveFileW.KERNEL32(?,?), ref: 0044BF4F
            • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF64
            • FindClose.KERNEL32(00000000), ref: 0044BF7C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
            • String ID: \*.*
            • API String ID: 2188072990-1173974218
            • Opcode ID: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
            • Instruction ID: 72a2fd59153234373391f972af8bc7e503bf673df65afccb4f4ecee040a4f935
            • Opcode Fuzzy Hash: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
            • Instruction Fuzzy Hash: E25167B2408384AAD734DB50DC45EDF73E9AFC8304F544E1EF68982141EB75D249CBA6
            APIs
            • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
            • FindClose.KERNEL32(00000000), ref: 00478924
            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
            • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
            • __swprintf.LIBCMT ref: 004789D3
            • __swprintf.LIBCMT ref: 00478A1D
            • __swprintf.LIBCMT ref: 00478A4B
            • __swprintf.LIBCMT ref: 00478A79
              • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
              • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
            • __swprintf.LIBCMT ref: 00478AA7
            • __swprintf.LIBCMT ref: 00478AD5
            • __swprintf.LIBCMT ref: 00478B03
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
            • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
            • API String ID: 999945258-2428617273
            • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
            • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
            • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
            • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
            APIs
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
            • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
            • __wsplitpath.LIBCMT ref: 00403492
              • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
            • _wcscpy.LIBCMT ref: 004034A7
            • _wcscat.LIBCMT ref: 004034BC
            • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
              • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
              • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
              • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
            • _wcscpy.LIBCMT ref: 004035A0
            • _wcslen.LIBCMT ref: 00403623
            • _wcslen.LIBCMT ref: 0040367D
            Strings
            • Unterminated string, xrefs: 00428348
            • Error opening the file, xrefs: 00428231
            • _, xrefs: 0040371C
            • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
            • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
            • API String ID: 3393021363-188983378
            • Opcode ID: ce77724faf1e7fbc9fcf9b1a922f2907e035de924d79ec5656a8af7ae9668c55
            • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
            • Opcode Fuzzy Hash: ce77724faf1e7fbc9fcf9b1a922f2907e035de924d79ec5656a8af7ae9668c55
            • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
            APIs
            • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
            • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
            • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
            • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
            • FindClose.KERNEL32(00000000), ref: 00431B20
            • FindClose.KERNEL32(00000000), ref: 00431B34
            • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
            • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
            • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
            • FindClose.KERNEL32(00000000), ref: 00431BCD
            • FindClose.KERNEL32(00000000), ref: 00431BDB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
            • String ID: *.*
            • API String ID: 1409584000-438819550
            • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
            • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
            • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
            • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
            APIs
            • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
            • __swprintf.LIBCMT ref: 00431C2E
            • _wcslen.LIBCMT ref: 00431C3A
            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
            • String ID: :$\$\??\%s
            • API String ID: 2192556992-3457252023
            • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
            • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
            • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
            • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
            APIs
            • GetLocalTime.KERNEL32(?), ref: 004722A2
            • __swprintf.LIBCMT ref: 004722B9
            • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
            • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
            • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
            • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
            • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
            • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
            • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
            • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
            • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: FolderPath$LocalTime__swprintf
            • String ID: %.3d
            • API String ID: 3337348382-986655627
            • Opcode ID: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
            • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
            • Opcode Fuzzy Hash: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
            • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
            APIs
            • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
            • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
            • FindClose.KERNEL32(00000000), ref: 0044291C
            • FindClose.KERNEL32(00000000), ref: 00442930
            • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
            • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
            • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
            • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
            • FindClose.KERNEL32(00000000), ref: 004429D4
              • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
            • FindClose.KERNEL32(00000000), ref: 004429E2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
            • String ID: *.*
            • API String ID: 2640511053-438819550
            • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
            • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
            • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
            • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
            APIs
            • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
            • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
            • GetLastError.KERNEL32 ref: 00433414
            • ExitWindowsEx.USER32(?,00000000), ref: 00433437
            • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
            • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
            • String ID: SeShutdownPrivilege
            • API String ID: 2938487562-3733053543
            • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
            • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
            • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
            • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
            APIs
              • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
              • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
              • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
              • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
            • GetLengthSid.ADVAPI32(?), ref: 004461D0
            • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
            • GetLengthSid.ADVAPI32(?), ref: 00446241
            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
            • CopySid.ADVAPI32(00000000), ref: 00446271
            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
            • String ID:
            • API String ID: 1255039815-0
            • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
            • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
            • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
            • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
            APIs
            • __swprintf.LIBCMT ref: 00433073
            • __swprintf.LIBCMT ref: 00433085
            • __wcsicoll.LIBCMT ref: 00433092
            • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
            • LoadResource.KERNEL32(?,00000000), ref: 004330BD
            • LockResource.KERNEL32(00000000), ref: 004330CA
            • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
            • LoadResource.KERNEL32(?,00000000), ref: 00433105
            • SizeofResource.KERNEL32(?,00000000), ref: 00433114
            • LockResource.KERNEL32(?), ref: 00433120
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
            • String ID:
            • API String ID: 1158019794-0
            • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
            • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
            • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
            • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Clipboard$AllocCloseEmptyGlobalOpen
            • String ID:
            • API String ID: 1737998785-0
            • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
            • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
            • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
            • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D627
            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
            • GetLastError.KERNEL32 ref: 0045D6BF
            • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Error$Mode$DiskFreeLastSpace
            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
            • API String ID: 4194297153-14809454
            • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
            • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
            • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
            • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _memmove$_strncmp
            • String ID: @oH$\$^$h
            • API String ID: 2175499884-3701065813
            • Opcode ID: f002cf83b61508de9c211a0f0d172e3a132fb63b457bb46fdb7389c8079d7204
            • Instruction ID: d0725f23cfd3ca281eac06f76a82abe5967bc3f30214560d9089fed7748fa16d
            • Opcode Fuzzy Hash: f002cf83b61508de9c211a0f0d172e3a132fb63b457bb46fdb7389c8079d7204
            • Instruction Fuzzy Hash: C642E270E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD855AB351D7399946CF55
            APIs
            • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 0046530D
            • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
            • bind.WSOCK32(00000000,?,00000010), ref: 00465356
            • WSAGetLastError.WSOCK32(00000000), ref: 00465363
            • closesocket.WSOCK32(00000000,00000000), ref: 00465377
            • listen.WSOCK32(00000000,00000005), ref: 00465381
            • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
            • closesocket.WSOCK32(00000000,00000000), ref: 004653BD
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ErrorLast$closesocket$bindlistensocket
            • String ID:
            • API String ID: 540024437-0
            • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
            • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
            • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
            • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID:
            • String ID: ERCP$VUUU$VUUU$VUUU$XjH
            • API String ID: 0-2872873767
            • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
            • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
            • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
            • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
            APIs
            • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
            • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
            • __wsplitpath.LIBCMT ref: 00475644
              • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
            • _wcscat.LIBCMT ref: 00475657
            • __wcsicoll.LIBCMT ref: 0047567B
            • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
            • CloseHandle.KERNEL32(00000000), ref: 004756BA
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
            • String ID:
            • API String ID: 2547909840-0
            • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
            • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
            • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
            • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
            APIs
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
            • Sleep.KERNEL32(0000000A), ref: 0045250B
            • FindNextFileW.KERNEL32(?,?), ref: 004525E9
            • FindClose.KERNEL32(?), ref: 004525FF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
            • String ID: *.*$\VH
            • API String ID: 2786137511-2657498754
            • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
            • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
            • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
            • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
            APIs
            • IsDebuggerPresent.KERNEL32 ref: 00421FC1
            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
            • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
            • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
            • TerminateProcess.KERNEL32(00000000), ref: 00422004
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
            • String ID: pqI
            • API String ID: 2579439406-2459173057
            • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
            • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
            • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
            • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
            APIs
            • __wcsicoll.LIBCMT ref: 00433349
            • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
            • __wcsicoll.LIBCMT ref: 00433375
            • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: __wcsicollmouse_event
            • String ID: DOWN
            • API String ID: 1033544147-711622031
            • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
            • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
            • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
            • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
            APIs
            • GetKeyboardState.USER32(?), ref: 0044C3D2
            • SetKeyboardState.USER32(00000080), ref: 0044C3F6
            • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
            • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
            • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: KeyboardMessagePostState$InputSend
            • String ID:
            • API String ID: 3031425849-0
            • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
            • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
            • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
            • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
            APIs
              • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
            • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 0047666F
            • WSAGetLastError.WSOCK32(00000000), ref: 00476692
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ErrorLastinet_addrsocket
            • String ID:
            • API String ID: 4170576061-0
            • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
            • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
            • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
            • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
            APIs
              • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
            • IsWindowVisible.USER32 ref: 0047A368
            • IsWindowEnabled.USER32 ref: 0047A378
            • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
            • IsIconic.USER32 ref: 0047A393
            • IsZoomed.USER32 ref: 0047A3A1
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Window$EnabledForegroundIconicVisibleZoomed
            • String ID:
            • API String ID: 292994002-0
            • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
            • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
            • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
            • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
            APIs
              • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
            • CoInitialize.OLE32(00000000), ref: 00478442
            • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
            • CoUninitialize.OLE32 ref: 0047863C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CreateInitializeInstanceUninitialize_wcslen
            • String ID: .lnk
            • API String ID: 886957087-24824748
            • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
            • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
            • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
            • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
            APIs
            • OpenClipboard.USER32(?), ref: 0046DCE7
            • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
            • GetClipboardData.USER32(0000000D), ref: 0046DD01
            • CloseClipboard.USER32 ref: 0046DD0D
            • GlobalLock.KERNEL32(00000000), ref: 0046DD37
            • CloseClipboard.USER32 ref: 0046DD41
            • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
            • GetClipboardData.USER32(00000001), ref: 0046DD8D
            • CloseClipboard.USER32 ref: 0046DD99
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
            • String ID:
            • API String ID: 15083398-0
            • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
            • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
            • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
            • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _memmove
            • String ID: U$\
            • API String ID: 4104443479-100911408
            • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
            • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
            • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
            • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
            APIs
            • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
            • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
            • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Find$File$CloseFirstNext
            • String ID:
            • API String ID: 3541575487-0
            • Opcode ID: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
            • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
            • Opcode Fuzzy Hash: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
            • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
            APIs
            • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
            • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
            • FindClose.KERNEL32(00000000), ref: 004339EB
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: FileFind$AttributesCloseFirst
            • String ID:
            • API String ID: 48322524-0
            • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
            • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
            • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
            • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
            APIs
            • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
            • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
              • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Internet$AvailableDataErrorFileLastQueryRead
            • String ID:
            • API String ID: 901099227-0
            • Opcode ID: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
            • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
            • Opcode Fuzzy Hash: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
            • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
            APIs
            • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Proc
            • String ID:
            • API String ID: 2346855178-0
            • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
            • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
            • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
            • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
            APIs
            • BlockInput.USER32(00000001), ref: 0045A38B
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: BlockInput
            • String ID:
            • API String ID: 3456056419-0
            • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
            • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
            • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
            • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
            APIs
            • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: LogonUser
            • String ID:
            • API String ID: 1244722697-0
            • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
            • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
            • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
            • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
            APIs
            • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: NameUser
            • String ID:
            • API String ID: 2645101109-0
            • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
            • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
            • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
            • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
            APIs
            • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled
            • String ID:
            • API String ID: 3192549508-0
            • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
            • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
            • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
            • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID:
            • String ID: N@
            • API String ID: 0-1509896676
            • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
            • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
            • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
            • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
            • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
            • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
            • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
            • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
            • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
            • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
            • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
            • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
            • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
            • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
            • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
            • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
            Memory Dump Source
            • Source File: 00000000.00000002.1692367377.00000000040F3000.00000040.00000020.00020000.00000000.sdmp, Offset: 040F3000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_40f3000_YWL3cB5Fah.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
            • Instruction ID: 8c6ea6bb8a5d8f724f023c2a4523ab333d2c97917228cee4e44eb5bc57e01f47
            • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
            • Instruction Fuzzy Hash: 5C41D271D1051CEBCF48CFADC991AEEBBF2AF88201F548299D516AB345D730AB41DB80
            Memory Dump Source
            • Source File: 00000000.00000002.1692367377.00000000040F3000.00000040.00000020.00020000.00000000.sdmp, Offset: 040F3000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_40f3000_YWL3cB5Fah.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
            • Instruction ID: af3a142e28bf0860f4d1f3565e5c3f821ef54a98571807bcbdc552961110c696
            • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
            • Instruction Fuzzy Hash: 9A019675A04109EFCB44DF98C5909ADF7F5FB48310F2085A9D919A7701D731AE42DB80
            Memory Dump Source
            • Source File: 00000000.00000002.1692367377.00000000040F3000.00000040.00000020.00020000.00000000.sdmp, Offset: 040F3000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_40f3000_YWL3cB5Fah.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
