Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
114mCZlpa3.exe

Overview

General Information

Sample name:114mCZlpa3.exe
renamed because original name is a hash value
Original sample name:5c73d9378bca7a5eecefe91b7999cae483e2aa31ee49f46b21d6c97a7eabaad8.exe
Analysis ID:1529034
MD5:a5b62d982db9a3841c9c3f381f25146e
SHA1:f9c714ccd984e7f7bfef5964ae761b968ee74828
SHA256:5c73d9378bca7a5eecefe91b7999cae483e2aa31ee49f46b21d6c97a7eabaad8
Tags:exeSnakeKeyloggeruser-adrian__luca
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
AI detected suspicious sample
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 114mCZlpa3.exe (PID: 3440 cmdline: "C:\Users\user\Desktop\114mCZlpa3.exe" MD5: A5B62D982DB9A3841C9C3F381F25146E)
    • RegSvcs.exe (PID: 6348 cmdline: "C:\Users\user\Desktop\114mCZlpa3.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "asadek@al-subai.com", "Password": "A_Sadek1962", "Host": "mail.al-subai.com", "Port": "587", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.4507918514.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000002.00000002.4507918514.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000002.00000002.4507918514.0000000000402000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
      • 0x14848:$a1: get_encryptedPassword
      • 0x14b34:$a2: get_encryptedUsername
      • 0x14654:$a3: get_timePasswordChanged
      • 0x1474f:$a4: get_passwordField
      • 0x1485e:$a5: set_encryptedPassword
      • 0x15eb8:$a7: get_logins
      • 0x15e1b:$a10: KeyLoggerEventArgs
      • 0x15a86:$a11: KeyLoggerEventArgsEventHandler
      00000002.00000002.4507918514.0000000000402000.00000040.80000000.00040000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
      • 0x18198:$x1: $%SMTPDV$
      • 0x181fe:$x2: $#TheHashHere%&
      • 0x1981f:$x3: %FTPDV$
      • 0x19913:$x4: $%TelegramDv$
      • 0x15a86:$x5: KeyLoggerEventArgs
      • 0x15e1b:$x5: KeyLoggerEventArgs
      • 0x19843:$m2: Clipboard Logs ID
      • 0x19a63:$m2: Screenshot Logs ID
      • 0x19b73:$m2: keystroke Logs ID
      • 0x19e4d:$m3: SnakePW
      • 0x19a3b:$m4: \SnakeKeylogger\
      00000000.00000002.2052378648.0000000001690000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Click to see the 16 entries
        SourceRuleDescriptionAuthorStrings
        2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
              2.2.RegSvcs.exe.400000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
              • 0x14a48:$a1: get_encryptedPassword
              • 0x14d34:$a2: get_encryptedUsername
              • 0x14854:$a3: get_timePasswordChanged
              • 0x1494f:$a4: get_passwordField
              • 0x14a5e:$a5: set_encryptedPassword
              • 0x160b8:$a7: get_logins
              • 0x1601b:$a10: KeyLoggerEventArgs
              • 0x15c86:$a11: KeyLoggerEventArgsEventHandler
              2.2.RegSvcs.exe.400000.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
              • 0x1c40f:$a2: \Comodo\Dragon\User Data\Default\Login Data
              • 0x1b641:$a3: \Google\Chrome\User Data\Default\Login Data
              • 0x1ba74:$a4: \Orbitum\User Data\Default\Login Data
              • 0x1cab3:$a5: \Kometa\User Data\Default\Login Data
              Click to see the 15 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-08T15:27:52.487317+020028033053Unknown Traffic192.168.2.549706188.114.97.3443TCP
              2024-10-08T15:27:54.027764+020028033053Unknown Traffic192.168.2.549708188.114.97.3443TCP
              2024-10-08T15:28:02.049651+020028033053Unknown Traffic192.168.2.549718188.114.97.3443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-08T15:27:50.986935+020028032742Potentially Bad Traffic192.168.2.549704193.122.6.16880TCP
              2024-10-08T15:27:51.929021+020028032742Potentially Bad Traffic192.168.2.549704193.122.6.16880TCP
              2024-10-08T15:27:53.190128+020028032742Potentially Bad Traffic192.168.2.549707193.122.6.16880TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 114mCZlpa3.exeAvira: detected
              Source: 00000002.00000002.4507918514.0000000000402000.00000040.80000000.00040000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "asadek@al-subai.com", "Password": "A_Sadek1962", "Host": "mail.al-subai.com", "Port": "587", "Version": "5.1"}
              Source: 114mCZlpa3.exeReversingLabs: Detection: 76%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: 114mCZlpa3.exeJoe Sandbox ML: detected

              Location Tracking

              barindex
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: 114mCZlpa3.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49705 version: TLS 1.0
              Source: Binary string: wntdll.pdbUGP source: 114mCZlpa3.exe, 00000000.00000003.2048022932.0000000004490000.00000004.00001000.00020000.00000000.sdmp, 114mCZlpa3.exe, 00000000.00000003.2049148533.0000000004630000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: 114mCZlpa3.exe, 00000000.00000003.2048022932.0000000004490000.00000004.00001000.00020000.00000000.sdmp, 114mCZlpa3.exe, 00000000.00000003.2049148533.0000000004630000.00000004.00001000.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0257FA39h2_2_0257F788
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0257E61Fh2_2_0257E440
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0257EFA9h2_2_0257E440
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_0257D7F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 061888EDh2_2_061885B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06186119h2_2_06185E70
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]2_2_06183676
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 061869C9h2_2_06186720
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 061872A2h2_2_06186FF8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 061876F9h2_2_06187450
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06180741h2_2_06180498
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06187FA9h2_2_06187D00
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06185869h2_2_061855C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06185CC1h2_2_06185A18
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06186571h2_2_061862C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]2_2_06183350
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06186E21h2_2_06186B78
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]2_2_06183360
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 061802E9h2_2_06180040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06187B51h2_2_061878A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06180B99h2_2_061808F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06188401h2_2_06188158
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 061853E9h2_2_06185140

              Networking

              barindex
              Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.114mCZlpa3.exe.1690000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2052378648.0000000001690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
              Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
              Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49707 -> 193.122.6.168:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49704 -> 193.122.6.168:80
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49718 -> 188.114.97.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49706 -> 188.114.97.3:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49708 -> 188.114.97.3:443
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49705 version: TLS 1.0
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
              Source: RegSvcs.exe, 00000002.00000002.4509880252.0000000002869000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000027C8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.0000000002884000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.000000000285B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.0000000002876000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000028C0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000028B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
              Source: RegSvcs.exe, 00000002.00000002.4509880252.0000000002869000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000027C8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.0000000002884000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.000000000285B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.000000000280B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.0000000002892000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.0000000002876000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000028C0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000027BC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000028B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: RegSvcs.exe, 00000002.00000002.4509880252.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: 114mCZlpa3.exe, 00000000.00000002.2052378648.0000000001690000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4507918514.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
              Source: RegSvcs.exe, 00000002.00000002.4509880252.00000000027E1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.0000000002869000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.0000000002884000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.000000000285B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.0000000002876000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000028C0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000028B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
              Source: RegSvcs.exe, 00000002.00000002.4509880252.0000000002701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: RegSvcs.exe, 00000002.00000002.4509880252.0000000002869000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000027C8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.0000000002884000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.000000000285B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.000000000280B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.0000000002876000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000028C0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000028B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
              Source: 114mCZlpa3.exe, 00000000.00000002.2052378648.0000000001690000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000027C8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4507918514.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
              Source: RegSvcs.exe, 00000002.00000002.4509880252.00000000028B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33
              Source: RegSvcs.exe, 00000002.00000002.4509880252.0000000002869000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.0000000002884000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.000000000285B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.000000000280B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.0000000002876000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000028C0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000028B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33$
              Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
              Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
              Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
              Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
              Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C

              System Summary

              barindex
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.114mCZlpa3.exe.1690000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.114mCZlpa3.exe.1690000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.114mCZlpa3.exe.1690000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.114mCZlpa3.exe.1690000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.114mCZlpa3.exe.1690000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.114mCZlpa3.exe.1690000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.114mCZlpa3.exe.1690000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.114mCZlpa3.exe.1690000.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000002.00000002.4507918514.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000002.00000002.4507918514.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000000.00000002.2052378648.0000000001690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000000.00000002.2052378648.0000000001690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000000.00000002.2052378648.0000000001690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000000.00000002.2052378648.0000000001690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: 114mCZlpa3.exe PID: 3440, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: 114mCZlpa3.exe PID: 3440, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: RegSvcs.exe PID: 6348, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: RegSvcs.exe PID: 6348, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess Stats: CPU usage > 49%
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_004096A00_2_004096A0
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0042200C0_2_0042200C
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0041A2170_2_0041A217
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_004122160_2_00412216
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0042435D0_2_0042435D
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_004033C00_2_004033C0
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0044F4300_2_0044F430
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_004125E80_2_004125E8
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0044663B0_2_0044663B
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_004138010_2_00413801
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0042096F0_2_0042096F
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_004129D00_2_004129D0
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_004119E30_2_004119E3
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0041C9AE0_2_0041C9AE
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0047EA6F0_2_0047EA6F
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0040FA100_2_0040FA10
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0044EB5F0_2_0044EB5F
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_00423C810_2_00423C81
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_00411E780_2_00411E78
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_00442E0C0_2_00442E0C
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_00420EC00_2_00420EC0
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0044CF170_2_0044CF17
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_00444FD20_2_00444FD2
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_03F1B6300_2_03F1B630
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0257B3282_2_0257B328
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_025761482_2_02576148
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0257C7512_2_0257C751
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0257F7882_2_0257F788
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0257E4402_2_0257E440
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0257C4702_2_0257C470
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_025735802_2_02573580
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0257CA312_2_0257CA31
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02574AD92_2_02574AD9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0257BEB02_2_0257BEB0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0257F7782_2_0257F778
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0257D7F02_2_0257D7F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0257D7E22_2_0257D7E2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0257E4312_2_0257E431
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0257B4F22_2_0257B4F2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0257BBB82_2_0257BBB8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0618A6002_2_0618A600
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0618BF302_2_0618BF30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06189FB02_2_06189FB0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06188C082_2_06188C08
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0618AC482_2_0618AC48
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06180D482_2_06180D48
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0618C5802_2_0618C580
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061885B02_2_061885B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0618D2182_2_0618D218
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0618B2902_2_0618B290