            • Instruction ID: 74b1033a258e5db0b770549ef89d362cf5ae4419584721e975517590788b07a3
            • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
            • Instruction Fuzzy Hash: 3501A479A04109EFCB44DF98C6909AEF7F5FF48310F6085A9D919A7B01E731AE42DB80
            Memory Dump Source
            • Source File: 00000000.00000002.1692367377.00000000040F3000.00000040.00000020.00020000.00000000.sdmp, Offset: 040F3000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_40f3000_YWL3cB5Fah.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
            • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
            • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
            • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
            APIs
            • DeleteObject.GDI32(?), ref: 0045953B
            • DeleteObject.GDI32(?), ref: 00459551
            • DestroyWindow.USER32(?), ref: 00459563
            • GetDesktopWindow.USER32 ref: 00459581
            • GetWindowRect.USER32(00000000), ref: 00459588
            • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
            • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
            • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
            • GetClientRect.USER32(00000000,?), ref: 004596F8
            • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
            • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
            • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
            • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
            • GlobalLock.KERNEL32(00000000), ref: 0045978F
            • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
            • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
            • CloseHandle.KERNEL32(00000000), ref: 004597AC
            • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
            • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
            • GlobalFree.KERNEL32(00000000), ref: 004597E2
            • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
            • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
            • ShowWindow.USER32(?,00000004), ref: 00459865
            • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
            • GetStockObject.GDI32(00000011), ref: 004598CD
            • SelectObject.GDI32(00000000,00000000), ref: 004598D5
            • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
            • DeleteDC.GDI32(00000000), ref: 004598F8
            • _wcslen.LIBCMT ref: 00459916
            • _wcscpy.LIBCMT ref: 0045993A
            • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
            • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
            • GetDC.USER32(00000000), ref: 004599FC
            • SelectObject.GDI32(00000000,?), ref: 00459A0C
            • SelectObject.GDI32(00000000,00000007), ref: 00459A37
            • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
            • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
            • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
            • String ID: $AutoIt v3$DISPLAY$static
            • API String ID: 4040870279-2373415609
            • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
            • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
            • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
            • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
            APIs
            • GetSysColor.USER32(00000012), ref: 0044181E
            • SetTextColor.GDI32(?,?), ref: 00441826
            • GetSysColorBrush.USER32(0000000F), ref: 0044183D
            • GetSysColor.USER32(0000000F), ref: 00441849
            • SetBkColor.GDI32(?,?), ref: 00441864
            • SelectObject.GDI32(?,?), ref: 00441874
            • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
            • GetSysColor.USER32(00000010), ref: 004418B2
            • CreateSolidBrush.GDI32(00000000), ref: 004418B9
            • FrameRect.USER32(?,?,00000000), ref: 004418CA
            • DeleteObject.GDI32(?), ref: 004418D5
            • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
            • FillRect.USER32(?,?,?), ref: 00441970
              • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
              • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
              • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
              • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
              • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
              • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
              • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
              • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
              • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
              • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
              • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
              • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
              • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
            • String ID:
            • API String ID: 69173610-0
            • Opcode ID: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
            • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
            • Opcode Fuzzy Hash: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
            • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
            APIs
            • DestroyWindow.USER32(?), ref: 004590F2
            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
            • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
            • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
            • GetClientRect.USER32(00000000,?), ref: 0045924E
            • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
            • GetStockObject.GDI32(00000011), ref: 004592AC
            • SelectObject.GDI32(00000000,00000000), ref: 004592B4
            • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
            • DeleteDC.GDI32(00000000), ref: 004592D6
            • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
            • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
            • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
            • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
            • GetStockObject.GDI32(00000011), ref: 004593D3
            • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
            • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
            • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
            • API String ID: 2910397461-517079104
            • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
            • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
            • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
            • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: __wcsnicmp
            • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
            • API String ID: 1038674560-3360698832
            • Opcode ID: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
            • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
            • Opcode Fuzzy Hash: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
            • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
            APIs
            • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
            • SetCursor.USER32(00000000), ref: 0043075B
            • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
            • SetCursor.USER32(00000000), ref: 00430773
            • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
            • SetCursor.USER32(00000000), ref: 0043078B
            • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
            • SetCursor.USER32(00000000), ref: 004307A3
            • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
            • SetCursor.USER32(00000000), ref: 004307BB
            • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
            • SetCursor.USER32(00000000), ref: 004307D3
            • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
            • SetCursor.USER32(00000000), ref: 004307EB
            • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
            • SetCursor.USER32(00000000), ref: 00430803
            • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
            • SetCursor.USER32(00000000), ref: 0043081B
            • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
            • SetCursor.USER32(00000000), ref: 00430833
            • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
            • SetCursor.USER32(00000000), ref: 0043084B
            • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
            • SetCursor.USER32(00000000), ref: 00430863
            • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
            • SetCursor.USER32(00000000), ref: 0043087B
            • SetCursor.USER32(00000000), ref: 00430887
            • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
            • SetCursor.USER32(00000000), ref: 0043089F
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Cursor$Load
            • String ID:
            • API String ID: 1675784387-0
            • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
            • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
            • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
            • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
            APIs
            • GetSysColor.USER32(0000000E), ref: 00430913
            • SetTextColor.GDI32(?,00000000), ref: 0043091B
            • GetSysColor.USER32(00000012), ref: 00430933
            • SetTextColor.GDI32(?,?), ref: 0043093B
            • GetSysColorBrush.USER32(0000000F), ref: 0043094E
            • GetSysColor.USER32(0000000F), ref: 00430959
            • CreateSolidBrush.GDI32(?), ref: 00430962
            • GetSysColor.USER32(00000011), ref: 00430979
            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
            • SelectObject.GDI32(?,00000000), ref: 0043099C
            • SetBkColor.GDI32(?,?), ref: 004309A6
            • SelectObject.GDI32(?,?), ref: 004309B4
            • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
            • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
            • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
            • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
            • DrawFocusRect.USER32(?,?), ref: 00430A91
            • GetSysColor.USER32(00000011), ref: 00430A9F
            • SetTextColor.GDI32(?,00000000), ref: 00430AA7
            • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
            • SelectObject.GDI32(?,?), ref: 00430AD0
            • DeleteObject.GDI32(00000105), ref: 00430ADC
            • SelectObject.GDI32(?,?), ref: 00430AE3
            • DeleteObject.GDI32(?), ref: 00430AE9
            • SetTextColor.GDI32(?,?), ref: 00430AF0
            • SetBkColor.GDI32(?,?), ref: 00430AFB
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
            • String ID:
            • API String ID: 1582027408-0
            • Opcode ID: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
            • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
            • Opcode Fuzzy Hash: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
            • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
            APIs
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
            • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
            • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CloseConnectCreateRegistry
            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
            • API String ID: 3217815495-966354055
            • Opcode ID: c70c32215588f8ec8bb03fc6aa478a266b625616447da64362da41b73b816162
            • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
            • Opcode Fuzzy Hash: c70c32215588f8ec8bb03fc6aa478a266b625616447da64362da41b73b816162
            • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
            APIs
            • GetCursorPos.USER32(?), ref: 004566AE
            • GetDesktopWindow.USER32 ref: 004566C3
            • GetWindowRect.USER32(00000000), ref: 004566CA
            • GetWindowLongW.USER32(?,000000F0), ref: 00456722
            • GetWindowLongW.USER32(?,000000F0), ref: 00456735
            • DestroyWindow.USER32(?), ref: 00456746
            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
            • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
            • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
            • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
            • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
            • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
            • IsWindowVisible.USER32(?), ref: 0045682C
            • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
            • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
            • GetWindowRect.USER32(?,?), ref: 00456873
            • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
            • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
            • CopyRect.USER32(?,?), ref: 004568BE
            • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
            • String ID: ($,$tooltips_class32
            • API String ID: 225202481-3320066284
            • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
            • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
            • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
            • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
            APIs
            • OpenClipboard.USER32(?), ref: 0046DCE7
            • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
            • GetClipboardData.USER32(0000000D), ref: 0046DD01
            • CloseClipboard.USER32 ref: 0046DD0D
            • GlobalLock.KERNEL32(00000000), ref: 0046DD37
            • CloseClipboard.USER32 ref: 0046DD41
            • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
            • GetClipboardData.USER32(00000001), ref: 0046DD8D
            • CloseClipboard.USER32 ref: 0046DD99
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
            • String ID:
            • API String ID: 15083398-0
            • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
            • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
            • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
            • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
            APIs
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • GetWindowRect.USER32(?,?), ref: 00471CF7
            • GetClientRect.USER32(?,?), ref: 00471D05
            • GetSystemMetrics.USER32(00000007), ref: 00471D0D
            • GetSystemMetrics.USER32(00000008), ref: 00471D20
            • GetSystemMetrics.USER32(00000004), ref: 00471D42
            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
            • GetSystemMetrics.USER32(00000007), ref: 00471D79
            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
            • GetSystemMetrics.USER32(00000008), ref: 00471DAB
            • GetSystemMetrics.USER32(00000004), ref: 00471DCF
            • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
            • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
            • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
            • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
            • GetClientRect.USER32(?,?), ref: 00471E8A
            • GetStockObject.GDI32(00000011), ref: 00471EA6
            • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
            • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
            • String ID: @$AutoIt v3 GUI
            • API String ID: 867697134-3359773793
            • Opcode ID: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
            • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
            • Opcode Fuzzy Hash: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
            • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: __wcsicoll$__wcsnicmp
            • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
            • API String ID: 790654849-32604322
            • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
            • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
            • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
            • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
            • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
            • Opcode Fuzzy Hash: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
            • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
            APIs
              • Part of subcall function 00442C5A: __time64.LIBCMT ref: 00442C66
            • _fseek.LIBCMT ref: 00452B3B
            • __wsplitpath.LIBCMT ref: 00452B9B
            • _wcscpy.LIBCMT ref: 00452BB0
            • _wcscat.LIBCMT ref: 00452BC5
            • __wsplitpath.LIBCMT ref: 00452BEF
            • _wcscat.LIBCMT ref: 00452C07
            • _wcscat.LIBCMT ref: 00452C1C
            • __fread_nolock.LIBCMT ref: 00452C53
            • __fread_nolock.LIBCMT ref: 00452C64
            • __fread_nolock.LIBCMT ref: 00452C83
            • __fread_nolock.LIBCMT ref: 00452C94
            • __fread_nolock.LIBCMT ref: 00452CB5
            • __fread_nolock.LIBCMT ref: 00452CC6
            • __fread_nolock.LIBCMT ref: 00452CD7
            • __fread_nolock.LIBCMT ref: 00452CE8
              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
              • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
              • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
            • __fread_nolock.LIBCMT ref: 00452D78
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
            • String ID:
            • API String ID: 2054058615-0
            • Opcode ID: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
            • Instruction ID: 04d0e47ed4a2b248740d2851a73093f1b496c65d3ae4d984919b8c0089c9d159
            • Opcode Fuzzy Hash: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
            • Instruction Fuzzy Hash: 6FC14EB2508340ABD720DF65D881EEFB7E8EFC9704F40492FF68987241E6759548CB66
            APIs
            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Window
            • String ID: 0
            • API String ID: 2353593579-4108050209
            • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
            • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
            • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
            • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
            APIs
            • GetSysColor.USER32(0000000F), ref: 0044A05E
            • GetClientRect.USER32(?,?), ref: 0044A0D1
            • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
            • GetWindowDC.USER32(?), ref: 0044A0F6
            • GetPixel.GDI32(00000000,?,?), ref: 0044A108
            • ReleaseDC.USER32(?,?), ref: 0044A11B
            • GetSysColor.USER32(0000000F), ref: 0044A131
            • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
            • GetSysColor.USER32(0000000F), ref: 0044A14F
            • GetSysColor.USER32(00000005), ref: 0044A15B
            • GetWindowDC.USER32(?), ref: 0044A1BE
            • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
            • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
            • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
            • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
            • ReleaseDC.USER32(?,00000000), ref: 0044A229
            • SetBkColor.GDI32(?,00000000), ref: 0044A24C
            • GetSysColor.USER32(00000008), ref: 0044A265
            • SetTextColor.GDI32(?,00000000), ref: 0044A270
            • SetBkMode.GDI32(?,00000001), ref: 0044A282
            • GetStockObject.GDI32(00000005), ref: 0044A28A
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
            • String ID:
            • API String ID: 1744303182-0
            • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
            • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
            • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
            • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
            APIs
            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
            • __mtterm.LIBCMT ref: 00417C34
              • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
              • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
              • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
              • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
            • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
            • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
            • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
            • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
            • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
            • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
            • __init_pointers.LIBCMT ref: 00417CE6
            • __calloc_crt.LIBCMT ref: 00417D54
            • GetCurrentThreadId.KERNEL32 ref: 00417D80
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
            • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
            • API String ID: 4163708885-3819984048
            • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
            • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
            • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
            • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: __wcsicoll$IconLoad
            • String ID: blank$info$question$stop$warning
            • API String ID: 2485277191-404129466
            • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
            • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
            • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
            • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
            APIs
            • LoadIconW.USER32(?,00000063), ref: 0045464C
            • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
            • SetWindowTextW.USER32(?,?), ref: 00454678
            • GetDlgItem.USER32(?,000003EA), ref: 00454690
            • SetWindowTextW.USER32(00000000,?), ref: 00454697
            • GetDlgItem.USER32(?,000003E9), ref: 004546A8
            • SetWindowTextW.USER32(00000000,?), ref: 004546AF
            • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
            • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
            • GetWindowRect.USER32(?,?), ref: 004546F5
            • SetWindowTextW.USER32(?,?), ref: 00454765
            • GetDesktopWindow.USER32 ref: 0045476F
            • GetWindowRect.USER32(00000000), ref: 00454776
            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
            • GetClientRect.USER32(?,?), ref: 004547D2
            • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
            • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
            • String ID:
            • API String ID: 3869813825-0
            • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
            • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
            • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
            • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
            APIs
            • _wcslen.LIBCMT ref: 00464B28
            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
            • _wcslen.LIBCMT ref: 00464C28
            • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
            • _wcslen.LIBCMT ref: 00464CBA
            • _wcslen.LIBCMT ref: 00464CD0
            • _wcslen.LIBCMT ref: 00464CEF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _wcslen$Directory$CurrentSystem
            • String ID: D
            • API String ID: 1914653954-2746444292
            • Opcode ID: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
            • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
            • Opcode Fuzzy Hash: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
            • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
            APIs
            • _wcsncpy.LIBCMT ref: 0045CE39
            • __wsplitpath.LIBCMT ref: 0045CE78
            • _wcscat.LIBCMT ref: 0045CE8B
            • _wcscat.LIBCMT ref: 0045CE9E
            • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEB2
            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEC5
              • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
            • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF05
            • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF1D
            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF2E
            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF3F
            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF53
            • _wcscpy.LIBCMT ref: 0045CF61
            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CFA4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
            • String ID: *.*
            • API String ID: 1153243558-438819550
            • Opcode ID: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
            • Instruction ID: eacc2f87ca0c49a88fd160cf35c0ab61f7b8ac52d7ffc0430f804bda47b2a69a
            • Opcode Fuzzy Hash: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
            • Instruction Fuzzy Hash: F071D572900208AEDB24DB54CCC5AEEB7B5AB44305F1489ABE805D7242D67C9ECDCB99
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: __wcsicoll
            • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