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0618CBD02_2_0618CBD0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0618B8E02_2_0618B8E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06185E702_2_06185E70
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06185E602_2_06185E60
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061836D82_2_061836D8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061867102_2_06186710
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061867202_2_06186720
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0618BF202_2_0618BF20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06189FA02_2_06189FA0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06186FF82_2_06186FF8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06186FE82_2_06186FE8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0618743F2_2_0618743F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0618AC372_2_0618AC37
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061874502_2_06187450
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061804982_2_06180498
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061804882_2_06180488
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06187CF52_2_06187CF5
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06187D002_2_06187D00
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06180D392_2_06180D39
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0618C5702_2_0618C570
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061855B22_2_061855B2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061885A42_2_061885A4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061855C02_2_061855C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0618A5F02_2_0618A5F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06185A182_2_06185A18
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06185A082_2_06185A08
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0618D20B2_2_0618D20B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0618B2832_2_0618B283
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061862C82_2_061862C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061862C12_2_061862C1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061833502_2_06183350
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06186B782_2_06186B78
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06186B6C2_2_06186B6C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061833602_2_06183360
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061843D82_2_061843D8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0618CBC02_2_0618CBC0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06188BFD2_2_06188BFD
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061800312_2_06180031
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061828582_2_06182858
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061828482_2_06182848
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061800402_2_06180040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0618789D2_2_0618789D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061878A82_2_061878A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0618B8D02_2_0618B8D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061808F02_2_061808F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061808E12_2_061808E1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061851322_2_06185132
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061881582_2_06188158
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0618814D2_2_0618814D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061851402_2_06185140
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: String function: 004115D7 appears 36 times
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: String function: 00416C70 appears 39 times
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: String function: 00445AE0 appears 55 times
              Source: 114mCZlpa3.exe, 00000000.00000003.2049881839.00000000045B3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 114mCZlpa3.exe
              Source: 114mCZlpa3.exe, 00000000.00000003.2048736465.000000000475D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 114mCZlpa3.exe
              Source: 114mCZlpa3.exe, 00000000.00000002.2052378648.0000000001690000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs 114mCZlpa3.exe
              Source: 114mCZlpa3.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.114mCZlpa3.exe.1690000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.114mCZlpa3.exe.1690000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.114mCZlpa3.exe.1690000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.114mCZlpa3.exe.1690000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.114mCZlpa3.exe.1690000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.114mCZlpa3.exe.1690000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.114mCZlpa3.exe.1690000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.114mCZlpa3.exe.1690000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000002.00000002.4507918514.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000002.00000002.4507918514.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000000.00000002.2052378648.0000000001690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000000.00000002.2052378648.0000000001690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000000.00000002.2052378648.0000000001690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000000.00000002.2052378648.0000000001690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: 114mCZlpa3.exe PID: 3440, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: 114mCZlpa3.exe PID: 3440, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: RegSvcs.exe PID: 6348, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: RegSvcs.exe PID: 6348, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.114mCZlpa3.exe.1690000.1.raw.unpack, .csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.114mCZlpa3.exe.1690000.1.raw.unpack, .csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.114mCZlpa3.exe.1690000.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.114mCZlpa3.exe.1690000.1.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/2
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0047839D CoInitialize,CoCreateInstance,CoUninitialize,0_2_0047839D
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
              Source: C:\Users\user\Desktop\114mCZlpa3.exeFile created: C:\Users\user\AppData\Local\Temp\chiffonsJump to behavior
              Source: 114mCZlpa3.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\114mCZlpa3.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\114mCZlpa3.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: RegSvcs.exe, 00000002.00000002.4509880252.0000000002948000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.0000000002938000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.000000000298A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.0000000002956000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.000000000297E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4510975668.000000000378E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: 114mCZlpa3.exeReversingLabs: Detection: 76%
              Source: C:\Users\user\Desktop\114mCZlpa3.exeFile read: C:\Users\user\Desktop\114mCZlpa3.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\114mCZlpa3.exe "C:\Users\user\Desktop\114mCZlpa3.exe"
              Source: C:\Users\user\Desktop\114mCZlpa3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\114mCZlpa3.exe"
              Source: C:\Users\user\Desktop\114mCZlpa3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\114mCZlpa3.exe"Jump to behavior
              Source: C:\Users\user\Desktop\114mCZlpa3.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\114mCZlpa3.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\114mCZlpa3.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\114mCZlpa3.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\114mCZlpa3.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\114mCZlpa3.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\114mCZlpa3.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\114mCZlpa3.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\114mCZlpa3.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\114mCZlpa3.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\114mCZlpa3.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\114mCZlpa3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: 114mCZlpa3.exeStatic file information: File size 1066779 > 1048576
              Source: Binary string: wntdll.pdbUGP source: 114mCZlpa3.exe, 00000000.00000003.2048022932.0000000004490000.00000004.00001000.00020000.00000000.sdmp, 114mCZlpa3.exe, 00000000.00000003.2049148533.0000000004630000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: 114mCZlpa3.exe, 00000000.00000003.2048022932.0000000004490000.00000004.00001000.00020000.00000000.sdmp, 114mCZlpa3.exe, 00000000.00000003.2049148533.0000000004630000.00000004.00001000.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
              Source: 114mCZlpa3.exeStatic PE information: real checksum: 0xa961f should be: 0x1049ff
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (132).png
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
              Source: C:\Users\user\Desktop\114mCZlpa3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\114mCZlpa3.exeAPI/Special instruction interceptor: Address: 3F1B254
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599891Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599782Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599657Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599547Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599438Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599313Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599188Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599063Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598938Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598829Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598704Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598496Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598359Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598249Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598141Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598016Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597907Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597782Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597657Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597547Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597438Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597313Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597188Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597063Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596938Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596829Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596704Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596579Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596454Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596329Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596204Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596078Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595966Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595843Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595716Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1486Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8333Jump to behavior
              Source: C:\Users\user\Desktop\114mCZlpa3.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-87523
              Source: C:\Users\user\Desktop\114mCZlpa3.exeAPI coverage: 3.5 %
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599891Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599782Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599657Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599547Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599438Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599313Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599188Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599063Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598938Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598829Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598704Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598496Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598359Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598249Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598141Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598016Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597907Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597782Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597657Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597547Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597438Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597313Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597188Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597063Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596938Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596829Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596704Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596579Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596454Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596329Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596204Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596078Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595966Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595843Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595716Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593735Jump to behavior
              Source: RegSvcs.exe, 00000002.00000002.4508642645.0000000000888000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\114mCZlpa3.exeAPI call chain: ExitProcess graph end nodegraph_0-86647
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_03F1B520 mov eax, dword ptr fs:[00000030h]0_2_03F1B520
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_03F1B4C0 mov eax, dword ptr fs:[00000030h]0_2_03F1B4C0
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_03F19EB0 mov eax, dword ptr fs:[00000030h]0_2_03F19EB0
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\114mCZlpa3.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\114mCZlpa3.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 794008Jump to behavior
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
              Source: C:\Users\user\Desktop\114mCZlpa3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\114mCZlpa3.exe"Jump to behavior
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
              Source: 114mCZlpa3.exeBinary or memory string: Shell_TrayWnd
              Source: 114mCZlpa3.exeBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,SetOaNoCache,0_2_0041E364
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.114mCZlpa3.exe.1690000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.114mCZlpa3.exe.1690000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4507918514.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2052378648.0000000001690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4509880252.00000000028CD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4509880252.0000000002701000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 114mCZlpa3.exe PID: 3440, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6348, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: 114mCZlpa3.exeBinary or memory string: WIN_XP
              Source: 114mCZlpa3.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
              Source: 114mCZlpa3.exeBinary or memory string: WIN_XPe
              Source: 114mCZlpa3.exeBinary or memory string: WIN_VISTA
              Source: 114mCZlpa3.exeBinary or memory string: WIN_7
              Source: 114mCZlpa3.exeBinary or memory string: WIN_8
              Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.114mCZlpa3.exe.1690000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.114mCZlpa3.exe.1690000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4507918514.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2052378648.0000000001690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 114mCZlpa3.exe PID: 3440, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6348, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.114mCZlpa3.exe.1690000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.114mCZlpa3.exe.1690000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4507918514.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2052378648.0000000001690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4509880252.00000000028CD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.4509880252.0000000002701000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 114mCZlpa3.exe PID: 3440, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6348, type: MEMORYSTR
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
              Source: C:\Users\user\Desktop\114mCZlpa3.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure2
              Valid Accounts
              2
              Native API
              1
              DLL Side-Loading
              1
              Exploitation for Privilege Escalation
              11
              Disable or Modify Tools
              1
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services11
              Archive Collected Data
              2
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault AccountsScheduled Task/Job2
              Valid Accounts
              1
              DLL Side-Loading
              11
              Deobfuscate/Decode Files or Information
              21
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              11
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
              Valid Accounts
              3
              Obfuscated Files or Information
              Security Account Manager2
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
              Access Token Manipulation
              1
              DLL Side-Loading
              NTDS117
              System Information Discovery
              Distributed Component Object Model21
              Input Capture
              13
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
              Process Injection
              1
              Masquerading
              LSA Secrets121
              Security Software Discovery
              SSH3
              Clipboard Data
              Fallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
              Valid Accounts
              Cached Domain Credentials11
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
              Virtualization/Sandbox Evasion
              DCSync2
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
              Access Token Manipulation
              Proc Filesystem11
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
              Process Injection
              /etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
              System Network Configuration Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              114mCZlpa3.exe76%ReversingLabsWin32.Spyware.Snakekeylogger
              114mCZlpa3.exe100%AviraHEUR/AGEN.1321293
              114mCZlpa3.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://reallyfreegeoip.org0%URL Reputationsafe
              http://checkip.dyndns.org0%URL Reputationsafe
              http://checkip.dyndns.org/0%URL Reputationsafe
              http://checkip.dyndns.com0%URL Reputationsafe
              https://reallyfreegeoip.org/xml/8.46.123.330%URL Reputationsafe
              https://reallyfreegeoip.org/xml/8.46.123.33$0%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              http://checkip.dyndns.org/q0%URL Reputationsafe
              http://reallyfreegeoip.org0%URL Reputationsafe
              https://reallyfreegeoip.org/xml/0%URL Reputationsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              reallyfreegeoip.org
              188.114.97.3
              truetrue
                unknown
                checkip.dyndns.com
                193.122.6.168
                truefalse
                  unknown
                  checkip.dyndns.org
                  unknown
                  unknowntrue
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    http://checkip.dyndns.org/false
                    • URL Reputation: safe
                    unknown
                    https://reallyfreegeoip.org/xml/8.46.123.33false
                    • URL Reputation: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://reallyfreegeoip.orgRegSvcs.exe, 00000002.00000002.4509880252.0000000002869000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000027C8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.0000000002884000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.000000000285B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.000000000280B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.0000000002876000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000028C0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000028B2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://checkip.dyndns.orgRegSvcs.exe, 00000002.00000002.4509880252.0000000002869000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000027C8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.0000000002884000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.000000000285B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.000000000280B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.0000000002892000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.0000000002876000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000028C0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000027BC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000028B2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://checkip.dyndns.comRegSvcs.exe, 00000002.00000002.4509880252.0000000002869000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000027C8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.0000000002884000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.000000000285B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.0000000002876000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000028C0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000028B2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://reallyfreegeoip.org/xml/8.46.123.33$RegSvcs.exe, 00000002.00000002.4509880252.0000000002869000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.0000000002884000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.000000000285B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.000000000280B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.0000000002876000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000028C0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000028B2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.4509880252.0000000002701000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://checkip.dyndns.org/q114mCZlpa3.exe, 00000000.00000002.2052378648.0000000001690000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4507918514.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://reallyfreegeoip.orgRegSvcs.exe, 00000002.00000002.4509880252.00000000027E1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.0000000002869000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.0000000002884000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.000000000285B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.0000000002876000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000028C0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000028B2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://reallyfreegeoip.org/xml/114mCZlpa3.exe, 00000000.00000002.2052378648.0000000001690000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4509880252.00000000027C8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4507918514.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    188.114.97.3
                    reallyfreegeoip.orgEuropean Union
                    13335CLOUDFLARENETUStrue
                    193.122.6.168
                    checkip.dyndns.comUnited States
                    31898ORACLE-BMC-31898USfalse
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1529034
                    Start date and time:2024-10-08 15:26:47 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 8m 1s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:5
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:114mCZlpa3.exe
                    renamed because original name is a hash value
                    Original Sample Name:5c73d9378bca7a5eecefe91b7999cae483e2aa31ee49f46b21d6c97a7eabaad8.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@3/1@2/2
                    EGA Information:
                    • Successful, ratio: 50%
                    HCA Information:
                    • Successful, ratio: 99%
                    • Number of executed functions: 54
                    • Number of non-executed functions: 301
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Execution Graph export aborted for target RegSvcs.exe, PID 6348 because it is empty
                    • Report size exceeded maximum capacity and may have missing disassembly code.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    • VT rate limit hit for: 114mCZlpa3.exe
                    TimeTypeDescription
                    09:27:50API Interceptor10997861x Sleep call for process: RegSvcs.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    188.114.97.3scan_374783.jsGet hashmaliciousAgentTeslaBrowse
                    • paste.ee/d/gvOd3
                    IRYzGMMbSw.exeGet hashmaliciousFormBookBrowse
                    • www.bayarcepat19.click/yuvr/
                    Arrival Notice.exeGet hashmaliciousFormBookBrowse
                    • www.cc101.pro/0r21/
                    http://www.thegulfthermale.com.tr/antai/12/3dsec.phpGet hashmaliciousUnknownBrowse
                    • www.thegulfthermale.com.tr/antai/12/3dsec.php
                    QUOTATION_OCTQTRA071244PDF.scr.exeGet hashmaliciousUnknownBrowse
                    • filetransfer.io/data-package/eZFzMENr/download
                    QUOTATION_OCTQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                    • filetransfer.io/data-package/MlZtCPkK/download
                    https://technopro-bg.com/redirect.php?action=url&goto=mairie-espondeilhan.com&osCsid=m24rb0l158b8m36rktotvg5ti2Get hashmaliciousHTMLPhisherBrowse
                    • mairie-espondeilhan.com/
                    QUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                    • filetransfer.io/data-package/758bYd86/download
                    QUOTATION_OCTQTRA071244PDF.scr.exeGet hashmaliciousUnknownBrowse
                    • filetransfer.io/data-package/58PSl7si/download
                    QUOTATION_OCTQTRA071244PDF.scr.exeGet hashmaliciousUnknownBrowse
                    • filetransfer.io/data-package/58PSl7si/download
                    193.122.6.1683g833ZIrnA.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • checkip.dyndns.org/
                    Siparis PO# DT-TE-160924R0 _323282-_563028621286 pdf .exeGet hashmaliciousSnake KeyloggerBrowse
                    • checkip.dyndns.org/
                    PO.L0009316.Pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • checkip.dyndns.org/
                    Order.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • checkip.dyndns.org/
                    RFQ Ref. No CRCCRFQHAFJIHDG2-KSU001 REV.01..exeGet hashmaliciousSnake KeyloggerBrowse
                    • checkip.dyndns.org/
                    PO.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • checkip.dyndns.org/
                    Pla#U0107anje,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • checkip.dyndns.org/
                    ENQUIRY NEED QUOTATION.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • checkip.dyndns.org/
                    na.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                    • checkip.dyndns.org/
                    8038.exeGet hashmaliciousSnake KeyloggerBrowse
                    • checkip.dyndns.org/
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    reallyfreegeoip.orgRequest for Quotation Plug Valve.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 188.114.96.3
                    3g833ZIrnA.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 188.114.97.3
                    103_25IBOT242790502_725597355.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 188.114.97.3
                    tax-invoice-0711.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.97.3
                    PO-009 Compurent.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 188.114.96.3
                    TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                    • 188.114.97.3
                    Siparis PO# DT-TE-160924R0 _323282-_563028621286 pdf .exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.97.3
                    NXPYoHNSgv.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 188.114.96.3
                    Order.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 188.114.97.3
                    QUOTATION_OCTQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 188.114.96.3
                    checkip.dyndns.comRequest for Quotation Plug Valve.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 193.122.130.0
                    3g833ZIrnA.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 132.226.8.169
                    103_25IBOT242790502_725597355.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 158.101.44.242
                    tax-invoice-0711.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 193.122.130.0
                    PO-009 Compurent.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 158.101.44.242
                    TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                    • 158.101.44.242
                    Siparis PO# DT-TE-160924R0 _323282-_563028621286 pdf .exeGet hashmaliciousSnake KeyloggerBrowse
                    • 193.122.6.168
                    PO.L0009316.Pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 193.122.6.168
                    NXPYoHNSgv.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 132.226.247.73
                    Order.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 193.122.6.168
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    ORACLE-BMC-31898USRequest for Quotation Plug Valve.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 193.122.130.0
                    3g833ZIrnA.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 193.122.6.168
                    103_25IBOT242790502_725597355.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 158.101.44.242
                    tax-invoice-0711.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 193.122.130.0
                    PO-009 Compurent.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 158.101.44.242
                    SecuriteInfo.com.PUA.Tool.InstSrv.3.16098.13705.exeGet hashmaliciousUnknownBrowse
                    • 152.67.146.77
                    SecuriteInfo.com.PUA.Tool.InstSrv.3.16098.13705.exeGet hashmaliciousUnknownBrowse
                    • 152.67.146.77
                    TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                    • 158.101.44.242
                    Siparis PO# DT-TE-160924R0 _323282-_563028621286 pdf .exeGet hashmaliciousSnake KeyloggerBrowse
                    • 193.122.6.168
                    PO.L0009316.Pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 193.122.6.168
                    CLOUDFLARENETUSUpdate.jsGet hashmaliciousNetSupport RATBrowse
                    • 104.26.1.231
                    Remittance_Raveis.htmGet hashmaliciousUnknownBrowse
                    • 188.114.96.3
                    osjCeEFNrF.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    • 104.26.13.205
                    LYqMgahOY0.exeGet hashmaliciousAgentTeslaBrowse
                    • 172.67.74.152
                    Iw7mPc6fCG.exeGet hashmaliciousAgentTeslaBrowse
                    • 104.26.12.205
                    UyvVIyj7Ga.exeGet hashmaliciousUnknownBrowse
                    • 162.159.136.232
                    Request for Quotation Plug Valve.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 188.114.96.3
                    3g833ZIrnA.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 188.114.97.3
                    https://support.squarespacrenewel.retroestyle.com/?DTYUI0=RTDM45Get hashmaliciousUnknownBrowse
                    • 104.17.25.14
                    file.exeGet hashmaliciousLummaC, VidarBrowse
                    • 104.21.53.8
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    54328bd36c14bd82ddaa0c04b25ed9adRequest for Quotation Plug Valve.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 188.114.97.3
                    3g833ZIrnA.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 188.114.97.3
                    103_25IBOT242790502_725597355.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 188.114.97.3
                    tax-invoice-0711.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.97.3