            • API String ID: 3832890014-4202584635
            • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
            • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
            • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
            • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
            APIs
            • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
            • GetFocus.USER32 ref: 0046A0DD
            • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
            • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessagePost$CtrlFocus
            • String ID: 0
            • API String ID: 1534620443-4108050209
            • Opcode ID: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
            • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
            • Opcode Fuzzy Hash: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
            • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
            APIs
            • DestroyWindow.USER32(?), ref: 004558E3
            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Window$CreateDestroy
            • String ID: ,$tooltips_class32
            • API String ID: 1109047481-3856767331
            • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
            • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
            • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
            • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
            APIs
            • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
            • GetMenuItemCount.USER32(?), ref: 00468C45
            • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
            • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
            • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
            • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
            • GetMenuItemCount.USER32 ref: 00468CFD
            • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
            • GetCursorPos.USER32(?), ref: 00468D3F
            • SetForegroundWindow.USER32(?), ref: 00468D49
            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
            • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
            • String ID: 0
            • API String ID: 1441871840-4108050209
            • Opcode ID: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
            • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
            • Opcode Fuzzy Hash: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
            • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
            APIs
            • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
            • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
            • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
            • __swprintf.LIBCMT ref: 00460915
            • __swprintf.LIBCMT ref: 0046092D
            • _wprintf.LIBCMT ref: 004609E1
            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
            • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
            • API String ID: 3631882475-2268648507
            • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
            • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
            • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
            • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
            APIs
            • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
            • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
            • SendMessageW.USER32 ref: 00471740
            • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
            • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
            • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
            • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
            • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
            • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
            • SendMessageW.USER32 ref: 0047184F
            • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
            • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
            • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
            • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
            • String ID:
            • API String ID: 4116747274-0
            • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
            • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
            • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
            • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
            APIs
            • GetClassNameW.USER32(?,?,00000100), ref: 00461678
            • _wcslen.LIBCMT ref: 00461683
            • __swprintf.LIBCMT ref: 00461721
            • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00461794
            • GetClassNameW.USER32(?,?,00000400), ref: 00461811
            • GetDlgCtrlID.USER32(?), ref: 00461869
            • GetWindowRect.USER32(?,?), ref: 004618A4
            • GetParent.USER32(?), ref: 004618C3
            • ScreenToClient.USER32(00000000), ref: 004618CA
            • GetClassNameW.USER32(?,?,00000100), ref: 00461941
            • GetWindowTextW.USER32(?,?,00000400), ref: 0046197E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
            • String ID: %s%u
            • API String ID: 1899580136-679674701
            • Opcode ID: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
            • Instruction ID: 362d1c13b2509f288ecdbc272899e32e1bd8f20a7ba75cfa55bfcaf2deda5cb5
            • Opcode Fuzzy Hash: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
            • Instruction Fuzzy Hash: 1DA1B2715043019FDB10DF55C884BAB73A8FF84314F08896EFD899B255E738E94ACBA6
            APIs
            • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
            • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
            • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: InfoItemMenu$Sleep
            • String ID: 0
            • API String ID: 1196289194-4108050209
            • Opcode ID: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
            • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
            • Opcode Fuzzy Hash: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
            • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
            APIs
            • GetDC.USER32(00000000), ref: 0043143E
            • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
            • CreateCompatibleDC.GDI32(00000000), ref: 00431459
            • SelectObject.GDI32(00000000,?), ref: 00431466
            • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
            • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
            • String ID: (
            • API String ID: 3300687185-3887548279
            • Opcode ID: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
            • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
            • Opcode Fuzzy Hash: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
            • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
            APIs
              • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
              • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
            • GetDriveTypeW.KERNEL32 ref: 0045DB32
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
            • API String ID: 1976180769-4113822522
            • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
            • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
            • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
            • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _wcslen$_wcsncpy$LocalTime__fassign
            • String ID:
            • API String ID: 461458858-0
            • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
            • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
            • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
            • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
            APIs
            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
            • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
            • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
            • GlobalLock.KERNEL32(00000000), ref: 004300F6
            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
            • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
            • CloseHandle.KERNEL32(00000000), ref: 00430113
            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
            • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
            • GlobalFree.KERNEL32(00000000), ref: 00430150
            • GetObjectW.GDI32(?,00000018,?), ref: 00430177
            • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
            • DeleteObject.GDI32(?), ref: 004301D0
            • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
            • String ID:
            • API String ID: 3969911579-0
            • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
            • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
            • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
            • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
            • String ID: 0
            • API String ID: 956284711-4108050209
            • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
            • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
            • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
            • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
            • String ID: 0.0.0.0
            • API String ID: 1965227024-3771769585
            • Opcode ID: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
            • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
            • Opcode Fuzzy Hash: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
            • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
            APIs
              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: SendString$_memmove_wcslen
            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
            • API String ID: 369157077-1007645807
            • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
            • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
            • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
            • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
            APIs
            • GetParent.USER32 ref: 00445BF8
            • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
            • __wcsicoll.LIBCMT ref: 00445C33
            • __wcsicoll.LIBCMT ref: 00445C4F
            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: __wcsicoll$ClassMessageNameParentSend
            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
            • API String ID: 3125838495-3381328864
            • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
            • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
            • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
            • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
            APIs
            • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
            • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
            • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
            • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
            • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
            • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
            • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
            • SendMessageW.USER32(?,00000402,?), ref: 00449399
            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessageSend$CharNext
            • String ID:
            • API String ID: 1350042424-0
            • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
            • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
            • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
            • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
            APIs
              • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
              • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
            • GetDriveTypeW.KERNEL32(?), ref: 004787B9
            • _wcscpy.LIBCMT ref: 004787E5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: BuffCharDriveLowerType_wcscpy_wcslen
            • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
            • API String ID: 3052893215-2127371420
            • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
            • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
            • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
            • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
            APIs
            • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
            • __swprintf.LIBCMT ref: 0045E7F7
            • _wprintf.LIBCMT ref: 0045E8B3
            • _wprintf.LIBCMT ref: 0045E8D7
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
            • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
            • API String ID: 2295938435-2354261254
            • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
            • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
            • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
            • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: __swprintf_wcscpy$__i64tow__itow
            • String ID: %.15g$0x%p$False$True
            • API String ID: 3038501623-2263619337
            • Opcode ID: dbd07ee36d68efbdb82b47f6bbdb5a558a403895529f1bd62c5843a789ef215e
            • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
            • Opcode Fuzzy Hash: dbd07ee36d68efbdb82b47f6bbdb5a558a403895529f1bd62c5843a789ef215e
            • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
            APIs
            • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
            • __swprintf.LIBCMT ref: 0045E5F6
            • _wprintf.LIBCMT ref: 0045E6A3
            • _wprintf.LIBCMT ref: 0045E6C7
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
            • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
            • API String ID: 2295938435-8599901
            • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
            • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
            • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
            • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
            APIs
            • timeGetTime.WINMM ref: 00443B67
              • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
            • Sleep.KERNEL32(0000000A), ref: 00443B9F
            • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00443BC8
            • SetActiveWindow.USER32(?), ref: 00443BEC
            • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
            • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00443C22
            • Sleep.KERNEL32(000000FA), ref: 00443C2D
            • IsWindow.USER32(?), ref: 00443C3A
            • EndDialog.USER32(?,00000000), ref: 00443C4C
              • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
              • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
              • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
            • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
            • String ID: BUTTON
            • API String ID: 1834419854-3405671355
            • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
            • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
            • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
            • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
            APIs
            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
            • LoadStringW.USER32(00000000), ref: 00454040
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • _wprintf.LIBCMT ref: 00454074
            • __swprintf.LIBCMT ref: 004540A3
            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
            • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
            • API String ID: 455036304-4153970271
            • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
            • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
            • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
            • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
            APIs
            • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
            • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
            • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
            • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
            • _memmove.LIBCMT ref: 00467EB8
            • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
            • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
            • _memmove.LIBCMT ref: 00467F6C
            • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
            • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
              • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
            • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
            • String ID:
            • API String ID: 2170234536-0
            • Opcode ID: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
            • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
            • Opcode Fuzzy Hash: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
            • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
            APIs
            • GetKeyboardState.USER32(?), ref: 00453CE0
            • SetKeyboardState.USER32(?), ref: 00453D3B
            • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
            • GetKeyState.USER32(000000A0), ref: 00453D75
            • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
            • GetKeyState.USER32(000000A1), ref: 00453DB5
            • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
            • GetKeyState.USER32(00000011), ref: 00453DEF
            • GetAsyncKeyState.USER32(00000012), ref: 00453E18
            • GetKeyState.USER32(00000012), ref: 00453E26
            • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
            • GetKeyState.USER32(0000005B), ref: 00453E5D
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: State$Async$Keyboard
            • String ID:
            • API String ID: 541375521-0
            • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
            • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
            • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
            • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
            APIs
            • GetDlgItem.USER32(?,00000001), ref: 004357DB
            • GetWindowRect.USER32(00000000,?), ref: 004357ED
            • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
            • GetDlgItem.USER32(?,00000002), ref: 0043586A
            • GetWindowRect.USER32(00000000,?), ref: 0043587C
            • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
            • GetDlgItem.USER32(?,000003E9), ref: 004358DC
            • GetWindowRect.USER32(00000000,?), ref: 004358EE
            • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
            • GetDlgItem.USER32(?,000003EA), ref: 00435941
            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
            • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Window$ItemMoveRect$Invalidate
            • String ID:
            • API String ID: 3096461208-0
            • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
            • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
            • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
            • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
            APIs
            • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
            • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
            • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
            • DeleteObject.GDI32(?), ref: 0047151E
            • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
            • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
            • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
            • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
            • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
            • DeleteObject.GDI32(?), ref: 004715EA
            • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
            • String ID:
            • API String ID: 3218148540-0
            • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
            • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
            • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
            • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
            • String ID:
            • API String ID: 136442275-0
            • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
            • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
            • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
            • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
            APIs
            • _wcsncpy.LIBCMT ref: 00467490
            • _wcsncpy.LIBCMT ref: 004674BC
              • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
              • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
            • _wcstok.LIBCMT ref: 004674FF
              • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
            • _wcstok.LIBCMT ref: 004675B2
            • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
            • _wcslen.LIBCMT ref: 00467793
            • _wcscpy.LIBCMT ref: 00467641
              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
            • _wcslen.LIBCMT ref: 004677BD
            • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
              • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
            • String ID: X
            • API String ID: 3104067586-3081909835
            • Opcode ID: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
            • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
            • Opcode Fuzzy Hash: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
            • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
            APIs
            • OleInitialize.OLE32(00000000), ref: 0046CBC7
            • CLSIDFromProgID.OLE32(?,?), ref: 0046CBDF
            • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
            • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
            • _wcslen.LIBCMT ref: 0046CDB0
            • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
            • CoTaskMemFree.OLE32(?), ref: 0046CE42
            • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
              • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
              • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
              • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
            Strings
            • NULL Pointer assignment, xrefs: 0046CEA6
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
            • String ID: NULL Pointer assignment
            • API String ID: 440038798-2785691316
            • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
            • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
            • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
            • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95
            APIs
            • GetClassNameW.USER32(?,?,00000400), ref: 00461056
            • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
            • _wcslen.LIBCMT ref: 004610A3
            • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
            • GetClassNameW.USER32(?,?,00000400), ref: 00461124
            • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
            • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
            • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
            • GetWindowRect.USER32(?,?), ref: 00461248
              • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
            • String ID: ThumbnailClass
            • API String ID: 4136854206-1241985126
            • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
            • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
            • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
            • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
            APIs
            • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
            • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
            • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
            • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
            • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
            • GetClientRect.USER32(?,?), ref: 00471A1A
            • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
            • DestroyIcon.USER32(?), ref: 00471AF4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
            • String ID: 2
            • API String ID: 1331449709-450215437
            • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
            • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
            • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
            • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
            APIs
            • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
            • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
            • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
            • __swprintf.LIBCMT ref: 00460915
            • __swprintf.LIBCMT ref: 0046092D