                    PO-009 Compurent.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 188.114.97.3
                    TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                    • 188.114.97.3
                    Siparis PO# DT-TE-160924R0 _323282-_563028621286 pdf .exeGet hashmaliciousSnake KeyloggerBrowse
                    • 188.114.97.3
                    NXPYoHNSgv.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 188.114.97.3
                    QUOTATION_OCTQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 188.114.97.3
                    PO_89_202876.Pdf.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                    • 188.114.97.3
                    No context
                    Process:C:\Users\user\Desktop\114mCZlpa3.exe
                    File Type:MIPSEB MIPS-II ECOFF executable not stripped - version 50.68
                    Category:dropped
                    Size (bytes):133632
                    Entropy (8bit):7.005377816215774
                    Encrypted:false
                    SSDEEP:3072:bHGvaMXOcDdkd9FFpRBfdA6eoVowXqAuJlj5N2PCH0Utn:bHGvaMXO4MFrAHmXq/vd0m
                    MD5:DB28B8E6848EBA32743A6B3CBC2B3DB8
                    SHA1:BE3ED09C8364215D5CC00AC97C4DBD653D813C87
                    SHA-256:45AD21AFB36F1C76385AFDB108C1AB4FBCD3AEECF8BE94CFF826055CE8193028
                    SHA-512:C30FD16A31A8DAF87F43429BCC19F01FA80F5E58BDD63E923D79F0C57C88421042DF9CC6FFDCA3D2E6F98DCB778E30FBC912093EB5E556F34036D4AE35454763
                    Malicious:false
                    Reputation:low
                    Preview:.c.NVK12@1OX.GL.WNUK12DqOX3QGL9WNUK12D1OX3QGL9WNUK12D1OX3QG.9WN[T.<D.F...F..v.="B.4C ?A0*lZ6 ;$E.&To*F?g%Ww...._+U*v>\Mh9WNUK12.tOX.PDL.z.3K12D1OX3.GN8\O.K1.E1OL3QGL9WPFI12d1OX.SGL9.NUk12D3OX7QGL9WNUO12D1OX3Q'N9WLUK12D1MXs.GL)WNEK12D!OX#QGL9WNEK12D1OX3QGL.ELU.12D1oZ3.WL9WNUK12D1OX3QGL9WN.I1>D1OX3QGL9WNUK12D1OX3QGL9WNUK12D1OX3QGL9WNUK12D1OX3QGl9WFUK12D1OX3QGD.WN.K12D1OX3QGL.#+-?12D..Y3QgL9W.TK10D1OX3QGL9WNUK1.D1/vA"5/9WN.[12D.MX3CGL9.OUK12D1OX3QGL9.NU..@!] ;3QKL9WN.I12F1OX;SGL9WNUK12D1OXsQG.9WNUK12D1OX3QGL9W]WK12D1.X3QEL<W.tJ1z.1O[3QG.9WH.k02.1OX3QGL9WNUK12D1OX3QGL9WNUK12D1OX3QGL9WNUK1.9.@...?..NUK12D0M[7WOD9WNUK12DOOX3.GL9.NUK.2D1jX3Q*L9WjUK1LD1O&3QG(9WN'K12%1OXtQGLVWNU%12DOOX3OEd.WN_a.2F.nX3[Gf.$lUK;.E1O\@rGL3.LUK5A`1OR.RGL=$kUK;.@1O\@wGL3.KUK5..1L.%WGL"8wUK;2G.Z^3Q\f.WL}q12N1e~3R.Y?WNNa.2F.FX3Um.JJNUM.qD1E,:QGN.]NUO.,F..X3[mnGGNUO.2n.1I3QCg9}l+Y12@.Or./TL9SeUa.LP1O\.QmR;.ZUK5.fOZX3UlL.u0CK16o1ezMFGL=|N.U3.S1O\.Wm.9%0IKA1+.OX5y.L9]f5K14D.uXMqGL=U!.K18b..X1yDM9]NWHL.D1KZ7,pL9Sd.K3I}1
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):7.169406125795206
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:114mCZlpa3.exe
                    File size:1'066'779 bytes
                    MD5:a5b62d982db9a3841c9c3f381f25146e
                    SHA1:f9c714ccd984e7f7bfef5964ae761b968ee74828
                    SHA256:5c73d9378bca7a5eecefe91b7999cae483e2aa31ee49f46b21d6c97a7eabaad8
                    SHA512:5fe9b5cf77939688aa62713941d1bc4c419d1d4442d154bae03f4e950798a4772cd4396efba4e55f5d6f3baacf1f8fbf7ca9125dd4223c40ff5e1ad951f0fd25
                    SSDEEP:24576:pRmJkcoQricOIQxiZY1iaajQr1zoxHHLlI62zZbZVz:mJZoQrbTFZY1iaiEoZ0VDz
                    TLSH:5B35D022F5C68075C1B327B19D7EF765963D6D2A0326D19B33C83E366EB01416B29B23
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
                    Icon Hash:0fd88dc89ea7861b
                    Entrypoint:0x4165c1
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    DLL Characteristics:TERMINAL_SERVER_AWARE
                    Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:5
                    OS Version Minor:0
                    File Version Major:5
                    File Version Minor:0
                    Subsystem Version Major:5
                    Subsystem Version Minor:0
                    Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
                    Instruction
                    call 00007FECF4B720CBh
                    jmp 00007FECF4B68F3Eh
                    int3
                    int3
                    int3
                    int3
                    int3
                    push ebp
                    mov ebp, esp
                    push edi
                    push esi
                    mov esi, dword ptr [ebp+0Ch]
                    mov ecx, dword ptr [ebp+10h]
                    mov edi, dword ptr [ebp+08h]
                    mov eax, ecx
                    mov edx, ecx
                    add eax, esi
                    cmp edi, esi
                    jbe 00007FECF4B690BAh
                    cmp edi, eax
                    jc 00007FECF4B69256h
                    cmp ecx, 00000080h
                    jc 00007FECF4B690CEh
                    cmp dword ptr [004A9724h], 00000000h
                    je 00007FECF4B690C5h
                    push edi
                    push esi
                    and edi, 0Fh
                    and esi, 0Fh
                    cmp edi, esi
                    pop esi
                    pop edi
                    jne 00007FECF4B690B7h
                    jmp 00007FECF4B69492h
                    test edi, 00000003h
                    jne 00007FECF4B690C6h
                    shr ecx, 02h
                    and edx, 03h
                    cmp ecx, 08h
                    jc 00007FECF4B690DBh
                    rep movsd
                    jmp dword ptr [00416740h+edx*4]
                    mov eax, edi
                    mov edx, 00000003h
                    sub ecx, 04h
                    jc 00007FECF4B690BEh
                    and eax, 03h
                    add ecx, eax
                    jmp dword ptr [00416654h+eax*4]
                    jmp dword ptr [00416750h+ecx*4]
                    nop
                    jmp dword ptr [004166D4h+ecx*4]
                    nop
                    inc cx
                    add byte ptr [eax-4BFFBE9Ah], dl
                    inc cx
                    add byte ptr [ebx], ah
                    ror dword ptr [edx-75F877FAh], 1
                    inc esi
                    add dword ptr [eax+468A0147h], ecx
                    add al, cl
                    jmp 00007FECF6FE18B7h
                    add esi, 03h
                    add edi, 03h
                    cmp ecx, 08h
                    jc 00007FECF4B6907Eh
                    rep movsd
                    jmp dword ptr [00000000h+edx*4]
                    Programming Language:
                    • [ C ] VS2010 SP1 build 40219
                    • [C++] VS2010 SP1 build 40219
                    • [ C ] VS2008 SP1 build 30729
                    • [IMP] VS2008 SP1 build 30729
                    • [ASM] VS2010 SP1 build 40219
                    • [RES] VS2010 SP1 build 40219
                    • [LNK] VS2010 SP1 build 40219
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x13778.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0xab0000x137780x138002ac39c9ceeb6104c0860a528ca24cba0False0.16701722756410256data4.016130089132254IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_ICON0xab4480x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                    RT_ICON0xab5700x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                    RT_ICON0xab6980x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                    RT_ICON0xab7c00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 60472 x 60472 px/mEnglishGreat Britain0.14468236129184905
                    RT_MENU0xbbfe80x50dataEnglishGreat Britain0.9
                    RT_DIALOG0xbc0380xfcdataEnglishGreat Britain0.6507936507936508
                    RT_STRING0xbc1380x530dataEnglishGreat Britain0.33960843373493976
                    RT_STRING0xbc6680x690dataEnglishGreat Britain0.26964285714285713
                    RT_STRING0xbccf80x4d0dataEnglishGreat Britain0.36363636363636365
                    RT_STRING0xbd1c80x5fcdataEnglishGreat Britain0.3087467362924282
                    RT_STRING0xbd7c80x65cdataEnglishGreat Britain0.34336609336609336
                    RT_STRING0xbde280x388dataEnglishGreat Britain0.377212389380531
                    RT_STRING0xbe1b00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                    RT_GROUP_ICON0xbe3080x14dataEnglishGreat Britain1.25
                    RT_GROUP_ICON0xbe3200x14dataEnglishGreat Britain1.15
                    RT_GROUP_ICON0xbe3380x14dataEnglishGreat Britain1.25
                    RT_GROUP_ICON0xbe3500x14dataEnglishGreat Britain1.25
                    RT_VERSION0xbe3680x19cdataEnglishGreat Britain0.5339805825242718
                    RT_MANIFEST0xbe5080x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                    DLLImport
                    WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                    VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                    WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                    COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                    MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                    WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                    PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                    USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                    KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
                    USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
                    GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
                    COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                    ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
                    SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                    ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
                    OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
                    Language of compilation systemCountry where language is spokenMap
                    EnglishGreat Britain
                    EnglishUnited States
                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                    2024-10-08T15:27:50.986935+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549704193.122.6.16880TCP
                    2024-10-08T15:27:51.929021+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549704193.122.6.16880TCP
                    2024-10-08T15:27:52.487317+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549706188.114.97.3443TCP
                    2024-10-08T15:27:53.190128+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549707193.122.6.16880TCP
                    2024-10-08T15:27:54.027764+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549708188.114.97.3443TCP
                    2024-10-08T15:28:02.049651+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549718188.114.97.3443TCP
                    TimestampSource PortDest PortSource IPDest IP
                    Oct 8, 2024 15:27:50.059838057 CEST4970480192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:50.064867020 CEST8049704193.122.6.168192.168.2.5
                    Oct 8, 2024 15:27:50.064951897 CEST4970480192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:50.069816113 CEST4970480192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:50.074749947 CEST8049704193.122.6.168192.168.2.5
                    Oct 8, 2024 15:27:50.702256918 CEST8049704193.122.6.168192.168.2.5
                    Oct 8, 2024 15:27:50.747591972 CEST4970480192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:50.752710104 CEST8049704193.122.6.168192.168.2.5
                    Oct 8, 2024 15:27:50.935933113 CEST8049704193.122.6.168192.168.2.5
                    Oct 8, 2024 15:27:50.986033916 CEST49705443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:50.986073017 CEST44349705188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:50.986145020 CEST49705443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:50.986934900 CEST4970480192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:50.993177891 CEST49705443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:50.993207932 CEST44349705188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:51.484519005 CEST44349705188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:51.484874964 CEST49705443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:51.491842031 CEST49705443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:51.491873026 CEST44349705188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:51.492300987 CEST44349705188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:51.533955097 CEST49705443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:51.544507027 CEST49705443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:51.591407061 CEST44349705188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:51.674688101 CEST44349705188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:51.674784899 CEST44349705188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:51.674963951 CEST49705443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:51.688925028 CEST49705443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:51.692457914 CEST4970480192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:51.697487116 CEST8049704193.122.6.168192.168.2.5
                    Oct 8, 2024 15:27:51.880637884 CEST8049704193.122.6.168192.168.2.5
                    Oct 8, 2024 15:27:51.884581089 CEST49706443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:51.884633064 CEST44349706188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:51.884737968 CEST49706443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:51.885031939 CEST49706443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:51.885047913 CEST44349706188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:51.929020882 CEST4970480192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:52.346620083 CEST44349706188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:52.349354982 CEST49706443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:52.349400043 CEST44349706188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:52.487346888 CEST44349706188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:52.487451077 CEST44349706188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:52.487571001 CEST49706443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:52.488085032 CEST49706443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:52.491322994 CEST4970480192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:52.492604971 CEST4970780192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:52.497231960 CEST8049704193.122.6.168192.168.2.5
                    Oct 8, 2024 15:27:52.497298956 CEST4970480192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:52.497654915 CEST8049707193.122.6.168192.168.2.5
                    Oct 8, 2024 15:27:52.497720003 CEST4970780192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:52.497853994 CEST4970780192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:52.503452063 CEST8049707193.122.6.168192.168.2.5
                    Oct 8, 2024 15:27:53.139225006 CEST8049707193.122.6.168192.168.2.5
                    Oct 8, 2024 15:27:53.140368938 CEST49708443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:53.140398979 CEST44349708188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:53.140717983 CEST49708443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:53.140717983 CEST49708443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:53.140748024 CEST44349708188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:53.190128088 CEST4970780192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:53.619736910 CEST44349708188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:53.621421099 CEST49708443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:53.621449947 CEST44349708188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:54.027772903 CEST44349708188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:54.027873993 CEST44349708188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:54.028006077 CEST49708443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:54.028563023 CEST49708443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:54.032869101 CEST4970980192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:54.324212074 CEST8049709193.122.6.168192.168.2.5
                    Oct 8, 2024 15:27:54.324281931 CEST4970980192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:54.324426889 CEST4970980192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:54.329502106 CEST8049709193.122.6.168192.168.2.5
                    Oct 8, 2024 15:27:54.956305027 CEST8049709193.122.6.168192.168.2.5
                    Oct 8, 2024 15:27:54.957845926 CEST49710443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:54.957897902 CEST44349710188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:54.957972050 CEST49710443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:54.958192110 CEST49710443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:54.958201885 CEST44349710188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:55.002576113 CEST4970980192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:55.423288107 CEST44349710188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:55.425025940 CEST49710443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:55.425056934 CEST44349710188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:55.575649977 CEST44349710188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:55.575759888 CEST44349710188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:55.575841904 CEST49710443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:55.576325893 CEST49710443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:55.579942942 CEST4970980192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:55.580518007 CEST4971180192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:55.585462093 CEST8049709193.122.6.168192.168.2.5
                    Oct 8, 2024 15:27:55.585557938 CEST4970980192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:55.585928917 CEST8049711193.122.6.168192.168.2.5
                    Oct 8, 2024 15:27:55.585992098 CEST4971180192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:55.586112976 CEST4971180192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:55.591181993 CEST8049711193.122.6.168192.168.2.5
                    Oct 8, 2024 15:27:56.392154932 CEST8049711193.122.6.168192.168.2.5
                    Oct 8, 2024 15:27:56.393596888 CEST49712443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:56.393646002 CEST44349712188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:56.393757105 CEST49712443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:56.394013882 CEST49712443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:56.394028902 CEST44349712188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:56.440084934 CEST4971180192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:56.866225958 CEST44349712188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:56.867965937 CEST49712443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:56.867996931 CEST44349712188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:57.022500992 CEST44349712188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:57.022597075 CEST44349712188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:57.022685051 CEST49712443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:57.023332119 CEST49712443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:57.026793003 CEST4971180192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:57.027982950 CEST4971380192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:57.032655954 CEST8049711193.122.6.168192.168.2.5
                    Oct 8, 2024 15:27:57.032731056 CEST4971180192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:57.033201933 CEST8049713193.122.6.168192.168.2.5
                    Oct 8, 2024 15:27:57.033269882 CEST4971380192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:57.033375025 CEST4971380192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:57.038288116 CEST8049713193.122.6.168192.168.2.5
                    Oct 8, 2024 15:27:57.671538115 CEST8049713193.122.6.168192.168.2.5
                    Oct 8, 2024 15:27:57.673242092 CEST49714443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:57.673291922 CEST44349714188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:57.673367023 CEST49714443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:57.673629999 CEST49714443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:57.673640013 CEST44349714188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:57.721369982 CEST4971380192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:58.137465954 CEST44349714188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:58.153373957 CEST49714443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:58.153412104 CEST44349714188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:58.285480976 CEST44349714188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:58.285588026 CEST44349714188.114.97.3192.168.2.5
                    Oct 8, 2024 15:27:58.285634041 CEST49714443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:58.286164999 CEST49714443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:27:58.289808035 CEST4971380192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:58.290504932 CEST4971580192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:58.295927048 CEST8049713193.122.6.168192.168.2.5
                    Oct 8, 2024 15:27:58.295989990 CEST4971380192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:58.296509027 CEST8049715193.122.6.168192.168.2.5
                    Oct 8, 2024 15:27:58.296703100 CEST4971580192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:58.296703100 CEST4971580192.168.2.5193.122.6.168
                    Oct 8, 2024 15:27:58.302011967 CEST8049715193.122.6.168192.168.2.5
                    Oct 8, 2024 15:28:00.097620964 CEST8049715193.122.6.168192.168.2.5
                    Oct 8, 2024 15:28:00.098151922 CEST8049715193.122.6.168192.168.2.5
                    Oct 8, 2024 15:28:00.098403931 CEST8049715193.122.6.168192.168.2.5
                    Oct 8, 2024 15:28:00.098412037 CEST4971580192.168.2.5193.122.6.168
                    Oct 8, 2024 15:28:00.098727942 CEST4971580192.168.2.5193.122.6.168
                    Oct 8, 2024 15:28:00.099121094 CEST8049715193.122.6.168192.168.2.5
                    Oct 8, 2024 15:28:00.099191904 CEST49716443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:28:00.099191904 CEST4971580192.168.2.5193.122.6.168
                    Oct 8, 2024 15:28:00.099220991 CEST44349716188.114.97.3192.168.2.5
                    Oct 8, 2024 15:28:00.099534988 CEST49716443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:28:00.099534988 CEST49716443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:28:00.099564075 CEST44349716188.114.97.3192.168.2.5
                    Oct 8, 2024 15:28:00.604424000 CEST44349716188.114.97.3192.168.2.5
                    Oct 8, 2024 15:28:00.607086897 CEST49716443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:28:00.607103109 CEST44349716188.114.97.3192.168.2.5
                    Oct 8, 2024 15:28:00.760349989 CEST44349716188.114.97.3192.168.2.5
                    Oct 8, 2024 15:28:00.760482073 CEST44349716188.114.97.3192.168.2.5
                    Oct 8, 2024 15:28:00.760776997 CEST49716443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:28:00.761200905 CEST49716443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:28:00.764406919 CEST4971580192.168.2.5193.122.6.168
                    Oct 8, 2024 15:28:00.765399933 CEST4971780192.168.2.5193.122.6.168
                    Oct 8, 2024 15:28:00.770328999 CEST8049715193.122.6.168192.168.2.5
                    Oct 8, 2024 15:28:00.770420074 CEST4971580192.168.2.5193.122.6.168
                    Oct 8, 2024 15:28:00.771528006 CEST8049717193.122.6.168192.168.2.5
                    Oct 8, 2024 15:28:00.771609068 CEST4971780192.168.2.5193.122.6.168
                    Oct 8, 2024 15:28:00.771735907 CEST4971780192.168.2.5193.122.6.168
                    Oct 8, 2024 15:28:00.777081966 CEST8049717193.122.6.168192.168.2.5
                    Oct 8, 2024 15:28:01.409115076 CEST8049717193.122.6.168192.168.2.5
                    Oct 8, 2024 15:28:01.410341024 CEST49718443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:28:01.410393000 CEST44349718188.114.97.3192.168.2.5
                    Oct 8, 2024 15:28:01.410480976 CEST49718443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:28:01.410746098 CEST49718443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:28:01.410761118 CEST44349718188.114.97.3192.168.2.5
                    Oct 8, 2024 15:28:01.455683947 CEST4971780192.168.2.5193.122.6.168
                    Oct 8, 2024 15:28:01.891725063 CEST44349718188.114.97.3192.168.2.5
                    Oct 8, 2024 15:28:01.893775940 CEST49718443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:28:01.893798113 CEST44349718188.114.97.3192.168.2.5
                    Oct 8, 2024 15:28:02.049669981 CEST44349718188.114.97.3192.168.2.5
                    Oct 8, 2024 15:28:02.049783945 CEST44349718188.114.97.3192.168.2.5
                    Oct 8, 2024 15:28:02.049835920 CEST49718443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:28:02.050229073 CEST49718443192.168.2.5188.114.97.3
                    Oct 8, 2024 15:28:58.137737036 CEST8049707193.122.6.168192.168.2.5
                    Oct 8, 2024 15:28:58.137888908 CEST4970780192.168.2.5193.122.6.168
                    Oct 8, 2024 15:29:06.409002066 CEST8049717193.122.6.168192.168.2.5
                    Oct 8, 2024 15:29:06.410600901 CEST4971780192.168.2.5193.122.6.168
                    Oct 8, 2024 15:29:41.425429106 CEST4971780192.168.2.5193.122.6.168
                    Oct 8, 2024 15:29:41.430435896 CEST8049717193.122.6.168192.168.2.5
                    TimestampSource PortDest PortSource IPDest IP
                    Oct 8, 2024 15:27:50.043411970 CEST5491353192.168.2.51.1.1.1
                    Oct 8, 2024 15:27:50.052439928 CEST53549131.1.1.1192.168.2.5
                    Oct 8, 2024 15:27:50.977109909 CEST5714253192.168.2.51.1.1.1
                    Oct 8, 2024 15:27:50.985332012 CEST53571421.1.1.1192.168.2.5
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Oct 8, 2024 15:27:50.043411970 CEST192.168.2.51.1.1.10x19aaStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                    Oct 8, 2024 15:27:50.977109909 CEST192.168.2.51.1.1.10x28b5Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Oct 8, 2024 15:27:50.052439928 CEST1.1.1.1192.168.2.50x19aaNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                    Oct 8, 2024 15:27:50.052439928 CEST1.1.1.1192.168.2.50x19aaNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                    Oct 8, 2024 15:27:50.052439928 CEST1.1.1.1192.168.2.50x19aaNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                    Oct 8, 2024 15:27:50.052439928 CEST1.1.1.1192.168.2.50x19aaNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                    Oct 8, 2024 15:27:50.052439928 CEST1.1.1.1192.168.2.50x19aaNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                    Oct 8, 2024 15:27:50.052439928 CEST1.1.1.1192.168.2.50x19aaNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                    Oct 8, 2024 15:27:50.985332012 CEST1.1.1.1192.168.2.50x28b5No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                    Oct 8, 2024 15:27:50.985332012 CEST1.1.1.1192.168.2.50x28b5No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                    • reallyfreegeoip.org
                    • checkip.dyndns.org
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.549704193.122.6.168806348C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                    TimestampBytes transferredDirectionData
                    Oct 8, 2024 15:27:50.069816113 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Oct 8, 2024 15:27:50.702256918 CEST320INHTTP/1.1 200 OK
                    Date: Tue, 08 Oct 2024 13:27:50 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: 7aa344f4ba772ff32cd56406f2f74c4a
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                    Oct 8, 2024 15:27:50.747591972 CEST127OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Oct 8, 2024 15:27:50.935933113 CEST320INHTTP/1.1 200 OK
                    Date: Tue, 08 Oct 2024 13:27:50 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: a9c36ec3e7cfd6e05eefb4bebc45bf24
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                    Oct 8, 2024 15:27:51.692457914 CEST127OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Oct 8, 2024 15:27:51.880637884 CEST320INHTTP/1.1 200 OK
                    Date: Tue, 08 Oct 2024 13:27:51 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: ea6a20f50b6d660bba3d2de8d3bf8d0e
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.549707193.122.6.168806348C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                    TimestampBytes transferredDirectionData
                    Oct 8, 2024 15:27:52.497853994 CEST127OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Oct 8, 2024 15:27:53.139225006 CEST320INHTTP/1.1 200 OK
                    Date: Tue, 08 Oct 2024 13:27:53 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: 52fb29109ac6189240de2b821b7a495c
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    2192.168.2.549709193.122.6.168806348C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                    TimestampBytes transferredDirectionData
                    Oct 8, 2024 15:27:54.324426889 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Oct 8, 2024 15:27:54.956305027 CEST320INHTTP/1.1 200 OK
                    Date: Tue, 08 Oct 2024 13:27:54 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: 78e1dccf5ab7ca9319061ff0297e6357
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    3192.168.2.549711193.122.6.168806348C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                    TimestampBytes transferredDirectionData
                    Oct 8, 2024 15:27:55.586112976 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Oct 8, 2024 15:27:56.392154932 CEST320INHTTP/1.1 200 OK
                    Date: Tue, 08 Oct 2024 13:27:56 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: 705347aa0814e02507bd00f6eb288b51
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    4192.168.2.549713193.122.6.168806348C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                    TimestampBytes transferredDirectionData
                    Oct 8, 2024 15:27:57.033375025 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Oct 8, 2024 15:27:57.671538115 CEST320INHTTP/1.1 200 OK
                    Date: Tue, 08 Oct 2024 13:27:57 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: 72643d32654fedd79e244d2f0ced5a7e
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    5192.168.2.549715193.122.6.168806348C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                    TimestampBytes transferredDirectionData
                    Oct 8, 2024 15:27:58.296703100 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Oct 8, 2024 15:28:00.097620964 CEST320INHTTP/1.1 200 OK
                    Date: Tue, 08 Oct 2024 13:27:58 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: 56218b87f997d0cbf70c253823b4a3eb
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                    Oct 8, 2024 15:28:00.098151922 CEST320INHTTP/1.1 200 OK
                    Date: Tue, 08 Oct 2024 13:27:58 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: 56218b87f997d0cbf70c253823b4a3eb
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                    Oct 8, 2024 15:28:00.098403931 CEST320INHTTP/1.1 200 OK
                    Date: Tue, 08 Oct 2024 13:27:58 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: 56218b87f997d0cbf70c253823b4a3eb
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                    Oct 8, 2024 15:28:00.099121094 CEST320INHTTP/1.1 200 OK
                    Date: Tue, 08 Oct 2024 13:27:58 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: 56218b87f997d0cbf70c253823b4a3eb
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    6192.168.2.549717193.122.6.168806348C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                    TimestampBytes transferredDirectionData
                    Oct 8, 2024 15:28:00.771735907 CEST151OUTGET / HTTP/1.1
                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                    Host: checkip.dyndns.org
                    Connection: Keep-Alive
                    Oct 8, 2024 15:28:01.409115076 CEST320INHTTP/1.1 200 OK
                    Date: Tue, 08 Oct 2024 13:28:01 GMT
                    Content-Type: text/html
                    Content-Length: 103
                    Connection: keep-alive
                    Cache-Control: no-cache
                    Pragma: no-cache
                    X-Request-ID: eb6e8b5d09cfef4003d67799c730de36
                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.549705188.114.97.34436348C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                    TimestampBytes transferredDirectionData
                    2024-10-08 13:27:51 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    Connection: Keep-Alive
                    2024-10-08 13:27:51 UTC674INHTTP/1.1 200 OK
                    Date: Tue, 08 Oct 2024 13:27:51 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 60403