            • _wprintf.LIBCMT ref: 004609E1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
            • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
            • API String ID: 3054410614-2561132961
            • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
            • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
            • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
            • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
            APIs
              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
            • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
            • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
            • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
            • CLSIDFromString.OLE32(?,?), ref: 004587B3
            • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
            • RegCloseKey.ADVAPI32(?), ref: 004587C5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
            • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
            • API String ID: 600699880-22481851
            • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
            • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
            • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
            • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: DestroyWindow
            • String ID: static
            • API String ID: 3375834691-2160076837
            • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
            • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
            • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
            • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D959
            • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ErrorMode$DriveType
            • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
            • API String ID: 2907320926-3566645568
            • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
            • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
            • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
            • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
            APIs
              • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
            • DestroyAcceleratorTable.USER32(?), ref: 0047094A
            • ImageList_Destroy.COMCTL32(?), ref: 004709AD
            • ImageList_Destroy.COMCTL32(?), ref: 004709C5
            • ImageList_Destroy.COMCTL32(?), ref: 004709D5
            • DeleteObject.GDI32(003D0000), ref: 00470A04
            • DestroyIcon.USER32(003A0043), ref: 00470A1C
            • DeleteObject.GDI32(1E745793), ref: 00470A34
            • DestroyWindow.USER32(00790053), ref: 00470A4C
            • DestroyIcon.USER32(?), ref: 00470A73
            • DestroyIcon.USER32(?), ref: 00470A81
            • KillTimer.USER32(00000000,00000000), ref: 00470B00
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
            • String ID:
            • API String ID: 1237572874-0
            • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
            • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
            • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
            • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
            APIs
            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
            • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
            • VariantInit.OLEAUT32(?), ref: 004793E1
            • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
            • VariantCopy.OLEAUT32(?,?), ref: 00479461
            • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
            • VariantClear.OLEAUT32(?), ref: 00479489
            • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
            • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
            • VariantClear.OLEAUT32(?), ref: 004794CA
            • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
            • String ID:
            • API String ID: 2706829360-0
            • Opcode ID: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
            • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
            • Opcode Fuzzy Hash: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
            • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
            APIs
            • GetKeyboardState.USER32(?), ref: 0044480E
            • GetAsyncKeyState.USER32(000000A0), ref: 00444899
            • GetKeyState.USER32(000000A0), ref: 004448AA
            • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
            • GetKeyState.USER32(000000A1), ref: 004448D9
            • GetAsyncKeyState.USER32(00000011), ref: 004448F5
            • GetKeyState.USER32(00000011), ref: 00444903
            • GetAsyncKeyState.USER32(00000012), ref: 0044491F
            • GetKeyState.USER32(00000012), ref: 0044492D
            • GetAsyncKeyState.USER32(0000005B), ref: 00444949
            • GetKeyState.USER32(0000005B), ref: 00444958
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: State$Async$Keyboard
            • String ID:
            • API String ID: 541375521-0
            • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
            • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
            • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
            • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: InitVariant$_malloc_wcscpy_wcslen
            • String ID:
            • API String ID: 3413494760-0
            • Opcode ID: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
            • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
            • Opcode Fuzzy Hash: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
            • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: AddressProc_free_malloc$_strcat_strlen
            • String ID: AU3_FreeVar
            • API String ID: 2634073740-771828931
            • Opcode ID: b7b62cf44ead268743cea15c23fa0702c80810b5d7796ec40f0430e9877b9643
            • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
            • Opcode Fuzzy Hash: b7b62cf44ead268743cea15c23fa0702c80810b5d7796ec40f0430e9877b9643
            • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
            APIs
            • CoInitialize.OLE32 ref: 0046C63A
            • CoUninitialize.OLE32 ref: 0046C645
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
              • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
              • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
            • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
            • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
            • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
            • IIDFromString.OLE32(?,?), ref: 0046C705
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
            • API String ID: 2294789929-1287834457
            • Opcode ID: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
            • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
            • Opcode Fuzzy Hash: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
            • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
            APIs
              • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
              • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
              • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
              • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
            • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
            • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
            • ImageList_EndDrag.COMCTL32 ref: 00471169
            • ReleaseCapture.USER32 ref: 0047116F
            • SetWindowTextW.USER32(?,00000000), ref: 00471206
            • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
            • String ID: @GUI_DRAGFILE$@GUI_DROPID
            • API String ID: 2483343779-2107944366
            • Opcode ID: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
            • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
            • Opcode Fuzzy Hash: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
            • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
            APIs
            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
            • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
            • _wcslen.LIBCMT ref: 00450720
            • _wcscat.LIBCMT ref: 00450733
            • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
            • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessageSend$Window_wcscat_wcslen
            • String ID: -----$SysListView32
            • API String ID: 4008455318-3975388722
            • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
            • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
            • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
            • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
            APIs
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
            • GetDlgCtrlID.USER32(00000000), ref: 00469C84
            • GetParent.USER32 ref: 00469C98
            • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
            • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
            • GetParent.USER32 ref: 00469CBC
            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessageSend$CtrlParent$_memmove_wcslen
            • String ID: ComboBox$ListBox
            • API String ID: 2360848162-1403004172
            • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
            • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
            • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
            • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
            • String ID:
            • API String ID: 262282135-0
            • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
            • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
            • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
            • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
            APIs
            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
            • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
            • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
            • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
            • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
            • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
            • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessageSend$LongWindow
            • String ID:
            • API String ID: 312131281-0
            • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
            • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
            • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
            • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
            APIs
              • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
            • SendMessageW.USER32(75C123D0,00001001,00000000,?), ref: 00448E16
            • SendMessageW.USER32(75C123D0,00001026,00000000,?), ref: 00448E25
              • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessageSend$BrushCreateDeleteObjectSolid
            • String ID:
            • API String ID: 3771399671-0
            • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
            • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
            • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
            • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
            APIs
            • GetCurrentThreadId.KERNEL32 ref: 00434643
            • GetForegroundWindow.USER32(00000000), ref: 00434655
            • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
            • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
            • String ID:
            • API String ID: 2156557900-0
            • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
            • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
            • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
            • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID:
            • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
            • API String ID: 0-1603158881
            • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
            • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
            • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
            • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
            APIs
            • CreateMenu.USER32 ref: 00448603
            • SetMenu.USER32(?,00000000), ref: 00448613
            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
            • IsMenu.USER32(?), ref: 004486AB
            • CreatePopupMenu.USER32 ref: 004486B5
            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
            • DrawMenuBar.USER32 ref: 004486F5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Menu$CreateItem$DrawInfoInsertPopup
            • String ID: 0
            • API String ID: 161812096-4108050209
            • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
            • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
            • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
            • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: dfbce8e1a613c74e072c21ad89e7d3e14579d4917e2b3053f757fec35ca8a5d3
            • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
            • Opcode Fuzzy Hash: dfbce8e1a613c74e072c21ad89e7d3e14579d4917e2b3053f757fec35ca8a5d3
            • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
            APIs
              • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
              • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
            • lstrcmpiW.KERNEL32(?,?), ref: 00453900
            • MoveFileW.KERNEL32(?,?), ref: 00453932
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: File$AttributesFullMoveNamePathlstrcmpi
            • String ID:
            • API String ID: 978794511-0
            • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
            • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
            • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
            • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
            • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
            • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
            • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ClearVariant
            • String ID:
            • API String ID: 1473721057-0
            • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
            • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
            • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
            • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _memmove$_memcmp
            • String ID: '$\$h
            • API String ID: 2205784470-1303700344
            • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
            • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
            • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
            • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
            APIs
            • VariantInit.OLEAUT32(00000000), ref: 0045EA56
            • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
            • VariantClear.OLEAUT32 ref: 0045EA6D
            • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
            • __swprintf.LIBCMT ref: 0045EC33
            • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
            Strings
            • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Variant$InitTime$ClearCopySystem__swprintf
            • String ID: %4d%02d%02d%02d%02d%02d
            • API String ID: 2441338619-1568723262
            • Opcode ID: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
            • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
            • Opcode Fuzzy Hash: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
            • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
            APIs
            • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
            • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
            • Sleep.KERNEL32(0000000A), ref: 0042C67F
            • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
            • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Interlocked$DecrementIncrement$Sleep
            • String ID: @COM_EVENTOBJ
            • API String ID: 327565842-2228938565
            • Opcode ID: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
            • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
            • Opcode Fuzzy Hash: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
            • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
            APIs
            • VariantClear.OLEAUT32(?), ref: 0047031B
            • VariantClear.OLEAUT32(?), ref: 0047044F
            • VariantInit.OLEAUT32(?), ref: 004704A3
            • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
            • VariantClear.OLEAUT32(?), ref: 00470516
              • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
            • VariantCopy.OLEAUT32(?,?), ref: 0047057A
              • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
            • VariantClear.OLEAUT32(00000000), ref: 0047060D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Variant$Clear$Copy$CallDispFuncInit
            • String ID: H
            • API String ID: 3613100350-2852464175
            • Opcode ID: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
            • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
            • Opcode Fuzzy Hash: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
            • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
            APIs
            • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
            • DestroyWindow.USER32(?), ref: 00426F50
            • UnregisterHotKey.USER32(?), ref: 00426F77
            • FreeLibrary.KERNEL32(?), ref: 0042701F
            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
            • String ID: close all
            • API String ID: 4174999648-3243417748
            • Opcode ID: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
            • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
            • Opcode Fuzzy Hash: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
            • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
            APIs
            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
            • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
            • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
            • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
            • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
              • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
            • String ID:
            • API String ID: 1291720006-3916222277
            • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
            • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
            • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
            • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
            APIs
            • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
            • IsMenu.USER32(?), ref: 0045FC5F
            • CreatePopupMenu.USER32 ref: 0045FC97
            • GetMenuItemCount.USER32(?), ref: 0045FCFD
            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Menu$Item$CountCreateInfoInsertPopup
            • String ID: 0$2
            • API String ID: 93392585-3793063076
            • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
            • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
            • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
            • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
            APIs
            • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
            • VariantClear.OLEAUT32(?), ref: 00435320
            • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
            • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
            • VariantClear.OLEAUT32(?), ref: 004353B3
            • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
            • String ID: crts
            • API String ID: 586820018-3724388283
            • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
            • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
            • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
            • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
            APIs
              • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
            • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
            • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
            • _wcscat.LIBCMT ref: 0044BCAF
            • _wcslen.LIBCMT ref: 0044BCBB
            • _wcslen.LIBCMT ref: 0044BCD1
            • SHFileOperationW.SHELL32(?), ref: 0044BD17
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
            • String ID: \*.*
            • API String ID: 2326526234-1173974218
            • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
            • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
            • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
            • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
            APIs
              • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
            • _wcslen.LIBCMT ref: 004335F2
            • GetFileAttributesW.KERNEL32(?), ref: 0043361C
            • GetLastError.KERNEL32 ref: 0043362B
            • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
            • _wcsrchr.LIBCMT ref: 00433666
              • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
            • String ID: \
            • API String ID: 321622961-2967466578
            • Opcode ID: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
            • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
            • Opcode Fuzzy Hash: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
            • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: __wcsnicmp
            • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
            • API String ID: 1038674560-2734436370
            • Opcode ID: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
            • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
            • Opcode Fuzzy Hash: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
            • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
            APIs
            • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,004A7F6C), ref: 00434057
            • LoadStringW.USER32(00000000), ref: 00434060
            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
            • LoadStringW.USER32(00000000), ref: 00434078
            • _wprintf.LIBCMT ref: 004340A1
            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
            Strings
            • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: HandleLoadModuleString$Message_wprintf
            • String ID: %s (%d) : ==> %s: %s %s
            • API String ID: 3648134473-3128320259
            • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
            • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
            • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
            • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
            APIs
            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
            • __lock.LIBCMT ref: 00417981
              • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
              • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
              • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
            • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
            • __lock.LIBCMT ref: 004179A2
            • ___addlocaleref.LIBCMT ref: 004179C0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
            • String ID: KERNEL32.DLL$pI
            • API String ID: 637971194-197072765
            • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
            • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
            • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
            • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _memmove$_malloc
            • String ID:
            • API String ID: 1938898002-0
            • Opcode ID: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
            • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
            • Opcode Fuzzy Hash: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
            • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
            APIs
              • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
            • SendMessageW.USER32(75C123D0,00001001,00000000,?), ref: 00448E16
            • SendMessageW.USER32(75C123D0,00001026,00000000,?), ref: 00448E25
              • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessageSend$BrushCreateDeleteObjectSolid
            • String ID:
            • API String ID: 3771399671-0
            • Opcode ID: 66a9d50f8c9d6af755a83d84fc10a8c9f79f913464eba51571b63e3dd0d935a7
            • Instruction ID: 7a731ed810a83f1ebb4df5e1cc4d29f9b75a103154dfe2ed632c3d1cef216bf4
            • Opcode Fuzzy Hash: 66a9d50f8c9d6af755a83d84fc10a8c9f79f913464eba51571b63e3dd0d935a7
            • Instruction Fuzzy Hash: 72513970204244AFF720DF24CC85FAE7BB9AF15314F10495EFA999B292CB79E549CB18
            APIs
            • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
            • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