                    Last-Modified: Mon, 07 Oct 2024 20:41:08 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ca075MKvEio0%2FZ76SxXHkOd27a9fp5SLIN4gxvayUl2XQOojNtt%2BymEMyJjtLSkbztFOpgU7zkmErM2fB3R4rvXi7IHsNSXCkaMoq03c4W2ZmAgRIAvyOexjKNKWEkxx8nYDImc0"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8cf678837e528c4e-EWR
                    2024-10-08 13:27:51 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-10-08 13:27:51 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.549706188.114.97.34436348C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                    TimestampBytes transferredDirectionData
                    2024-10-08 13:27:52 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    2024-10-08 13:27:52 UTC684INHTTP/1.1 200 OK
                    Date: Tue, 08 Oct 2024 13:27:52 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 60404
                    Last-Modified: Mon, 07 Oct 2024 20:41:08 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DZneHtKlBWPxsn9lNQZYGJh%2FMKeiJ1M%2BCMY3bIgZgTFKUJ6xL0HSSCWaOnrkn6ECl61HbBavVDD%2FxLNQMvN5LeLK8TO9gmANcz6g284S%2BXilkFRgp%2FkodgTO%2Bxvpu9oWmH%2BCLVUu"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8cf67888a95d7cb4-EWR
                    2024-10-08 13:27:52 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-10-08 13:27:52 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    2192.168.2.549708188.114.97.34436348C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                    TimestampBytes transferredDirectionData
                    2024-10-08 13:27:53 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    2024-10-08 13:27:54 UTC680INHTTP/1.1 200 OK
                    Date: Tue, 08 Oct 2024 13:27:53 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 60405
                    Last-Modified: Mon, 07 Oct 2024 20:41:08 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=t1dZJrDD2nfUDV7gFYoGtPCE0DnY%2Brs%2B%2Bb0E6gM9GgGAnLRjH0CizXlrE%2FDayI7AiKVEjVpdXFZivBTLPPUs97XUJnnN9FKtFNUcQUdgorFAF%2FdAVcyRN57Z7DYWJvrHciopWWqo"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8cf67890be788c60-EWR
                    2024-10-08 13:27:54 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-10-08 13:27:54 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    3192.168.2.549710188.114.97.34436348C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                    TimestampBytes transferredDirectionData
                    2024-10-08 13:27:55 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    Connection: Keep-Alive
                    2024-10-08 13:27:55 UTC678INHTTP/1.1 200 OK
                    Date: Tue, 08 Oct 2024 13:27:55 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 60407
                    Last-Modified: Mon, 07 Oct 2024 20:41:08 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=d6ppo5SxkkveD6b3NqXZrPNTdto5JPbuLs2kcvvkUYNxsByeMLUChc%2F1L9zwDHknVV8Hn6jtenk1OAjQ3GrBwZgqW7eGrAD599dYm06tmJl5CH%2F%2F98QJ5Y9cQailaQTk%2Bm32HdLY"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8cf6789bee5c19bb-EWR
                    2024-10-08 13:27:55 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-10-08 13:27:55 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    4192.168.2.549712188.114.97.34436348C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                    TimestampBytes transferredDirectionData
                    2024-10-08 13:27:56 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    Connection: Keep-Alive
                    2024-10-08 13:27:57 UTC680INHTTP/1.1 200 OK
                    Date: Tue, 08 Oct 2024 13:27:56 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 60408
                    Last-Modified: Mon, 07 Oct 2024 20:41:08 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1irgpHl5kqJ0paj0q%2B5DE0KUVJIf0DS2wnthR3LdtHc5sc%2BQvzGsUPe73fg%2FpyCFLC859%2B3RhbK76Zu4COg45aLhwXrTRb2nZVWXpqkMQUzWTrB%2BuKxThEmyJDxliUxw42F7Oe9K"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8cf678a5095f423a-EWR
                    2024-10-08 13:27:57 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-10-08 13:27:57 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    5192.168.2.549714188.114.97.34436348C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                    TimestampBytes transferredDirectionData
                    2024-10-08 13:27:58 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    Connection: Keep-Alive
                    2024-10-08 13:27:58 UTC672INHTTP/1.1 200 OK
                    Date: Tue, 08 Oct 2024 13:27:58 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 60410
                    Last-Modified: Mon, 07 Oct 2024 20:41:08 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BeRgEOd1wiVdsb7m3i6sFS44BY0ltmyqlvoY7aOVqzEo2InzhfzI4XdNq4H9QojP891cv9fEg7SahiCF9c6HcYCZzFtztjv8%2BBUTFwAz3mnw8RM4p3dmXHSssuRiCjsH5J9I1GP2"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8cf678acee7b43b2-EWR
                    2024-10-08 13:27:58 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-10-08 13:27:58 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    6192.168.2.549716188.114.97.34436348C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                    TimestampBytes transferredDirectionData
                    2024-10-08 13:28:00 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    Connection: Keep-Alive
                    2024-10-08 13:28:00 UTC676INHTTP/1.1 200 OK
                    Date: Tue, 08 Oct 2024 13:28:00 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 60412
                    Last-Modified: Mon, 07 Oct 2024 20:41:08 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xrhIEYKSAPMIM2KcXvYJT5ZGa9XqkHS95ERIETPz%2B7kWGh1sBg4evLySPR%2Br9WAvUw4ZXPeq4WTBco6mcn1THm116k0%2B3Ds2IfklUftz4faNjlAhaGUbRMAvKvlCVahZ8NETw6D4"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8cf678bc68261a07-EWR
                    2024-10-08 13:28:00 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-10-08 13:28:00 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    7192.168.2.549718188.114.97.34436348C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                    TimestampBytes transferredDirectionData
                    2024-10-08 13:28:01 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                    Host: reallyfreegeoip.org
                    2024-10-08 13:28:02 UTC674INHTTP/1.1 200 OK
                    Date: Tue, 08 Oct 2024 13:28:02 GMT
                    Content-Type: application/xml
                    Transfer-Encoding: chunked
                    Connection: close
                    access-control-allow-origin: *
                    vary: Accept-Encoding
                    Cache-Control: max-age=86400
                    CF-Cache-Status: HIT
                    Age: 60414
                    Last-Modified: Mon, 07 Oct 2024 20:41:08 GMT
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nUGjy9dsKfun3S1MS0TpjTTp3D%2F9Uho73FpeqY4lQJN7F5hWbxsSHARRsfcHm3E8db%2Frqw6phw3Qz07KLJwxW7gXD7b1nC1yvI5UWCaA6eN0DBam0QJJ8ZUs29BweUMHE4T9vCPh"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8cf678c46f274400-EWR
                    2024-10-08 13:28:02 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                    Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                    2024-10-08 13:28:02 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:09:27:47
                    Start date:08/10/2024
                    Path:C:\Users\user\Desktop\114mCZlpa3.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\114mCZlpa3.exe"
                    Imagebase:0x400000
                    File size:1'066'779 bytes
                    MD5 hash:A5B62D982DB9A3841C9C3F381F25146E
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2052378648.0000000001690000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.2052378648.0000000001690000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.2052378648.0000000001690000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.2052378648.0000000001690000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                    • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000000.00000002.2052378648.0000000001690000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                    • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000000.00000002.2052378648.0000000001690000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.2052378648.0000000001690000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                    Reputation:low
                    Has exited:true

                    Target ID:2
                    Start time:09:27:48
                    Start date:08/10/2024
                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\114mCZlpa3.exe"
                    Imagebase:0x430000
                    File size:45'984 bytes
                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4507918514.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.4507918514.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.4507918514.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000002.00000002.4507918514.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.4509880252.00000000028CD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.4509880252.0000000002701000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:high
                    Has exited:false

                    Reset < >

                      Execution Graph

                      Execution Coverage:3.5%
                      Dynamic/Decrypted Code Coverage:1.3%
                      Signature Coverage:9%
                      Total number of Nodes:2000
                      Total number of Limit Nodes:36
                      execution_graph 86045 4010e0 86048 401100 86045->86048 86047 4010f8 86049 401113 86048->86049 86050 401184 86049->86050 86051 40114c 86049->86051 86053 401120 86049->86053 86080 401182 86049->86080 86086 401250 61 API calls __gmtime64_s 86050->86086 86054 401151 86051->86054 86055 40119d 86051->86055 86052 40112c DefWindowProcW 86052->86047 86053->86052 86093 401000 Shell_NotifyIconW __gmtime64_s 86053->86093 86057 401219 86054->86057 86058 40115d 86054->86058 86059 42afb4 86055->86059 86065 4011a3 86055->86065 86057->86053 86062 401225 86057->86062 86060 401163 86058->86060 86061 42b01d 86058->86061 86088 40f190 10 API calls 86059->86088 86066 42afe9 86060->86066 86067 40116c 86060->86067 86061->86052 86092 4370f4 52 API calls 86061->86092 86104 468b0e 74 API calls __gmtime64_s 86062->86104 86065->86053 86070 4011b6 KillTimer 86065->86070 86071 4011db SetTimer RegisterWindowMessageW 86065->86071 86090 40f190 10 API calls 86066->86090 86067->86053 86074 401174 86067->86074 86068 401193 86068->86047 86069 42b04f 86094 40e0c0 86069->86094 86087 401000 Shell_NotifyIconW __gmtime64_s 86070->86087 86071->86068 86072 401204 CreatePopupMenu 86071->86072 86072->86047 86089 45fd57 65 API calls __gmtime64_s 86074->86089 86079 4011c9 PostQuitMessage 86079->86047 86080->86052 86081 42afe4 86081->86068 86082 42b00e 86091 401a50 331 API calls 86082->86091 86085 42afdc 86085->86052 86085->86081 86086->86068 86087->86079 86088->86068 86089->86085 86090->86082 86091->86080 86092->86080 86093->86069 86096 40e0e7 __gmtime64_s 86094->86096 86095 40e142 86102 40e184 86095->86102 86127 4341e6 63 API calls __wcsicoll 86095->86127 86096->86095 86097 42729f DestroyIcon 86096->86097 86097->86095 86099 40e1a0 Shell_NotifyIconW 86105 401b80 86099->86105 86100 4272db Shell_NotifyIconW 86102->86099 86102->86100 86103 40e1ba 86103->86080 86104->86081 86106 401b9c 86105->86106 86126 401c7e 86105->86126 86128 4013c0 86106->86128 86109 42722b LoadStringW 86112 427246 86109->86112 86110 401bb9 86133 402160 86110->86133 86147 40e0a0 86112->86147 86113 401bcd 86115 427258 86113->86115 86116 401bda 86113->86116 86151 40d200 52 API calls 2 library calls 86115->86151 86116->86112 86117 401be4 86116->86117 86146 40d200 52 API calls 2 library calls 86117->86146 86120 427267 86121 42727b 86120->86121 86122 401bf3 __gmtime64_s _wcscpy _wcsncpy 86120->86122 86152 40d200 52 API calls 2 library calls 86121->86152 86125 401c62 Shell_NotifyIconW 86122->86125 86124 427289 86125->86126 86126->86103 86127->86102 86153 4115d7 86128->86153 86134 426daa 86133->86134 86135 40216b _wcslen 86133->86135 86191 40c600 86134->86191 86138 402180 86135->86138 86139 40219e 86135->86139 86137 426db5 86137->86113 86190 403bd0 52 API calls ctype 86138->86190 86140 4013a0 52 API calls 86139->86140 86142 4021a5 86140->86142 86144 426db7 86142->86144 86145 4115d7 52 API calls 86142->86145 86143 402187 _memmove 86143->86113 86145->86143 86146->86122 86148 40e0b2 86147->86148 86149 40e0a8 86147->86149 86148->86122 86203 403c30 52 API calls _memmove 86149->86203 86151->86120 86152->86124 86154 4115e1 _malloc 86153->86154 86156 4013e4 86154->86156 86159 4115fd std::exception::exception 86154->86159 86167 4135bb 86154->86167 86164 4013a0 86156->86164 86157 41163b 86182 4180af 46 API calls std::exception::operator= 86157->86182 86159->86157 86181 41130a 51 API calls __cinit 86159->86181 86160 411645 86183 418105 RaiseException 86160->86183 86163 411656 86165 4115d7 52 API calls 86164->86165 86166 4013a7 86165->86166 86166->86109 86166->86110 86168 413638 _malloc 86167->86168 86179 4135c9 _malloc 86167->86179 86189 417f77 46 API calls __getptd_noexit 86168->86189 86169 4135d4 86169->86179 86184 418901 46 API calls 2 library calls 86169->86184 86185 418752 46 API calls 8 library calls 86169->86185 86186 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86169->86186 86172 4135f7 RtlAllocateHeap 86174 413630 86172->86174 86172->86179 86174->86154 86175 413624 86187 417f77 46 API calls __getptd_noexit 86175->86187 86178 413622 86188 417f77 46 API calls __getptd_noexit 86178->86188 86179->86169 86179->86172 86179->86175 86179->86178 86181->86157 86182->86160 86183->86163 86184->86169 86185->86169 86187->86178 86188->86174 86189->86174 86190->86143 86192 40c619 86191->86192 86193 40c60a 86191->86193 86192->86137 86193->86192 86196 4026f0 86193->86196 86195 426d7a _memmove 86195->86137 86197 426873 86196->86197 86198 4026ff 86196->86198 86199 4013a0 52 API calls 86197->86199 86198->86195 86200 42687b 86199->86200 86201 4115d7 52 API calls 86200->86201 86202 42689e _memmove 86201->86202 86202->86195 86203->86148 86204 40bd20 86205 428194 86204->86205 86212 40bd2d 86204->86212 86206 40bd43 86205->86206 86208 4281bc 86205->86208 86211 4281b2 86205->86211 86226 45e987 86 API calls ctype 86208->86226 86225 40b510 VariantClear 86211->86225 86213 40bd37 86212->86213 86227 4531b1 85 API calls 5 library calls 86212->86227 86216 40bd50 86213->86216 86215 4281ba 86217 426cf1 86216->86217 86218 40bd63 86216->86218 86237 44cde9 52 API calls _memmove 86217->86237 86228 40bd80 86218->86228 86221 40bd73 86221->86206 86222 426cfc 86223 40e0a0 52 API calls 86222->86223 86224 426d02 86223->86224 86225->86215 86226->86212 86227->86213 86229 40bd8e 86228->86229 86233 40bdb7 _memmove 86228->86233 86230 40bded 86229->86230 86231 40bdad 86229->86231 86229->86233 86234 4115d7 52 API calls 86230->86234 86238 402f00 86231->86238 86233->86221 86235 40bdf6 86234->86235 86235->86233 86236 4115d7 52 API calls 86235->86236 86236->86233 86237->86222 86239 402f10 86238->86239 86240 402f0c 86238->86240 86241 4268c3 86239->86241 86242 4115d7 52 API calls 86239->86242 86240->86233 86243 402f51 ctype _memmove 86242->86243 86243->86233 86244 425ba2 86249 40e360 86244->86249 86246 425bb4 86265 41130a 51 API calls __cinit 86246->86265 86248 425bbe 86250 4115d7 52 API calls 86249->86250 86251 40e3ec GetModuleFileNameW 86250->86251 86266 413a0e 86251->86266 86253 40e421 _wcsncat 86269 413a9e 86253->86269 86256 4115d7 52 API calls 86257 40e45e _wcscpy 86256->86257 86272 40bc70 86257->86272 86261 40e4a9 86261->86246 86262 401c90 52 API calls 86263 40e4a1 _wcscat _wcslen _wcsncpy 86262->86263 86263->86261 86263->86262 86264 4115d7 52 API calls 86263->86264 86264->86263 86265->86248 86291 413801 86266->86291 86321 419efd 86269->86321 86273 4115d7 52 API calls 86272->86273 86274 40bc98 86273->86274 86275 4115d7 52 API calls 86274->86275 86276 40bca6 86275->86276 86277 40e4c0 86276->86277 86333 403350 86277->86333 86279 40e4cb RegOpenKeyExW 86280 427190 RegQueryValueExW 86279->86280 86281 40e4eb 86279->86281 86282 4271b0 86280->86282 86283 42721a RegCloseKey 86280->86283 86281->86263 86284 4115d7 52 API calls 86282->86284 86283->86263 86285 4271cb 86284->86285 86340 43652f 52 API calls 86285->86340 86287 4271d8 RegQueryValueExW 86288 42720e 86287->86288 86289 4271f7 86287->86289 86288->86283 86290 402160 52 API calls 86289->86290 86290->86288 86292 41381a 86291->86292 86293 41389e 86291->86293 86292->86293 86305 41388a 86292->86305 86313 419e30 46 API calls _sprintf 86292->86313 86294 4139e8 86293->86294 86296 413a00 86293->86296 86318 417f77 46 API calls __getptd_noexit 86294->86318 86320 417f77 46 API calls __getptd_noexit 86296->86320 86297 4139ed 86319 417f25 10 API calls _sprintf 