            • _memmove.LIBCMT ref: 0044B555
            • _memmove.LIBCMT ref: 0044B578
            • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
            • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
            • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
            • String ID:
            • API String ID: 2737351978-0
            • Opcode ID: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
            • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
            • Opcode Fuzzy Hash: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
            • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
            APIs
            • ___set_flsgetvalue.LIBCMT ref: 0041523A
            • __calloc_crt.LIBCMT ref: 00415246
            • __getptd.LIBCMT ref: 00415253
            • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
            • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
            • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
            • _free.LIBCMT ref: 0041529E
            • __dosmaperr.LIBCMT ref: 004152A9
              • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
            • String ID:
            • API String ID: 3638380555-0
            • Opcode ID: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
            • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
            • Opcode Fuzzy Hash: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
            • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
            APIs
            • VariantInit.OLEAUT32(?), ref: 0046C96E
              • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
              • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Variant$Copy$ClearErrorInitLast
            • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
            • API String ID: 3207048006-625585964
            • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
            • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
            • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
            • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
            APIs
            • WSAStartup.WSOCK32(00000101,?), ref: 00465559
              • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
            • inet_addr.WSOCK32(?,00000000,?,?), ref: 0046559B
            • gethostbyname.WSOCK32(?), ref: 004655A6
            • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
            • _memmove.LIBCMT ref: 004656CA
            • GlobalFree.KERNEL32(00000000), ref: 0046575C
            • WSACleanup.WSOCK32 ref: 00465762
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
            • String ID:
            • API String ID: 2945290962-0
            • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
            • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
            • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
            • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
            APIs
            • GetSystemMetrics.USER32(0000000F), ref: 00440527
            • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
            • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
            • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
            • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
            • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
            • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
            • String ID:
            • API String ID: 1457242333-0
            • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
            • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
            • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
            • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
            APIs
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ConnectRegistry_memmove_wcslen
            • String ID:
            • API String ID: 15295421-0
            • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
            • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
            • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
            • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
            APIs
              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
            • _wcstok.LIBCMT ref: 004675B2
              • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
            • _wcscpy.LIBCMT ref: 00467641
            • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
            • _wcslen.LIBCMT ref: 00467793
            • _wcslen.LIBCMT ref: 004677BD
              • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
            • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
            • String ID: X
            • API String ID: 780548581-3081909835
            • Opcode ID: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
            • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
            • Opcode Fuzzy Hash: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
            • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
            APIs
              • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
              • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
              • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
            • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
            • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
            • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
            • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
            • CloseFigure.GDI32(?), ref: 0044751F
            • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
            • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
            • String ID:
            • API String ID: 4082120231-0
            • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
            • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
            • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
            • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
            APIs
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
            • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
            • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
            • RegCloseKey.ADVAPI32(?), ref: 0046B49D
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
            • String ID:
            • API String ID: 2027346449-0
            • Opcode ID: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
            • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
            • Opcode Fuzzy Hash: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
            • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
            APIs
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
              • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
            • GetMenu.USER32 ref: 0047A703
            • GetMenuItemCount.USER32(00000000), ref: 0047A74F
            • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
            • _wcslen.LIBCMT ref: 0047A79E
            • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
            • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
            • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
            • String ID:
            • API String ID: 3257027151-0
            • Opcode ID: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
            • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
            • Opcode Fuzzy Hash: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
            • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
            APIs
            • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
            • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ErrorLastselect
            • String ID:
            • API String ID: 215497628-0
            • Opcode ID: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
            • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
            • Opcode Fuzzy Hash: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
            • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
            APIs
            • GetParent.USER32(?), ref: 0044443B
            • GetKeyboardState.USER32(?), ref: 00444450
            • SetKeyboardState.USER32(?), ref: 004444A4
            • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
            • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
            • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessagePost$KeyboardState$Parent
            • String ID:
            • API String ID: 87235514-0
            • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
            • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
            • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
            • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
            APIs
            • GetParent.USER32(?), ref: 00444633
            • GetKeyboardState.USER32(?), ref: 00444648
            • SetKeyboardState.USER32(?), ref: 0044469C
            • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
            • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
            • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
            • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessagePost$KeyboardState$Parent
            • String ID:
            • API String ID: 87235514-0
            • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
            • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
            • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
            • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
            APIs
            • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
            • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
            • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
            • DeleteObject.GDI32(?), ref: 00455736
            • DeleteObject.GDI32(?), ref: 00455744
            • DestroyIcon.USER32(?), ref: 00455752
            • DestroyWindow.USER32(?), ref: 00455760
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
            • String ID:
            • API String ID: 2354583917-0
            • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
            • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
            • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
            • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
            • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
            • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
            • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
            APIs
            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
            • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
            • EnableWindow.USER32(?,00000000), ref: 00448B5C
            • EnableWindow.USER32(?,00000001), ref: 00448B72
            • ShowWindow.USER32(?,00000000), ref: 00448BE8
            • ShowWindow.USER32(?,00000004), ref: 00448BF4
            • EnableWindow.USER32(?,00000001), ref: 00448C09
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Window$Enable$Show$MessageMoveSend
            • String ID:
            • API String ID: 896007046-0
            • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
            • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
            • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
            • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
            APIs
            • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
            • GetFocus.USER32 ref: 00448ACF
            • EnableWindow.USER32(?,00000000), ref: 00448B5C
            • EnableWindow.USER32(?,00000001), ref: 00448B72
            • ShowWindow.USER32(?,00000000), ref: 00448BE8
            • ShowWindow.USER32(?,00000004), ref: 00448BF4
            • EnableWindow.USER32(?,00000001), ref: 00448C09
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Window$Enable$Show$FocusMessageSend
            • String ID:
            • API String ID: 3429747543-0
            • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
            • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
            • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
            • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
            APIs
              • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
              • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
              • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
            • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
            • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
            • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
            • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
            • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
            • String ID:
            • API String ID: 3300667738-0
            • Opcode ID: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
            • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
            • Opcode Fuzzy Hash: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
            • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D459
            • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
            • __swprintf.LIBCMT ref: 0045D4E9
            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ErrorMode$InformationVolume__swprintf
            • String ID: %lu$\VH
            • API String ID: 3164766367-2432546070
            • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
            • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
            • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
            • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
            APIs
            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
            • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
            • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: Msctls_Progress32
            • API String ID: 3850602802-3636473452
            • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
            • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
            • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
            • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
            • String ID:
            • API String ID: 3985565216-0
            • Opcode ID: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
            • Instruction ID: 510e71718d61fb01ae158a6e5fa7ad280301b7661e5b3aef53c80a3471921dd4
            • Opcode Fuzzy Hash: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
            • Instruction Fuzzy Hash: 70217E70200A00EFCB20DF25D9D4A2A77AABF48712F10896DE906CB356D739EC45CB69
            APIs
            • _malloc.LIBCMT ref: 0041F707
              • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
              • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
              • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
            • _free.LIBCMT ref: 0041F71A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: AllocateHeap_free_malloc
            • String ID: [B
            • API String ID: 1020059152-632041663
            • Opcode ID: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
            • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
            • Opcode Fuzzy Hash: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
            • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
            APIs
            • ___set_flsgetvalue.LIBCMT ref: 00413DA4
            • __calloc_crt.LIBCMT ref: 00413DB0
            • __getptd.LIBCMT ref: 00413DBD
            • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
            • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
            • _free.LIBCMT ref: 00413E07
            • __dosmaperr.LIBCMT ref: 00413E12
              • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
            • String ID:
            • API String ID: 155776804-0
            • Opcode ID: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
            • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
            • Opcode Fuzzy Hash: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
            • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
            APIs
              • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
              • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
            • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
            • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
            • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
            • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
            • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
            • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
            • String ID:
            • API String ID: 1957940570-0
            • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
            • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
            • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
            • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
            APIs
            • ___set_flsgetvalue.LIBCMT ref: 00413D20
              • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
              • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
            • ___fls_getvalue@4.LIBCMT ref: 00413D2B
              • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
            • ___fls_setvalue@8.LIBCMT ref: 00413D3E
            • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
            • ExitThread.KERNEL32 ref: 00413D4E
            • GetCurrentThreadId.KERNEL32 ref: 00413D54
            • __freefls@4.LIBCMT ref: 00413D74
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
            • String ID:
            • API String ID: 259663610-0
            • Opcode ID: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
            • Instruction ID: 675159a2c5a9d795bd3e19fa90b6febf5cd616b5876767659bafc4934cd781b8
            • Opcode Fuzzy Hash: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
            • Instruction Fuzzy Hash: 0DF0FF75504700AFC704BF72D9498CE7BB9AF48349720846EB80987222DA3DD9C2DBA9
            APIs
            • GetClientRect.USER32(?,?), ref: 004302E6
            • GetWindowRect.USER32(00000000,?), ref: 00430316
            • GetClientRect.USER32(?,?), ref: 00430364
            • GetSystemMetrics.USER32(0000000F), ref: 004303B1
            • GetWindowRect.USER32(?,?), ref: 004303C3
            • ScreenToClient.USER32(?,?), ref: 004303EC
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Rect$Client$Window$MetricsScreenSystem
            • String ID:
            • API String ID: 3220332590-0
            • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
            • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
            • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
            • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _malloc_wcslen$_strcat_wcscpy
            • String ID:
            • API String ID: 1612042205-0
            • Opcode ID: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
            • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
            • Opcode Fuzzy Hash: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
            • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _memmove_strncmp
            • String ID: >$U$\
            • API String ID: 2666721431-237099441
            • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
            • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
            • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
            • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
            APIs
            • GetKeyboardState.USER32(?), ref: 0044C570
            • SetKeyboardState.USER32(00000080), ref: 0044C594
            • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
            • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
            • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
            • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessagePost$KeyboardState$InputSend
            • String ID:
            • API String ID: 2221674350-0
            • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
            • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
            • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
            • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _wcscpy$_wcscat
            • String ID:
            • API String ID: 2037614760-0
            • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
            • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
            • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
            • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
            APIs
            • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
            • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
            • VariantCopy.OLEAUT32(?,?), ref: 00451C0E
            • VariantCopy.OLEAUT32(?,?), ref: 00451C27
            • VariantClear.OLEAUT32(?), ref: 00451CA1
            • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Variant$Copy$AllocClearErrorLastString
            • String ID:
            • API String ID: 960795272-0
            • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
            • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
            • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
            • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
            APIs
            • BeginPaint.USER32(00000000,?), ref: 00447BDF
            • GetWindowRect.USER32(?,?), ref: 00447C5D
            • ScreenToClient.USER32(?,?), ref: 00447C7B
            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
            • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
            • EndPaint.USER32(?,?), ref: 00447D13
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
            • String ID:
            • API String ID: 4189319755-0
            • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
            • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
            • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
            • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
            APIs
            • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
            • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
            • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
            • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
            • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessageSend$LongWindow$InvalidateRect
            • String ID:
            • API String ID: 1976402638-0
            • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
            • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
            • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
            • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
            APIs
            • ShowWindow.USER32(?,00000000), ref: 00440A8A
            • EnableWindow.USER32(?,00000000), ref: 00440AAF
            • ShowWindow.USER32(?,00000000), ref: 00440B18
            • ShowWindow.USER32(?,00000004), ref: 00440B2B
            • EnableWindow.USER32(?,00000001), ref: 00440B50
            • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Window$Show$Enable$MessageSend
            • String ID:
            • API String ID: 642888154-0
            • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
            • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
            • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
            • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Variant$Copy$ClearErrorLast
            • String ID: NULL Pointer assignment$Not an Object type
            • API String ID: 2487901850-572801152
            • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
            • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
            • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
            • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
            APIs
            • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
            • EnableWindow.USER32(?,00000000), ref: 00448B5C
            • EnableWindow.USER32(?,00000001), ref: 00448B72
            • ShowWindow.USER32(?,00000000), ref: 00448BE8
            • ShowWindow.USER32(?,00000004), ref: 00448BF4
            • EnableWindow.USER32(?,00000001), ref: 00448C09
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Window$Enable$Show$MessageSend
            • String ID:
            • API String ID: 1871949834-0
            • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
            • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
            • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
            • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
            • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
            • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
            • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
            APIs
            • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
            • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
            • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
            • SendMessageW.USER32 ref: 00471AE3
            • DestroyIcon.USER32(?), ref: 00471AF4
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
            • String ID:
            • API String ID: 3611059338-0
            • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
            • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
            • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
            • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: DestroyWindow$DeleteObject$IconMove
            • String ID:
            • API String ID: 1640429340-0
            • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
            • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
            • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
            • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
            APIs
              • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
              • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
            • _wcslen.LIBCMT ref: 004438CD
            • _wcslen.LIBCMT ref: 004438E6
            • _wcstok.LIBCMT ref: 004438F8
            • _wcslen.LIBCMT ref: 0044390C
            • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
            • _wcstok.LIBCMT ref: 00443931
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
            • String ID:
            • API String ID: 3632110297-0
            • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
            • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
            • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
            • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Destroy$DeleteMenuObject$IconWindow
            • String ID:
            • API String ID: 752480666-0
            • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
            • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
            • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
            • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Destroy$DeleteObjectWindow$IconImageList_
            • String ID:
            • API String ID: 3275902921-0
            • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
            • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
            • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
            • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Destroy$DeleteObjectWindow$IconImageList_
            • String ID:
            • API String ID: 3275902921-0
            • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
            • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
            • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
            • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
            APIs
            • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
            • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
            • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: PerformanceQuery$CounterSleep$Frequency
            • String ID:
            • API String ID: 2833360925-0
            • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
            • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
            • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
            • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
            APIs
            • SendMessageW.USER32 ref: 004555C7
            • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
            • DeleteObject.GDI32(?), ref: 00455736
            • DeleteObject.GDI32(?), ref: 00455744
            • DestroyIcon.USER32(?), ref: 00455752
            • DestroyWindow.USER32(?), ref: 00455760
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: DeleteDestroyMessageObjectSend$IconWindow
            • String ID:
            • API String ID: 3691411573-0
            • Opcode ID: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
            • Instruction ID: 7bbaf3a525edecc9c7f674a1bc178dbce74773f27e06def1294b58b6a87c9b54
            • Opcode Fuzzy Hash: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
            • Instruction Fuzzy Hash: 3D116071204601DBC710DF69EDC8A2A77A8FB58322F10466AFD10DB292D779D849CB68
            APIs
              • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
              • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
              • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
            • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
            • LineTo.GDI32(?,?,?), ref: 004472AC
            • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
            • LineTo.GDI32(?,?,?), ref: 004472C6
            • EndPath.GDI32(?), ref: 004472D6
            • StrokePath.GDI32(?), ref: 004472E4
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
            • String ID:
            • API String ID: 372113273-0
            • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
            • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
            • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
            • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
            APIs
            • GetDC.USER32(00000000), ref: 0044CC6D
            • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
            • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
            • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
            • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CapsDevice$Release
            • String ID:
            • API String ID: 1035833867-0
            • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
            • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
            • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
            • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
            APIs
            • __getptd.LIBCMT ref: 0041708E
              • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
              • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
            • __amsg_exit.LIBCMT ref: 004170AE
            • __lock.LIBCMT ref: 004170BE
            • InterlockedDecrement.KERNEL32(?), ref: 004170DB
            • _free.LIBCMT ref: 004170EE
            • InterlockedIncrement.KERNEL32(02F62CE0), ref: 00417106
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
            • String ID:
            • API String ID: 3470314060-0
            • Opcode ID: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
            • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
            • Opcode Fuzzy Hash: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
            • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
            APIs
            • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
            • EnterCriticalSection.KERNEL32(?), ref: 0044B666
            • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
            • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
              • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
            • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
            • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
            • String ID:
            • API String ID: 3495660284-0
            • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
            • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
            • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
            • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
            APIs
            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
            • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
            • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Virtual
            • String ID:
            • API String ID: 4278518827-0
            • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
            • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
            • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
            • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
            APIs
            • ___set_flsgetvalue.LIBCMT ref: 004151C0
              • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
              • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
            • ___fls_getvalue@4.LIBCMT ref: 004151CB
              • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
            • ___fls_setvalue@8.LIBCMT ref: 004151DD
            • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
            • ExitThread.KERNEL32 ref: 004151ED
            • __freefls@4.LIBCMT ref: 00415209
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
            • String ID:
            • API String ID: 442100245-0
            • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
            • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
            • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
            • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
            APIs
              • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
              • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
            • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
            • _wcslen.LIBCMT ref: 0045F94A
            • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
            • String ID: 0
            • API String ID: 621800784-4108050209
            • Opcode ID: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
            • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
            • Opcode Fuzzy Hash: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
            • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
            APIs
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • SetErrorMode.KERNEL32 ref: 004781CE
            • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
              • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
            • SetErrorMode.KERNEL32(?), ref: 00478270
            • SetErrorMode.KERNEL32(?), ref: 00478340
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ErrorMode$AttributesFile_memmove_wcslen
            • String ID: \VH
            • API String ID: 3884216118-234962358
            • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
            • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
            • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
            • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
            APIs
            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
            • IsMenu.USER32(?), ref: 0044854D
            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
            • DrawMenuBar.USER32 ref: 004485AF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Menu$Item$DrawInfoInsert
            • String ID: 0
            • API String ID: 3076010158-4108050209
            • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
            • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
            • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
            • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
            APIs
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
            • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessageSend$_memmove_wcslen
            • String ID: ComboBox$ListBox
            • API String ID: 1589278365-1403004172
            • Opcode ID: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
            • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
            • Opcode Fuzzy Hash: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
            • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Handle
            • String ID: nul
            • API String ID: 2519475695-2873401336
            • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
            • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
            • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
            • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
            APIs
            • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Handle
            • String ID: nul
            • API String ID: 2519475695-2873401336
            • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
            • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
            • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
            • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID:
            • String ID: SysAnimate32
            • API String ID: 0-1011021900
            • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
            • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
            • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
            • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
            APIs
              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
              • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
              • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
              • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
              • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
            • GetFocus.USER32 ref: 0046157B
              • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
              • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
            • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
            • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
            • __swprintf.LIBCMT ref: 00461608
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
            • String ID: %s%d
            • API String ID: 2645982514-1110647743
            • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
            • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
            • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
            • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
            • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
            • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
            • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
            APIs
            • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
            • CloseHandle.KERNEL32(00000000), ref: 00475A4D
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Process$CloseCountersCurrentHandleOpen
            • String ID:
            • API String ID: 3488606520-0
            • Opcode ID: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
            • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
            • Opcode Fuzzy Hash: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
            • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
            APIs
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ConnectRegistry_memmove_wcslen
            • String ID:
            • API String ID: 15295421-0
            • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
            • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
            • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
            • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
            APIs
            • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
            • GetProcAddress.KERNEL32(?,?), ref: 004648F7
            • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
            • GetProcAddress.KERNEL32(?,?), ref: 0046495A
            • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: AddressProc$Library$FreeLoad
            • String ID:
            • API String ID: 2449869053-0
            • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
            • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
            • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
            • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
            APIs
            • GetCursorPos.USER32(?), ref: 004563A6
            • ScreenToClient.USER32(?,?), ref: 004563C3
            • GetAsyncKeyState.USER32(?), ref: 00456400
            • GetAsyncKeyState.USER32(?), ref: 00456410
            • GetWindowLongW.USER32(?,000000F0), ref: 00456466
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: AsyncState$ClientCursorLongScreenWindow
            • String ID:
            • API String ID: 3539004672-0
            • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
            • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
            • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
            • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
            APIs
            • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
            • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
            • Sleep.KERNEL32(0000000A), ref: 0047D455
            • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
            • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Interlocked$DecrementIncrement$Sleep
            • String ID:
            • API String ID: 327565842-0
            • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
            • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
            • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
            • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
            APIs
            • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
            • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
            • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
            • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: PrivateProfile$SectionWrite$String
            • String ID:
            • API String ID: 2832842796-0
            • Opcode ID: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
            • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
            • Opcode Fuzzy Hash: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
            • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
            APIs
            • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
            • RegCloseKey.ADVAPI32(?), ref: 00441CFE
            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
            • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Enum$CloseDeleteOpen
            • String ID:
            • API String ID: 2095303065-0
            • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
            • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
            • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
            • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
            APIs
            • GetWindowRect.USER32(?,?), ref: 00436A24
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: RectWindow
            • String ID:
            • API String ID: 861336768-0
            • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
            • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
            • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
            • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
            APIs
            • SendMessageW.USER32 ref: 00449598
              • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
            • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
            • _wcslen.LIBCMT ref: 0044960D
            • _wcslen.LIBCMT ref: 0044961A
            • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessageSend$_wcslen$_wcspbrk
            • String ID:
            • API String ID: 1856069659-0
            • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
            • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
            • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
            • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
            APIs
            • GetCursorPos.USER32(?), ref: 004478E2
            • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
            • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
            • GetCursorPos.USER32(00000000), ref: 0044796A
            • TrackPopupMenuEx.USER32(02F66450,00000000,00000000,?,?,00000000), ref: 00447991
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CursorMenuPopupTrack$Proc
            • String ID:
            • API String ID: 1300944170-0
            • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
            • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
            • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
            • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
            APIs
            • GetClientRect.USER32(?,?), ref: 004479CC
            • GetCursorPos.USER32(?), ref: 004479D7
            • ScreenToClient.USER32(?,?), ref: 004479F3
            • WindowFromPoint.USER32(?,?), ref: 00447A34
            • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Client$CursorFromPointProcRectScreenWindow
            • String ID:
            • API String ID: 1822080540-0
            • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
            • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
            • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
            • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
            APIs
            • GetWindowRect.USER32(?,?), ref: 00447C5D
            • ScreenToClient.USER32(?,?), ref: 00447C7B
            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
            • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
            • EndPaint.USER32(?,?), ref: 00447D13
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ClientPaintRectRectangleScreenViewportWindow
            • String ID:
            • API String ID: 659298297-0
            • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
            • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
            • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
            • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
            APIs
            • EnableWindow.USER32(?,00000000), ref: 00448B5C
            • EnableWindow.USER32(?,00000001), ref: 00448B72
            • ShowWindow.USER32(?,00000000), ref: 00448BE8
            • ShowWindow.USER32(?,00000004), ref: 00448BF4
            • EnableWindow.USER32(?,00000001), ref: 00448C09
              • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
              • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
              • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
              • Part of subcall function 00440D98: SendMessageW.USER32(02F61AA8,000000F1,00000000,00000000), ref: 00440E6E
              • Part of subcall function 00440D98: SendMessageW.USER32(02F61AA8,000000F1,00000001,00000000), ref: 00440E9A
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Window$EnableMessageSend$LongShow
            • String ID:
            • API String ID: 142311417-0
            • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
            • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
            • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
            • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
            • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
            • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
            • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
            APIs
            • IsWindowVisible.USER32(?), ref: 00445879
            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
            • _wcslen.LIBCMT ref: 004458FB
            • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
            • String ID:
            • API String ID: 3087257052-0
            • Opcode ID: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
            • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
            • Opcode Fuzzy Hash: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
            • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
            APIs
              • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
            • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 004653FE
            • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
            • connect.WSOCK32(00000000,?,00000010), ref: 00465446
            • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
            • closesocket.WSOCK32(00000000,00000000), ref: 00465481
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ErrorLast$closesocketconnectinet_addrsocket
            • String ID:
            • API String ID: 245547762-0
            • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
            • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
            • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
            • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
            APIs
            • DeleteObject.GDI32(00000000), ref: 004471D8
            • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
            • SelectObject.GDI32(?,00000000), ref: 00447228
            • BeginPath.GDI32(?), ref: 0044723D
            • SelectObject.GDI32(?,00000000), ref: 00447266
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Object$Select$BeginCreateDeletePath
            • String ID:
            • API String ID: 2338827641-0
            • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
            • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
            • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
            • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
            APIs
            • Sleep.KERNEL32(00000000), ref: 00434598
            • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
            • Sleep.KERNEL32(00000000), ref: 004345D4
            • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CounterPerformanceQuerySleep
            • String ID:
            • API String ID: 2875609808-0
            • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
            • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
            • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
            • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
            APIs
            • GetDlgItem.USER32(?,000003E9), ref: 00460C17
            • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