86297->86319 86301 41396c 86301->86293 86303 413967 86301->86303 86306 41397a 86301->86306 86302 413929 86302->86293 86304 413945 86302->86304 86315 419e30 46 API calls _sprintf 86302->86315 86303->86253 86304->86293 86304->86303 86309 41395b 86304->86309 86305->86293 86312 413909 86305->86312 86314 419e30 46 API calls _sprintf 86305->86314 86317 419e30 46 API calls _sprintf 86306->86317 86316 419e30 46 API calls _sprintf 86309->86316 86312->86301 86312->86302 86313->86305 86314->86312 86315->86304 86316->86303 86317->86303 86318->86297 86319->86303 86320->86303 86322 419f13 86321->86322 86323 419f0e 86321->86323 86330 417f77 46 API calls __getptd_noexit 86322->86330 86323->86322 86326 419f2b 86323->86326 86325 419f18 86331 417f25 10 API calls _sprintf 86325->86331 86329 40e454 86326->86329 86332 417f77 46 API calls __getptd_noexit 86326->86332 86329->86256 86330->86325 86331->86329 86332->86325 86334 403367 86333->86334 86335 403358 86333->86335 86336 4115d7 52 API calls 86334->86336 86335->86279 86337 403370 86336->86337 86338 4115d7 52 API calls 86337->86338 86339 40339e 86338->86339 86339->86279 86340->86287 86341 3f1a3f0 86355 3f18040 86341->86355 86343 3f1a498 86358 3f1a2e0 86343->86358 86361 3f1b4c0 GetPEB 86355->86361 86357 3f186cb 86357->86343 86359 3f1a2e9 Sleep 86358->86359 86360 3f1a2f7 86359->86360 86362 3f1b4ea 86361->86362 86362->86357 86363 416454 86400 416c70 86363->86400 86365 416460 GetStartupInfoW 86366 416474 86365->86366 86401 419d5a HeapCreate 86366->86401 86368 4164cd 86369 4164d8 86368->86369 86485 41642b 46 API calls 3 library calls 86368->86485 86402 417c20 GetModuleHandleW 86369->86402 86372 4164de 86373 4164e9 __RTC_Initialize 86372->86373 86486 41642b 46 API calls 3 library calls 86372->86486 86421 41aaa1 GetStartupInfoW 86373->86421 86377 416503 GetCommandLineW 86434 41f584 GetEnvironmentStringsW 86377->86434 86381 416513 86440 41f4d6 GetModuleFileNameW 86381->86440 86383 41651d 86384 416528 86383->86384 86488 411924 46 API calls 3 library calls 86383->86488 86444 41f2a4 86384->86444 86387 41652e 86388 416539 86387->86388 86489 411924 46 API calls 3 library calls 86387->86489 86458 411703 86388->86458 86391 416541 86393 41654c __wwincmdln 86391->86393 86490 411924 46 API calls 3 library calls 86391->86490 86462 40d6b0 86393->86462 86396 41657c 86492 411906 46 API calls _doexit 86396->86492 86399 416581 __commit 86400->86365 86401->86368 86403 417c34 86402->86403 86404 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 86402->86404 86493 4178ff 49 API calls _free 86403->86493 86406 417c87 TlsAlloc 86404->86406 86409 417cd5 TlsSetValue 86406->86409 86410 417d96 86406->86410 86407 417c39 86407->86372 86409->86410 86411 417ce6 __init_pointers 86409->86411 86410->86372 86494 418151 InitializeCriticalSectionAndSpinCount 86411->86494 86413 417d91 86502 4178ff 49 API calls _free 86413->86502 86415 417d2a 86415->86413 86495 416b49 86415->86495 86418 417d76 86501 41793c 46 API calls 4 library calls 86418->86501 86420 417d7e GetCurrentThreadId 86420->86410 86422 416b49 __calloc_crt 46 API calls 86421->86422 86424 41aabf 86422->86424 86423 4164f7 86423->86377 86487 411924 46 API calls 3 library calls 86423->86487 86424->86423 86426 416b49 __calloc_crt 46 API calls 86424->86426 86428 41ac34 86424->86428 86433 41abb4 86424->86433 86425 41ac6a GetStdHandle 86425->86428 86426->86424 86427 41acce SetHandleCount 86427->86423 86428->86425 86428->86427 86429 41ac7c GetFileType 86428->86429 86432 41aca2 InitializeCriticalSectionAndSpinCount 86428->86432 86429->86428 86430 41abe0 GetFileType 86431 41abeb InitializeCriticalSectionAndSpinCount 86430->86431 86430->86433 86431->86423 86431->86433 86432->86423 86432->86428 86433->86428 86433->86430 86433->86431 86435 41f595 86434->86435 86436 41f599 86434->86436 86435->86381 86512 416b04 86436->86512 86438 41f5bb _memmove 86439 41f5c2 FreeEnvironmentStringsW 86438->86439 86439->86381 86441 41f50b _wparse_cmdline 86440->86441 86442 416b04 __malloc_crt 46 API calls 86441->86442 86443 41f54e _wparse_cmdline 86441->86443 86442->86443 86443->86383 86445 41f2bc _wcslen 86444->86445 86449 41f2b4 86444->86449 86446 416b49 __calloc_crt 46 API calls 86445->86446 86451 41f2e0 _wcslen 86446->86451 86447 41f336 86519 413748 86447->86519 86449->86387 86450 416b49 __calloc_crt 46 API calls 86450->86451 86451->86447 86451->86449 86451->86450 86452 41f35c 86451->86452 86455 41f373 86451->86455 86518 41ef12 46 API calls _sprintf 86451->86518 86453 413748 _free 46 API calls 86452->86453 86453->86449 86525 417ed3 86455->86525 86457 41f37f 86457->86387 86459 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 86458->86459 86461 411750 __IsNonwritableInCurrentImage 86459->86461 86544 41130a 51 API calls __cinit 86459->86544 86461->86391 86463 42e2f3 86462->86463 86464 40d6cc 86462->86464 86545 408f40 86464->86545 86466 40d707 86549 40ebb0 86466->86549 86469 40d737 86552 411951 86469->86552 86474 40d751 86564 40f4e0 SystemParametersInfoW SystemParametersInfoW 86474->86564 86476 40d75f 86565 40d590 GetCurrentDirectoryW 86476->86565 86478 40d767 SystemParametersInfoW 86479 40d794 86478->86479 86480 40d78d FreeLibrary 86478->86480 86481 408f40 VariantClear 86479->86481 86480->86479 86482 40d79d 86481->86482 86483 408f40 VariantClear 86482->86483 86484 40d7a6 86483->86484 86484->86396 86491 4118da 46 API calls _doexit 86484->86491 86485->86369 86486->86373 86491->86396 86492->86399 86493->86407 86494->86415 86497 416b52 86495->86497 86498 416b8f 86497->86498 86499 416b70 Sleep 86497->86499 86503 41f677 86497->86503 86498->86413 86498->86418 86500 416b85 86499->86500 86500->86497 86500->86498 86501->86420 86502->86410 86504 41f683 86503->86504 86507 41f69e _malloc 86503->86507 86505 41f68f 86504->86505 86504->86507 86511 417f77 46 API calls __getptd_noexit 86505->86511 86506 41f6b1 HeapAlloc 86506->86507 86509 41f6d8 86506->86509 86507->86506 86507->86509 86509->86497 86510 41f694 86510->86497 86511->86510 86515 416b0d 86512->86515 86513 4135bb _malloc 45 API calls 86513->86515 86514 416b43 86514->86438 86515->86513 86515->86514 86516 416b24 Sleep 86515->86516 86517 416b39 86516->86517 86517->86514 86517->86515 86518->86451 86520 41377c __dosmaperr 86519->86520 86521 413753 RtlFreeHeap 86519->86521 86520->86449 86521->86520 86522 413768 86521->86522 86528 417f77 46 API calls __getptd_noexit 86522->86528 86524 41376e GetLastError 86524->86520 86529 417daa 86525->86529 86528->86524 86530 417dc9 __gmtime64_s __call_reportfault 86529->86530 86531 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 86530->86531 86532 417eb5 __call_reportfault 86531->86532 86535 41a208 86532->86535 86534 417ed1 GetCurrentProcess TerminateProcess 86534->86457 86536 41a210 86535->86536 86537 41a212 IsDebuggerPresent 86535->86537 86536->86534 86543 41fe19 86537->86543 86540 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 86541 421ff8 GetCurrentProcess TerminateProcess 86540->86541 86542 421ff0 __call_reportfault 86540->86542 86541->86534 86542->86541 86543->86540 86544->86461 86546 408f48 ctype 86545->86546 86547 4265c7 VariantClear 86546->86547 86548 408f55 ctype 86546->86548 86547->86548 86548->86466 86605 40ebd0 86549->86605 86609 4182cb 86552->86609 86554 41195e 86616 4181f2 LeaveCriticalSection 86554->86616 86556 40d748 86557 4119b0 86556->86557 86558 4119d6 86557->86558 86559 4119bc 86557->86559 86558->86474 86559->86558 86651 417f77 46 API calls __getptd_noexit 86559->86651 86561 4119c6 86652 417f25 10 API calls _sprintf 86561->86652 86563 4119d1 86563->86474 86564->86476 86653 401f20 86565->86653 86567 40d5b6 IsDebuggerPresent 86568 40d5c4 86567->86568 86569 42e1bb MessageBoxA 86567->86569 86570 42e1d4 86568->86570 86571 40d5e3 86568->86571 86569->86570 86825 403a50 52 API calls 3 library calls 86570->86825 86723 40f520 86571->86723 86575 40d5fd GetFullPathNameW 86735 401460 86575->86735 86577 40d63b 86578 40d643 86577->86578 86579 42e231 SetCurrentDirectoryW 86577->86579 86580 40d64c 86578->86580 86826 432fee 6 API calls 86578->86826 86579->86578 86750 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 86580->86750 86583 42e252 86583->86580 86585 42e25a GetModuleFileNameW 86583->86585 86587 42e274 86585->86587 86588 42e2cb GetForegroundWindow ShellExecuteW 86585->86588 86827 401b10 86587->86827 86590 40d688 86588->86590 86589 40d656 86592 40d669 86589->86592 86595 40e0c0 74 API calls 86589->86595 86597 40d692 SetCurrentDirectoryW 86590->86597 86758 4091e0 86592->86758 86595->86592 86597->86478 86599 42e28d 86834 40d200 52 API calls 2 library calls 86599->86834 86602 42e299 GetForegroundWindow ShellExecuteW 86603 42e2c6 86602->86603 86603->86590 86604 40ec00 LoadLibraryA GetProcAddress 86604->86469 86606 40d72e 86605->86606 86607 40ebd6 LoadLibraryA 86605->86607 86606->86469 86606->86604 86607->86606 86608 40ebe7 GetProcAddress 86607->86608 86608->86606 86610 4182e0 86609->86610 86611 4182f3 EnterCriticalSection 86609->86611 86617 418209 86610->86617 86611->86554 86613 4182e6 86613->86611 86644 411924 46 API calls 3 library calls 86613->86644 86616->86556 86618 418215 __commit 86617->86618 86619 418225 86618->86619 86620 41823d 86618->86620 86645 418901 46 API calls 2 library calls 86619->86645 86622 416b04 __malloc_crt 45 API calls 86620->86622 86628 41824b __commit 86620->86628 86624 418256 86622->86624 86623 41822a 86646 418752 46 API calls 8 library calls 86623->86646 86626 41825d 86624->86626 86627 41826c 86624->86627 86648 417f77 46 API calls __getptd_noexit 86626->86648 86631 4182cb __lock 45 API calls 86627->86631 86628->86613 86629 418231 86647 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86629->86647 86633 418273 86631->86633 86635 4182a6 86633->86635 86636 41827b InitializeCriticalSectionAndSpinCount 86633->86636 86637 413748 _free 45 API calls 86635->86637 86638 418297 86636->86638 86639 41828b 86636->86639 86637->86638 86650 4182c2 LeaveCriticalSection _doexit 86638->86650 86640 413748 _free 45 API calls 86639->86640 86642 418291 86640->86642 86649 417f77 46 API calls __getptd_noexit 86642->86649 86645->86623 86646->86629 86648->86628 86649->86638 86650->86628 86651->86561 86652->86563 86835 40e6e0 86653->86835 86657 401f41 GetModuleFileNameW 86853 410100 86657->86853 86659 401f5c 86865 410960 86659->86865 86662 401b10 52 API calls 86663 401f81 86662->86663 86868 401980 86663->86868 86665 401f8e 86666 408f40 VariantClear 86665->86666 86667 401f9d 86666->86667 86668 401b10 52 API calls 86667->86668 86669 401fb4 86668->86669 86670 401980 53 API calls 86669->86670 86671 401fc3 86670->86671 86672 401b10 52 API calls 86671->86672 86673 401fd2 86672->86673 86876 40c2c0 86673->86876 86675 401fe1 86676 40bc70 52 API calls 86675->86676 86677 401ff3 86676->86677 86894 401a10 86677->86894 86679 401ffe 86901 4114ab 86679->86901 86682 428b05 86684 401a10 52 API calls 86682->86684 86683 402017 86685 4114ab __wcsicoll 58 API calls 86683->86685 86686 428b18 86684->86686 86687 402022 86685->86687 86689 401a10 52 API calls 86686->86689 86687->86686 86688 40202d 86687->86688 86690 4114ab __wcsicoll 58 API calls 86688->86690 86691 428b33 86689->86691 86692 402038 86690->86692 86694 428b3b GetModuleFileNameW 86691->86694 86693 402043 86692->86693 86692->86694 86695 4114ab __wcsicoll 58 API calls 86693->86695 86696 401a10 52 API calls 86694->86696 86697 40204e 86695->86697 86698 428b6c 86696->86698 86700 402092 86697->86700 86703 401a10 52 API calls 86697->86703 86708 428b90 _wcscpy 86697->86708 86699 40e0a0 52 API calls 86698->86699 86701 428b7a 86699->86701 86702 4020a3 86700->86702 86700->86708 86704 401a10 52 API calls 86701->86704 86705 428bc6 86702->86705 86909 40e830 53 API calls 86702->86909 86706 402073 _wcscpy 86703->86706 86707 428b88 86704->86707 86713 401a10 52 API calls 86706->86713 86707->86708 86710 401a10 52 API calls 86708->86710 86718 4020d0 86710->86718 86711 4020bb 86910 40cf00 53 API calls 86711->86910 86713->86700 86714 4020c6 86715 408f40 VariantClear 86714->86715 86715->86718 86716 402110 86720 408f40 VariantClear 86716->86720 86718->86716 86721 401a10 52 API calls 86718->86721 86911 40cf00 53 API calls 86718->86911 86912 40e6a0 53 API calls 86718->86912 86722 402120 ctype 86720->86722 86721->86718 86722->86567 86724 4295c9 __gmtime64_s 86723->86724 86725 40f53c 86723->86725 86728 4295d9 GetOpenFileNameW 86724->86728 87609 410120 86725->87609 86727 40f545 87613 4102b0 SHGetMalloc 86727->87613 86728->86725 86730 40d5f5 86728->86730 86730->86575 86730->86577 86731 40f54c 87618 410190 GetFullPathNameW 86731->87618 86733 40f559 87629 40f570 86733->87629 87691 402400 86735->87691 86737 40146f 86740 428c29 _wcscat 86737->86740 87700 401500 86737->87700 86739 40147c 86739->86740 87708 40d440 86739->87708 86742 401489 86742->86740 86743 401491 GetFullPathNameW 86742->86743 86744 402160 52 API calls 86743->86744 86745 4014bb 86744->86745 86746 402160 52 API calls 86745->86746 86747 4014c8 86746->86747 86747->86740 86748 402160 52 API calls 86747->86748 86749 4014ee 86748->86749 86749->86577 86751 428361 86750->86751 86752 4103fc LoadImageW RegisterClassExW 86750->86752 87728 44395e EnumResourceNamesW LoadImageW 86751->87728 87727 410490 7 API calls 86752->87727 86755 428368 86756 40d651 86757 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 86756->86757 86757->86589 86759 409202 86758->86759 86760 42d7ad 86758->86760 86782 409216 ctype 86759->86782 87991 410940 331 API calls 86759->87991 87994 45e737 90 API calls 3 library calls 86760->87994 86763 409386 86764 40939c 86763->86764 87992 40f190 10 API calls 86763->87992 86764->86590 86824 401000 Shell_NotifyIconW __gmtime64_s 86764->86824 86766 4095b2 86766->86764 86768 4095bf 86766->86768 86767 409253 PeekMessageW 86767->86782 87993 401a50 331 API calls 86768->87993 86769 40d410 VariantClear 86769->86782 86771 42d8cd Sleep 86771->86782 86772 4095c6 LockWindowUpdate DestroyWindow GetMessageW 86772->86764 86775 4095f9 86772->86775 86774 42e13b 88012 40d410 VariantClear 86774->88012 86778 42e158 TranslateMessage DispatchMessageW GetMessageW 86775->86778 86778->86778 86779 42e188 86778->86779 86779->86764 86781 409567 PeekMessageW 86781->86782 86782->86763 86782->86767 86782->86769 86782->86771 86782->86774 86782->86781 86785 40e0a0 52 API calls 86782->86785 86787 46f3c1 107 API calls 86782->86787 86788 42dcd2 WaitForSingleObject 86782->86788 86789 409551 TranslateMessage DispatchMessageW 86782->86789 86791 42dd3d Sleep 86782->86791 86795 4094e0 86782->86795 86796 4094cf Sleep 86782->86796 86799 42d94d timeGetTime 86782->86799 86806 47d33e 309 API calls 86782->86806 86817 45e737 90 API calls 86782->86817 86818 42e0cc VariantClear 86782->86818 86819 408f40 VariantClear 86782->86819 87729 4091b0 86782->87729 87787 40afa0 86782->87787 87813 408fc0 86782->87813 87848 408cc0 86782->87848 87862 4096a0 86782->87862 87989 40d150 TranslateAcceleratorW 86782->87989 87990 40d170 IsDialogMessageW GetClassLongW 86782->87990 87995 465124 53 API calls 86782->87995 87996 40c620 timeGetTime 86782->87996 88011 40e270 VariantClear ctype 86782->88011 86784 44c29d 52 API calls 86784->86795 86785->86782 86786 46fdbf 108 API calls 86786->86795 86787->86782 86788->86782 86792 42dcf0 GetExitCodeProcess CloseHandle 86788->86792 86789->86781 86791->86795 88001 40d410 VariantClear 86792->88001 86795->86782 86795->86784 86795->86786 86801 40c620 timeGetTime 86795->86801 86804 465124 53 API calls 86795->86804 86805 42dd89 CloseHandle 86795->86805 86808 42de19 GetExitCodeProcess CloseHandle 86795->86808 86809 408f40 VariantClear 86795->86809 86812 42de88 Sleep 86795->86812 86821 401980 53 API calls 86795->86821 86822 401b10 52 API calls 86795->86822 87998 45178a 54 API calls 86795->87998 87999 47d33e 331 API calls 86795->87999 88000 453bc6 54 API calls 86795->88000 88002 40d410 VariantClear 86795->88002 88003 443d19 67 API calls _wcslen 86795->88003 88004 4574b4 VariantClear 86795->88004 88005 403cd0 86795->88005 88009 4731e1 VariantClear 86795->88009 88010 4331a2 6 API calls 86795->88010 86796->86795 87997 465124 53 API calls 86799->87997 86801->86795 86804->86795 86805->86795 86806->86782 86808->86795 86809->86795 86812->86782 86817->86782 86818->86782 86819->86782 86821->86795 86822->86795 86824->86590 86825->86577 86826->86583 86828 401b16 _wcslen 86827->86828 86829 4115d7 52 API calls 86828->86829 86832 401b63 86828->86832 86830 401b4b _memmove 86829->86830 86831 4115d7 52 API calls 86830->86831 86831->86832 86833 40d200 52 API calls 2 library calls 86832->86833 86833->86599 86834->86602 86836 40bc70 52 API calls 86835->86836 86837 401f31 86836->86837 86838 402560 86837->86838 86839 40256d __write_nolock 86838->86839 86840 402160 52 API calls 86839->86840 86842 402593 86840->86842 86844 4025bd 86842->86844 86913 401c90 86842->86913 86843 4026f0 52 API calls 86843->86844 86844->86843 86845 4026a7 86844->86845 86848 401b10 52 API calls 86844->86848 86850 401c90 52 API calls 86844->86850 86916 40d7c0 52 API calls 2 library calls 86844->86916 86846 4026db 86845->86846 86847 401b10 52 API calls 86845->86847 