            • MessageBeep.USER32(00000000), ref: 00460C46
            • KillTimer.USER32(?,0000040A), ref: 00460C68
            • EndDialog.USER32(?,00000001), ref: 00460C83
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: BeepDialogItemKillMessageTextTimerWindow
            • String ID:
            • API String ID: 3741023627-0
            • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
            • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
            • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
            • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Destroy$DeleteObjectWindow$Icon
            • String ID:
            • API String ID: 4023252218-0
            • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
            • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
            • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
            • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
            APIs
            • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
            • DeleteObject.GDI32(?), ref: 00455736
            • DeleteObject.GDI32(?), ref: 00455744
            • DestroyIcon.USER32(?), ref: 00455752
            • DestroyWindow.USER32(?), ref: 00455760
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: DeleteDestroyObject$IconMessageSendWindow
            • String ID:
            • API String ID: 1489400265-0
            • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
            • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
            • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
            • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
            APIs
              • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
            • DestroyWindow.USER32(?), ref: 00455728
            • DeleteObject.GDI32(?), ref: 00455736
            • DeleteObject.GDI32(?), ref: 00455744
            • DestroyIcon.USER32(?), ref: 00455752
            • DestroyWindow.USER32(?), ref: 00455760
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
            • String ID:
            • API String ID: 1042038666-0
            • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
            • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
            • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
            • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Path$ObjectStroke$DeleteFillSelect
            • String ID:
            • API String ID: 2625713937-0
            • Opcode ID: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
            • Instruction ID: 382768f54733291aaafbd4c53fc5fd67df7ff3e11fccf1fbf51b229105ba29ed
            • Opcode Fuzzy Hash: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
            • Instruction Fuzzy Hash: B3F036751125109BD3519F28FD4875E3B68E747321F94423AEA15923F0CB785449CB6D
            APIs
            • __getptd.LIBCMT ref: 0041780F
              • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
              • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
            • __getptd.LIBCMT ref: 00417826
            • __amsg_exit.LIBCMT ref: 00417834
            • __lock.LIBCMT ref: 00417844
            • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
            • String ID:
            • API String ID: 938513278-0
            • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
            • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
            • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
            • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
            APIs
              • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
            • ___set_flsgetvalue.LIBCMT ref: 00413D20
              • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
              • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
            • ___fls_getvalue@4.LIBCMT ref: 00413D2B
              • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
            • ___fls_setvalue@8.LIBCMT ref: 00413D3E
            • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
            • ExitThread.KERNEL32 ref: 00413D4E
            • GetCurrentThreadId.KERNEL32 ref: 00413D54
            • __freefls@4.LIBCMT ref: 00413D74
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
            • String ID:
            • API String ID: 2403457894-0
            • Opcode ID: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
            • Instruction ID: 99982f4671f9afe760f134679f3a1374bf557b67af872bc9692f731b59fefeca
            • Opcode Fuzzy Hash: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
            • Instruction Fuzzy Hash: 1AE04F318443056B8F013BB39C1E8CF363C9E0434AB20082ABE1493112DA2C99C1C6BE
            APIs
              • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
            • ___set_flsgetvalue.LIBCMT ref: 004151C0
              • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
              • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
            • ___fls_getvalue@4.LIBCMT ref: 004151CB
              • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
            • ___fls_setvalue@8.LIBCMT ref: 004151DD
            • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
            • ExitThread.KERNEL32 ref: 004151ED
            • __freefls@4.LIBCMT ref: 00415209
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
            • String ID:
            • API String ID: 4247068974-0
            • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
            • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
            • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
            • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID:
            • String ID: 5$8$^
            • API String ID: 0-3622883839
            • Opcode ID: 5b0bf54134f80cff9ca6ce4a8dff4b23300e7e002ba4f74be1d0103a91d53083
            • Instruction ID: 6ee989b57c56cc683e8081b45a60e8d88641feefa2b309a8211b066407c3f2e5
            • Opcode Fuzzy Hash: 5b0bf54134f80cff9ca6ce4a8dff4b23300e7e002ba4f74be1d0103a91d53083
            • Instruction Fuzzy Hash: 82F1B4B1D00649AACB24CFA9C940AEEFBF4EF84300F14856FE455E7351E3B89A45CB56
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID:
            • String ID: )$U$\
            • API String ID: 0-3705770531
            • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
            • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
            • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
            • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
            APIs
              • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
            • CoInitialize.OLE32(00000000), ref: 0046E505
            • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
            • CoUninitialize.OLE32 ref: 0046E53D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CreateInitializeInstanceUninitialize_wcslen
            • String ID: .lnk
            • API String ID: 886957087-24824748
            • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
            • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
            • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
            • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
            Strings
            • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
            • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
            • API String ID: 708495834-557222456
            • Opcode ID: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
            • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
            • Opcode Fuzzy Hash: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
            • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
            APIs
              • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
            • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
              • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
              • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
              • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
              • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
            • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
            • String ID: @
            • API String ID: 4150878124-2766056989
            • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
            • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
            • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
            • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _memmove
            • String ID: \$]$h
            • API String ID: 4104443479-3262404753
            • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
            • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
            • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
            • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
            APIs
            • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
              • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
              • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
            • CloseHandle.KERNEL32(?), ref: 00457E09
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CloseExecuteHandleShell_wcscpy_wcslen
            • String ID: <$@
            • API String ID: 2417854910-1426351568
            • Opcode ID: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
            • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
            • Opcode Fuzzy Hash: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
            • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
            APIs
            • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
              • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
            • String ID:
            • API String ID: 3705125965-3916222277
            • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
            • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
            • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
            • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
            APIs
            • GetMenuItemInfoW.USER32 ref: 0045FAC4
            • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
            • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Menu$Delete$InfoItem
            • String ID: 0
            • API String ID: 135850232-4108050209
            • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
            • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
            • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
            • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
            APIs
            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
            • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Window$Long
            • String ID: SysTreeView32
            • API String ID: 847901565-1698111956
            • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
            • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
            • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
            • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
            APIs
            • LoadLibraryA.KERNEL32(?), ref: 00434B10
            • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
            • FreeLibrary.KERNEL32(?), ref: 00434B9F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Library$AddressFreeLoadProc
            • String ID: AU3_GetPluginDetails
            • API String ID: 145871493-4132174516
            • Opcode ID: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
            • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
            • Opcode Fuzzy Hash: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
            • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
            APIs
            • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessageSend$Window
            • String ID: SysMonthCal32
            • API String ID: 2326795674-1439706946
            • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
            • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
            • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
            • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
            APIs
            • DestroyWindow.USER32(00000000), ref: 00450A2F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: DestroyWindow
            • String ID: msctls_updown32
            • API String ID: 3375834691-2298589950
            • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
            • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
            • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
            • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _memmove
            • String ID: $<
            • API String ID: 4104443479-428540627
            • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
            • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
            • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
            • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ErrorMode$DiskFreeSpace
            • String ID: \VH
            • API String ID: 1682464887-234962358
            • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
            • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
            • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
            • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ErrorMode$DiskFreeSpace
            • String ID: \VH
            • API String ID: 1682464887-234962358
            • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
            • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
            • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
            • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ErrorMode$DiskFreeSpace
            • String ID: \VH
            • API String ID: 1682464887-234962358
            • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
            • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
            • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
            • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
            • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ErrorMode$InformationVolume
            • String ID: \VH
            • API String ID: 2507767853-234962358
            • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
            • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
            • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
            • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
            • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ErrorMode$InformationVolume
            • String ID: \VH
            • API String ID: 2507767853-234962358
            • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
            • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
            • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
            • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
            APIs
            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
            • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: msctls_trackbar32
            • API String ID: 3850602802-1010561917
            • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
            • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
            • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
            • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
            APIs
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • CLSIDFromString.OLE32(?,00000000), ref: 00435236
            • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
            • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
            • String ID: crts
            • API String ID: 943502515-3724388283
            • Opcode ID: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
            • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
            • Opcode Fuzzy Hash: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
            • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
            APIs
              • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
            • CoInitialize.OLE32(00000000), ref: 0046E505
            • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
            • CoUninitialize.OLE32 ref: 0046E53D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CreateInitializeInstanceUninitialize_wcslen
            • String ID: .lnk
            • API String ID: 886957087-24824748
            • Opcode ID: ca4e97b0deac3c583c427a3e57c18447ee07ba297a7231e98f3a70961bae8bd6
            • Instruction ID: 8523b4f55483354ee3aaa8e7e2ee5f8b04597d59409be9d2747526508be4cfd1
            • Opcode Fuzzy Hash: ca4e97b0deac3c583c427a3e57c18447ee07ba297a7231e98f3a70961bae8bd6
            • Instruction Fuzzy Hash: E72183312082009FD700EF55C985F4AB7F4AF88729F14866EF9589B2E1D7B4E804CB56
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
            • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
            • SetErrorMode.KERNEL32(?), ref: 0045D35C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ErrorMode$LabelVolume
            • String ID: \VH
            • API String ID: 2006950084-234962358
            • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
            • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
            • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
            • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
            APIs
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • GetMenuItemInfoW.USER32 ref: 00449727
            • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
            • DrawMenuBar.USER32 ref: 00449761
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Menu$InfoItem$Draw_malloc
            • String ID: 0
            • API String ID: 772068139-4108050209
            • Opcode ID: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
            • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
            • Opcode Fuzzy Hash: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
            • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _wcslen$_wcscpy
            • String ID: 3, 3, 8, 1
            • API String ID: 3469035223-357260408
            • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
            • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
            • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
            • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
            APIs
            • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
            • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: ICMP.DLL$IcmpCloseHandle
            • API String ID: 2574300362-3530519716
            • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
            • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
            • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
            • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
            APIs
            • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
            • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: ICMP.DLL$IcmpCreateFile
            • API String ID: 2574300362-275556492
            • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
            • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
            • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
            • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
            APIs
            • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
            • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: ICMP.DLL$IcmpSendEcho
            • API String ID: 2574300362-58917771
            • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
            • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
            • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
            • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
            APIs
            • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: RegDeleteKeyExW$advapi32.dll
            • API String ID: 2574300362-4033151799
            • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
            • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
            • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
            • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
            • Instruction ID: c5df29d3d24fc858ebdc5227190e2e918b6fbc7f8fe9fd347d916346834f6d96
            • Opcode Fuzzy Hash: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
            • Instruction Fuzzy Hash: 66E17F75600209AFCB04DF98C880EAEB7B9FF88714F10859AE909DB351D775EE45CBA0
            APIs
            • VariantInit.OLEAUT32(?), ref: 0047950F
            • SysAllocString.OLEAUT32(00000000), ref: 004795D8
            • VariantCopy.OLEAUT32(?,?), ref: 0047960F
            • VariantClear.OLEAUT32(?), ref: 00479650
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Variant$AllocClearCopyInitString
            • String ID:
            • API String ID: 2808897238-0
            • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
            • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
            • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
            • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
            APIs
            • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
            • __itow.LIBCMT ref: 004699CD
              • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
            • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
            • __itow.LIBCMT ref: 00469A97
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessageSend$__itow
            • String ID:
            • API String ID: 3379773720-0
            • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
            • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
            • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
            • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
            APIs
            • GetWindowRect.USER32(?,?), ref: 00449A4A
            • ScreenToClient.USER32(?,?), ref: 00449A80
            • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Window$ClientMoveRectScreen
            • String ID:
            • API String ID: 3880355969-0
            • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
            • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
            • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
            • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: __flsbuf__flush__getptd_noexit__write_memmove
            • String ID:
            • API String ID: 2782032738-0
            • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
            • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
            • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
            • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
            APIs
            • ClientToScreen.USER32(00000000,?), ref: 0044169A
            • GetWindowRect.USER32(?,?), ref: 00441722
            • PtInRect.USER32(?,?,?), ref: 00441734
            • MessageBeep.USER32(00000000), ref: 004417AD
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Rect$BeepClientMessageScreenWindow
            • String ID:
            • API String ID: 1352109105-0
            • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
            • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
            • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
            • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
            APIs
            • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
            • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
            • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
            • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CreateHardLink$DeleteErrorFileLast
            • String ID:
            • API String ID: 3321077145-0
            • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
            • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
            • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
            • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
            APIs
            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
            • __isleadbyte_l.LIBCMT ref: 004208A6
            • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
            • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
            • String ID:
            • API String ID: 3058430110-0
            • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
            • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
            • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
            • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
            APIs
            • GetParent.USER32(?), ref: 004503C8
            • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
            • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
            • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Proc$Parent
            • String ID:
            • API String ID: 2351499541-0
            • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
            • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
            • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
            • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
            APIs
            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
            • TranslateMessage.USER32(?), ref: 00442B01
            • DispatchMessageW.USER32(?), ref: 00442B0B
            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Message$Peek$DispatchTranslate
            • String ID:
            • API String ID: 1795658109-0
            • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
            • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
            • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
            • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
            APIs
            • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
              • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
              • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
              • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
            • GetCaretPos.USER32(?), ref: 004743B2
            • ClientToScreen.USER32(00000000,?), ref: 004743E8
            • GetForegroundWindow.USER32 ref: 004743EE
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
            • String ID:
            • API String ID: 2759813231-0
            • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
            • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
            • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
            • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
            APIs
              • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
            • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
            • _wcslen.LIBCMT ref: 00449519
            • _wcslen.LIBCMT ref: 00449526
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessageSend_wcslen$_wcspbrk
            • String ID:
            • API String ID: 2886238975-0
            • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
            • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
            • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
            • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: __setmode$DebugOutputString_fprintf
            • String ID:
            • API String ID: 1792727568-0
            • Opcode ID: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
            • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
            • Opcode Fuzzy Hash: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
            • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
            APIs
              • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
            • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
            • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Window$Long$AttributesLayered
            • String ID:
            • API String ID: 2169480361-0
            • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
            • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
            • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
            • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
            APIs
              • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
              • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
              • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
            • lstrlenW.KERNEL32(?), ref: 00434CF6
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
            • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: lstrcmpilstrcpylstrlen$_malloc
            • String ID: cdecl
            • API String ID: 3850814276-3896280584
            • Opcode ID: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
            • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
            • Opcode Fuzzy Hash: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
            • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
            APIs
              • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
            • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046D42D
            • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
            • _memmove.LIBCMT ref: 0046D475
            • inet_ntoa.WSOCK32(?), ref: 0046D481
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
            • String ID:
            • API String ID: 2502553879-0
            • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
            • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
            • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
            • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
            APIs
            • SendMessageW.USER32 ref: 00448C69
            • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
            • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
            • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessageSend$LongWindow
            • String ID:
            • API String ID: 312131281-0
            • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
            • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
            • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
            • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
            APIs
            • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
            • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
            • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
            • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ErrorLastacceptselect
            • String ID:
            • API String ID: 385091864-0
            • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
            • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
            • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
            • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
            APIs
            • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessageSend
            • String ID:
            • API String ID: 3850602802-0
            • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
            • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
            • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
            • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
            APIs
            • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
            • GetStockObject.GDI32(00000011), ref: 00430258
            • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
            • ShowWindow.USER32(00000000,00000000), ref: 0043027D
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Window$CreateMessageObjectSendShowStock
            • String ID:
            • API String ID: 1358664141-0
            • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
            • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
            • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
            • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
            APIs
            • GetCurrentThreadId.KERNEL32 ref: 00443CA6
            • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
            • CloseHandle.KERNEL32(00000000), ref: 00443CF9
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
            • String ID:
            • API String ID: 2880819207-0
            • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
            • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
            • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
            • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
            APIs
            • GetWindowRect.USER32(?,?), ref: 00430BA2
            • ScreenToClient.USER32(?,?), ref: 00430BC1
            • ScreenToClient.USER32(?,?), ref: 00430BE2
            • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ClientRectScreen$InvalidateWindow
            • String ID:
            • API String ID: 357397906-0
            • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
            • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
            • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
            • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
            APIs
            • __wsplitpath.LIBCMT ref: 0043392E
              • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
            • __wsplitpath.LIBCMT ref: 00433950
            • __wcsicoll.LIBCMT ref: 00433974
            • __wcsicoll.LIBCMT ref: 0043398A
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
            • String ID:
            • API String ID: 1187119602-0
            • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
            • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
            • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
            • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _wcslen$_malloc_wcscat_wcscpy
            • String ID:
            • API String ID: 1597257046-0
            • Opcode ID: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
            • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
            • Opcode Fuzzy Hash: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
            • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
            APIs
            • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
            • __malloc_crt.LIBCMT ref: 0041F5B6
            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: EnvironmentStrings$Free__malloc_crt
            • String ID:
            • API String ID: 237123855-0
            • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
            • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
            • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
            • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: DeleteDestroyObject$IconWindow
            • String ID:
            • API String ID: 3349847261-0
            • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
            • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
            • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
            • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
            APIs
            • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
            • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
            • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
            • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CriticalSection$Leave$EnterExchangeInterlocked
            • String ID:
            • API String ID: 2223660684-0
            • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
            • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
            • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
            • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
            APIs
              • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
              • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
              • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
            • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
            • LineTo.GDI32(?,?,?), ref: 00447326
            • EndPath.GDI32(?), ref: 00447336
            • StrokePath.GDI32(?), ref: 00447344
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
            • String ID:
            • API String ID: 2783949968-0
            • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
            • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
            • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
            • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
            APIs
            • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
            • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
            • GetCurrentThreadId.KERNEL32 ref: 004364A3
            • AttachThreadInput.USER32(00000000), ref: 004364AA
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
            • String ID:
            • API String ID: 2710830443-0
            • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
            • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
            • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
            • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
            APIs
            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
            • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
            • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
            • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
              • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
              • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
            • String ID:
            • API String ID: 146765662-0
            • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
            • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
            • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
            • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
            APIs
            • GetDesktopWindow.USER32 ref: 00472B63
            • GetDC.USER32(00000000), ref: 00472B6C
            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
            • ReleaseDC.USER32(00000000,?), ref: 00472B99
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CapsDesktopDeviceReleaseWindow
            • String ID:
            • API String ID: 2889604237-0
            • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
            • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
            • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
            • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
            APIs
            • GetDesktopWindow.USER32 ref: 00472BB2
            • GetDC.USER32(00000000), ref: 00472BBB
            • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
            • ReleaseDC.USER32(00000000,?), ref: 00472BE8
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CapsDesktopDeviceReleaseWindow
            • String ID:
            • API String ID: 2889604237-0
            • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
            • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
            • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
            • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
            APIs
            • __getptd_noexit.LIBCMT ref: 00415150
              • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
              • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
              • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
              • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
              • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
            • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
            • __freeptd.LIBCMT ref: 0041516B
            • ExitThread.KERNEL32 ref: 00415173
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
            • String ID:
            • API String ID: 1454798553-0
            • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
            • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
            • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
            • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _strncmp
            • String ID: Q\E
            • API String ID: 909875538-2189900498
            • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
            • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
            • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
            • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
            APIs
            • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
              • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
              • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
              • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
            • String ID: AutoIt3GUI$Container
            • API String ID: 2652923123-3941886329
            • Opcode ID: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
            • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
            • Opcode Fuzzy Hash: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
            • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _memmove_strncmp
            • String ID: U$\
            • API String ID: 2666721431-100911408
            • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
            • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
            • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
            • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
            APIs
              • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
              • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
            • __wcsnicmp.LIBCMT ref: 00467288
            • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Connection__wcsnicmp_wcscpy_wcslen
            • String ID: LPT
            • API String ID: 3035604524-1350329615
            • Opcode ID: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
            • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
            • Opcode Fuzzy Hash: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
            • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _memmove
            • String ID: \$h
            • API String ID: 4104443479-677774858
            • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
            • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
            • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
            • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _memcmp
            • String ID: &
            • API String ID: 2931989736-1010288
            • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
            • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
            • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
            • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _memmove
            • String ID: \
            • API String ID: 4104443479-2967466578
            • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
            • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
            • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
            • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
            APIs
            • _wcslen.LIBCMT ref: 00466825
            • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CrackInternet_wcslen
            • String ID: |
            • API String ID: 596671847-2343686810
            • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
            • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
            • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
            • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
            APIs
            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: '
            • API String ID: 3850602802-1997036262
            • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
            • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
            • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
            • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
            APIs
            • _strlen.LIBCMT ref: 0040F858
              • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
              • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
            • _sprintf.LIBCMT ref: 0040F9AE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _memmove$_sprintf_strlen
            • String ID: %02X
            • API String ID: 1921645428-436463671
            • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
            • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
            • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
            • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
            APIs
            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: Combobox
            • API String ID: 3850602802-2096851135
            • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
            • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
            • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
            • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
            APIs
            • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: LengthMessageSendTextWindow
            • String ID: edit
            • API String ID: 2978978980-2167791130
            • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
            • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
            • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
            • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
            APIs
            • Sleep.KERNEL32(00000000), ref: 00476CB0
            • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: GlobalMemorySleepStatus
            • String ID: @
            • API String ID: 2783356886-2766056989
            • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
            • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
            • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
            • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: htonsinet_addr
            • String ID: 255.255.255.255
            • API String ID: 3832099526-2422070025
            • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
            • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
            • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
            • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
            APIs
            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: InternetOpen
            • String ID: <local>
            • API String ID: 2038078732-4266983199
            • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
            • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
            • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
            • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: __fread_nolock_memmove
            • String ID: EA06
            • API String ID: 1988441806-3962188686
            • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
            • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
            • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
            • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: _memmove
            • String ID: u,D
            • API String ID: 4104443479-3858472334
            • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
            • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
            • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
            • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
            APIs
            • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • wsprintfW.USER32 ref: 0045612A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: MessageSend_mallocwsprintf
            • String ID: %d/%02d/%02d
            • API String ID: 1262938277-328681919
            • Opcode ID: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
            • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
            • Opcode Fuzzy Hash: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
            • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
            APIs
            • InternetCloseHandle.WININET(?), ref: 00442663
            • InternetCloseHandle.WININET ref: 00442668
              • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: CloseHandleInternet$ObjectSingleWait
            • String ID: aeB
            • API String ID: 857135153-906807131
            • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
            • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
            • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
            • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
            APIs
            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
            • PostMessageW.USER32(00000000), ref: 00441C05
              • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: FindMessagePostSleepWindow
            • String ID: Shell_TrayWnd
            • API String ID: 529655941-2988720461
            • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
            • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
            • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
            • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
            APIs
            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
            • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
              • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: FindMessagePostSleepWindow
            • String ID: Shell_TrayWnd
            • API String ID: 529655941-2988720461
            • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
            • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
            • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
            • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
            APIs
            • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
              • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690729183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1690709457.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690771710.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690815857.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690872435.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1690902262.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1691047611.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_YWL3cB5Fah.jbxd
            Similarity
            • API ID: Message_doexit
            • String ID: AutoIt$Error allocating memory.
            • API String ID: 1993061046-4017498283
            • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
            • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
            • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
            • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D