86846->86657 86849 4026d1 86847->86849 86848->86844 86917 40d7c0 52 API calls 2 library calls 86849->86917 86850->86844 86918 40f760 86853->86918 86856 410118 86856->86659 86858 42805d 86859 42806a 86858->86859 86974 431e58 86858->86974 86861 413748 _free 46 API calls 86859->86861 86862 428078 86861->86862 86863 431e58 82 API calls 86862->86863 86864 428084 86863->86864 86864->86659 86866 4115d7 52 API calls 86865->86866 86867 401f74 86866->86867 86867->86662 86869 4019a3 86868->86869 86873 401985 86868->86873 86870 4019b8 86869->86870 86869->86873 87598 403e10 53 API calls 86870->87598 86872 40199f 86872->86665 86873->86872 87597 403e10 53 API calls 86873->87597 86875 4019c4 86875->86665 86877 40c2c7 86876->86877 86878 40c30e 86876->86878 86881 40c2d3 86877->86881 86882 426c79 86877->86882 86879 40c315 86878->86879 86880 426c2b 86878->86880 86883 40c321 86879->86883 86884 426c5a 86879->86884 86886 426c4b 86880->86886 86887 426c2e 86880->86887 87599 403ea0 52 API calls __cinit 86881->87599 87604 4534e3 52 API calls 86882->87604 87600 403ea0 52 API calls __cinit 86883->87600 87603 4534e3 52 API calls 86884->87603 87602 4534e3 52 API calls 86886->87602 86892 40c2de 86887->86892 87601 4534e3 52 API calls 86887->87601 86892->86675 86895 401a30 86894->86895 86896 401a17 86894->86896 86898 402160 52 API calls 86895->86898 86897 401a2d 86896->86897 87605 403c30 52 API calls _memmove 86896->87605 86897->86679 86900 401a3d 86898->86900 86900->86679 86902 411523 86901->86902 86903 4114ba 86901->86903 87608 4113a8 58 API calls 3 library calls 86902->87608 86908 40200c 86903->86908 87606 417f77 46 API calls __getptd_noexit 86903->87606 86906 4114c6 87607 417f25 10 API calls _sprintf 86906->87607 86908->86682 86908->86683 86909->86711 86910->86714 86911->86718 86912->86718 86914 4026f0 52 API calls 86913->86914 86915 401c97 86914->86915 86915->86842 86916->86844 86917->86846 86978 40f6f0 86918->86978 86920 40f77b _strcat ctype 86986 40f850 86920->86986 86925 427c2a 87016 414d04 86925->87016 86927 40f7fc 86927->86925 86928 40f804 86927->86928 87003 414a46 86928->87003 86932 40f80e 86932->86856 86937 4528bd 86932->86937 86934 427c59 87022 414fe2 86934->87022 86936 427c79 86938 4150d1 _fseek 81 API calls 86937->86938 86939 452930 86938->86939 87522 452719 86939->87522 86942 452948 86942->86858 86943 414d04 __fread_nolock 61 API calls 86944 452966 86943->86944 86945 414d04 __fread_nolock 61 API calls 86944->86945 86946 452976 86945->86946 86947 414d04 __fread_nolock 61 API calls 86946->86947 86948 45298f 86947->86948 86949 414d04 __fread_nolock 61 API calls 86948->86949 86950 4529aa 86949->86950 86951 4150d1 _fseek 81 API calls 86950->86951 86952 4529c4 86951->86952 86953 4135bb _malloc 46 API calls 86952->86953 86954 4529cf 86953->86954 86955 4135bb _malloc 46 API calls 86954->86955 86956 4529db 86955->86956 86957 414d04 __fread_nolock 61 API calls 86956->86957 86958 4529ec 86957->86958 86959 44afef GetSystemTimeAsFileTime 86958->86959 86960 452a00 86959->86960 86961 452a36 86960->86961 86962 452a13 86960->86962 86963 452aa5 86961->86963 86964 452a3c 86961->86964 86965 413748 _free 46 API calls 86962->86965 86967 413748 _free 46 API calls 86963->86967 87528 44b1a9 86964->87528 86968 452a1c 86965->86968 86970 452aa3 86967->86970 86971 413748 _free 46 API calls 86968->86971 86969 452a9d 86972 413748 _free 46 API calls 86969->86972 86970->86858 86973 452a25 86971->86973 86972->86970 86973->86858 86975 431e64 86974->86975 86976 431e6a 86974->86976 86977 414a46 __fcloseall 82 API calls 86975->86977 86976->86859 86977->86976 86979 425de2 86978->86979 86980 40f6fc _wcslen 86978->86980 86979->86920 86981 40f710 WideCharToMultiByte 86980->86981 86982 40f756 86981->86982 86983 40f728 86981->86983 86982->86920 86984 4115d7 52 API calls 86983->86984 86985 40f735 WideCharToMultiByte 86984->86985 86985->86920 86989 40f85d __gmtime64_s _strlen 86986->86989 86987 426b3b 86989->86987 86990 40f7ab 86989->86990 87035 414db8 86989->87035 86991 4149c2 86990->86991 87050 414904 86991->87050 86993 40f7e9 86993->86925 86994 40f5c0 86993->86994 86995 40f5cd _strcat __write_nolock _memmove 86994->86995 86996 414d04 __fread_nolock 61 API calls 86995->86996 86998 425d11 86995->86998 87002 40f691 __tzset_nolock 86995->87002 87138 4150d1 86995->87138 86996->86995 86999 4150d1 _fseek 81 API calls 86998->86999 87000 425d33 86999->87000 87001 414d04 __fread_nolock 61 API calls 87000->87001 87001->87002 87002->86927 87004 414a52 __commit 87003->87004 87005 414a64 87004->87005 87006 414a79 87004->87006 87278 417f77 46 API calls __getptd_noexit 87005->87278 87009 415471 __lock_file 47 API calls 87006->87009 87012 414a74 __commit 87006->87012 87008 414a69 87279 417f25 10 API calls _sprintf 87008->87279 87011 414a92 87009->87011 87262 4149d9 87011->87262 87012->86932 87347 414c76 87016->87347 87018 414d1c 87019 44afef 87018->87019 87515 442c5a 87019->87515 87021 44b00d 87021->86934 87023 414fee __commit 87022->87023 87024 414ffa 87023->87024 87025 41500f 87023->87025 87519 417f77 46 API calls __getptd_noexit 87024->87519 87027 415471 __lock_file 47 API calls 87025->87027 87029 415017 87027->87029 87028 414fff 87520 417f25 10 API calls _sprintf 87028->87520 87031 414e4e __ftell_nolock 51 API calls 87029->87031 87032 415024 87031->87032 87521 41503d LeaveCriticalSection LeaveCriticalSection _fprintf 87032->87521 87034 41500a __commit 87034->86936 87036 414dd6 87035->87036 87037 414deb 87035->87037 87046 417f77 46 API calls __getptd_noexit 87036->87046 87037->87036 87039 414df2 87037->87039 87048 41b91b 79 API calls 10 library calls 87039->87048 87040 414ddb 87047 417f25 10 API calls _sprintf 87040->87047 87043 414e18 87044 414de6 87043->87044 87049 418f98 77 API calls 5 library calls 87043->87049 87044->86989 87046->87040 87047->87044 87048->87043 87049->87044 87051 414910 __commit 87050->87051 87052 414923 87051->87052 87055 414951 87051->87055 87106 417f77 46 API calls __getptd_noexit 87052->87106 87054 414928 87107 417f25 10 API calls _sprintf 87054->87107 87069 41d4d1 87055->87069 87058 414956 87059 41496a 87058->87059 87060 41495d 87058->87060 87062 414992 87059->87062 87063 414972 87059->87063 87108 417f77 46 API calls __getptd_noexit 87060->87108 87086 41d218 87062->87086 87109 417f77 46 API calls __getptd_noexit 87063->87109 87064 414933 __commit @_EH4_CallFilterFunc@8 87064->86993 87070 41d4dd __commit 87069->87070 87071 4182cb __lock 46 API calls 87070->87071 87084 41d4eb 87071->87084 87072 41d560 87111 41d5fb 87072->87111 87073 41d567 87074 416b04 __malloc_crt 46 API calls 87073->87074 87076 41d56e 87074->87076 87076->87072 87078 41d57c InitializeCriticalSectionAndSpinCount 87076->87078 87077 41d5f0 __commit 87077->87058 87079 41d59c 87078->87079 87080 41d5af EnterCriticalSection 87078->87080 87083 413748 _free 46 API calls 87079->87083 87080->87072 87081 418209 __mtinitlocknum 46 API calls 87081->87084 87083->87072 87084->87072 87084->87073 87084->87081 87114 4154b2 47 API calls __lock 87084->87114 87115 415520 LeaveCriticalSection LeaveCriticalSection _doexit 87084->87115 87087 41d23a 87086->87087 87088 41d255 87087->87088 87100 41d26c __wopenfile 87087->87100 87120 417f77 46 API calls __getptd_noexit 87088->87120 87089 41d421 87093 41d47a 87089->87093 87094 41d48c 87089->87094 87091 41d25a 87121 417f25 10 API calls _sprintf 87091->87121 87125 417f77 46 API calls __getptd_noexit 87093->87125 87117 422bf9 87094->87117 87097 41d47f 87126 417f25 10 API calls _sprintf 87097->87126 87098 41499d 87110 4149b8 LeaveCriticalSection LeaveCriticalSection _fprintf 87098->87110 87100->87089 87100->87093 87122 41341f 58 API calls 2 library calls 87100->87122 87102 41d41a 87102->87089 87123 41341f 58 API calls 2 library calls 87102->87123 87104 41d439 87104->87089 87124 41341f 58 API calls 2 library calls 87104->87124 87106->87054 87107->87064 87108->87064 87109->87064 87110->87064 87116 4181f2 LeaveCriticalSection 87111->87116 87113 41d602 87113->87077 87114->87084 87115->87084 87116->87113 87127 422b35 87117->87127 87119 422c14 87119->87098 87120->87091 87121->87098 87122->87102 87123->87104 87124->87089 87125->87097 87126->87098 87128 422b41 __commit 87127->87128 87129 422b54 87128->87129 87131 422b8a 87128->87131 87130 417f77 _sprintf 46 API calls 87129->87130 87132 422b59 87130->87132 87133 422400 __tsopen_nolock 109 API calls 87131->87133 87134 417f25 _sprintf 10 API calls 87132->87134 87135 422ba4 87133->87135 87137 422b63 __commit 87134->87137 87136 422bcb __wsopen_helper LeaveCriticalSection 87135->87136 87136->87137 87137->87119 87140 4150dd __commit 87138->87140 87139 4150e9 87169 417f77 46 API calls __getptd_noexit 87139->87169 87140->87139 87141 41510f 87140->87141 87151 415471 87141->87151 87144 4150ee 87170 417f25 10 API calls _sprintf 87144->87170 87150 4150f9 __commit 87150->86995 87152 415483 87151->87152 87153 4154a5 EnterCriticalSection 87151->87153 87152->87153 87154 41548b 87152->87154 87155 415117 87153->87155 87156 4182cb __lock 46 API calls 87154->87156 87157 415047 87155->87157 87156->87155 87158 415067 87157->87158 87159 415057 87157->87159 87161 415079 87158->87161 87172 414e4e 87158->87172 87227 417f77 46 API calls __getptd_noexit 87159->87227 87189 41443c 87161->87189 87166 4150b9 87202 41e1f4 87166->87202 87168 41505c 87171 415143 LeaveCriticalSection LeaveCriticalSection _fprintf 87168->87171 87169->87144 87170->87150 87171->87150 87173 414e61 87172->87173 87174 414e79 87172->87174 87228 417f77 46 API calls __getptd_noexit 87173->87228 87175 414139 __stbuf 46 API calls 87174->87175 87177 414e80 87175->87177 87180 41e1f4 __write 51 API calls 87177->87180 87178 414e66 87229 417f25 10 API calls _sprintf 87178->87229 87181 414e97 87180->87181 87182 414f09 87181->87182 87184 414ec9 87181->87184 87188 414e71 87181->87188 87230 417f77 46 API calls __getptd_noexit 87182->87230 87185 41e1f4 __write 51 API calls 87184->87185 87184->87188 87186 414f64 87185->87186 87187 41e1f4 __write 51 API calls 87186->87187 87186->87188 87187->87188 87188->87161 87190 414477 87189->87190 87191 414455 87189->87191 87195 414139 87190->87195 87191->87190 87192 414139 __stbuf 46 API calls 87191->87192 87193 414470 87192->87193 87231 41b7b2 77 API calls 5 library calls 87193->87231 87196 414145 87195->87196 87197 41415a 87195->87197 87232 417f77 46 API calls __getptd_noexit 87196->87232 87197->87166 87199 41414a 87233 417f25 10 API calls _sprintf 87199->87233 87201 414155 87201->87166 87203 41e200 __commit 87202->87203 87204 41e223 87203->87204 87205 41e208 87203->87205 87206 41e22f 87204->87206 87211 41e269 87204->87211 87254 417f8a 46 API calls __getptd_noexit 87205->87254 87256 417f8a 46 API calls __getptd_noexit 87206->87256 87209 41e20d 87255 417f77 46 API calls __getptd_noexit 87209->87255 87210 41e234 87257 417f77 46 API calls __getptd_noexit 87210->87257 87234 41ae56 87211->87234 87215 41e23c 87258 417f25 10 API calls _sprintf 87215->87258 87216 41e26f 87218 41e291 87216->87218 87219 41e27d 87216->87219 87259 417f77 46 API calls __getptd_noexit 87218->87259 87244 41e17f 87219->87244 87221 41e215 __commit 87221->87168 87223 41e296 87260 417f8a 46 API calls __getptd_noexit 87223->87260 87224 41e289 87261 41e2c0 LeaveCriticalSection __unlock_fhandle 87224->87261 87227->87168 87228->87178 87229->87188 87230->87188 87231->87190 87232->87199 87233->87201 87235 41ae62 __commit 87234->87235 87236 41aebc 87235->87236 87237 4182cb __lock 46 API calls 87235->87237 87238 41aec1 EnterCriticalSection 87236->87238 87239 41aede __commit 87236->87239 87240 41ae8e 87237->87240 87238->87239 87239->87216 87241 41aeaa 87240->87241 87242 41ae97 InitializeCriticalSectionAndSpinCount 87240->87242 87243 41aeec ___lock_fhandle LeaveCriticalSection 87241->87243 87242->87241 87243->87236 87245 41aded __commit 46 API calls 87244->87245 87246 41e18e 87245->87246 87247 41e1a4 SetFilePointer 87246->87247 87248 41e194 87246->87248 87249 41e1c3 87247->87249 87250 41e1bb GetLastError 87247->87250 87251 417f77 _sprintf 46 API calls 87248->87251 87252 41e199 87249->87252 87253 417f9d __dosmaperr 46 API calls 87249->87253 87250->87249 87251->87252 87252->87224 87253->87252 87254->87209 87255->87221 87256->87210 87257->87215 87258->87221 87259->87223 87260->87224 87261->87221 87263 4149ea 87262->87263 87264 4149fe 87262->87264 87308 417f77 46 API calls __getptd_noexit 87263->87308 87267 41443c __flush 77 API calls 87264->87267 87270 4149fa 87264->87270 87266 4149ef 87309 417f25 10 API calls _sprintf 87266->87309 87269 414a0a 87267->87269 87281 41d8c2 87269->87281 87280 414ab2 LeaveCriticalSection LeaveCriticalSection _fprintf 87270->87280 87273 414139 __stbuf 46 API calls 87274 414a18 87273->87274 87285 41d7fe 87274->87285 87276 414a1e 87276->87270 87277 413748 _free 46 API calls 87276->87277 87277->87270 87278->87008 87279->87012 87280->87012 87282 414a12 87281->87282 87283 41d8d2 87281->87283 87282->87273 87283->87282 87284 413748 _free 46 API calls 87283->87284 87284->87282 87286 41d80a __commit 87285->87286 87287 41d812 87286->87287 87288 41d82d 87286->87288 87325 417f8a 46 API calls __getptd_noexit 87287->87325 87289 41d839 87288->87289 87294 41d873 87288->87294 87327 417f8a 46 API calls __getptd_noexit 87289->87327 87292 41d817 87326 417f77 46 API calls __getptd_noexit 87292->87326 87293 41d83e 87328 417f77 46 API calls __getptd_noexit 87293->87328 87297 41ae56 ___lock_fhandle 48 API calls 87294->87297 87300 41d879 87297->87300 87298 41d81f __commit 87298->87276 87299 41d846 87329 417f25 10 API calls _sprintf 87299->87329 87302 41d893 87300->87302 87303 41d887 87300->87303 87330 417f77 46 API calls __getptd_noexit 87302->87330 87310 41d762 87303->87310 87306 41d88d 87331 41d8ba LeaveCriticalSection __unlock_fhandle 87306->87331 87308->87266 87309->87270 87332 41aded 87310->87332 87312 41d7c8 87345 41ad67 47 API calls 2 library calls 87312->87345 87314 41d772 87314->87312 87315 41aded __commit 46 API calls 87314->87315 87324 41d7a6 87314->87324 87317 41d79d 87315->87317 87316 41aded __commit 46 API calls 87318 41d7b2 CloseHandle 87316->87318 87321 41aded __commit 46 API calls 87317->87321 87318->87312 87322 41d7be GetLastError 87318->87322 87319 41d7d0 87320 41d7f2 87319->87320 87346 417f9d 46 API calls 3 library calls 87319->87346 87320->87306 87321->87324 87322->87312 87324->87312 87324->87316 87325->87292 87326->87298 87327->87293 87328->87299 87329->87298 87330->87306 87331->87298 87333 41ae12 87332->87333 87334 41adfa 87332->87334 87336 417f8a __commit 46 API calls 87333->87336 87339 41ae51 87333->87339 87335 417f8a __commit 46 API calls 87334->87335 87337 41adff 87335->87337 87338 41ae23 87336->87338 87340 417f77 _sprintf 46 API calls 87337->87340 87341 417f77 _sprintf 46 API calls 87338->87341 87339->87314 87342 41ae07 87340->87342 87343 41ae2b 87341->87343 87342->87314 87344 417f25 _sprintf 10 API calls 87343->87344 87344->87342 87345->87319 87346->87320 87348 414c82 __commit 87347->87348 87349 414cc3 87348->87349 87350 414c96 __gmtime64_s 87348->87350 87351 414cbb __commit 87348->87351 87352 415471 __lock_file 47 API calls 87349->87352 87374 417f77 46 API calls __getptd_noexit 87350->87374 87351->87018 87354 414ccb 87352->87354 87360 414aba 87354->87360 87356 414cb0 87375 417f25 10 API calls _sprintf 87356->87375 87364 414ad8 __gmtime64_s 87360->87364 87366 414af2 87360->87366 87361 414ae2 87427 417f77 46 API calls __getptd_noexit 87361->87427 87363 414ae7 87428 417f25 10 API calls _sprintf 87363->87428 87364->87361 87364->87366 87371 414b2d 87364->87371 87376 414cfa LeaveCriticalSection LeaveCriticalSection _fprintf 87366->87376 87368 414c38 __gmtime64_s 87430 417f77 46 API calls __getptd_noexit 87368->87430 87369 414139 __stbuf 46 API calls 87369->87371 87371->87366 87371->87368 87371->87369 87377 41dfcc 87371->87377 87407 41d8f3 87371->87407 87429 41e0c2 46 API calls 3 library calls 87371->87429 87374->87356 87375->87351 87376->87351 87378 41dfd8 __commit 87377->87378 87379 41dfe0 87378->87379 87380 41dffb 87378->87380 87500 417f8a 46 API calls __getptd_noexit 87379->87500 87382 41e007 87380->87382 87385 41e041 87380->87385 87502 417f8a 46 API calls __getptd_noexit 87382->87502 87383 41dfe5 87501 417f77 46 API calls __getptd_noexit 87383->87501 87388 41e063 87385->87388 87389 41e04e 87385->87389 87387 41e00c 87503 417f77 46 API calls __getptd_noexit 87387->87503 87392 41ae56 ___lock_fhandle 48 API calls 87388->87392 87505 417f8a 46 API calls __getptd_noexit 87389->87505 87394 41e069 87392->87394 87393 41e053 87506 417f77 46 API calls __getptd_noexit 87393->87506 87397 41e077 87394->87397 87398 41e08b 87394->87398 87431 41da15 87397->87431 87507 417f77 46 API calls __getptd_noexit 87398->87507 87400 41dfed __commit 87400->87371 87401 41e014 87504 417f25 10 API calls _sprintf 87401->87504 87403 41e083 87509 41e0ba LeaveCriticalSection __unlock_fhandle 87403->87509 87404 41e090 87508 417f8a 46 API calls __getptd_noexit 87404->87508 87408 41d900 87407->87408 87411 41d915 87407->87411 87513 417f77 46 API calls __getptd_noexit 87408->87513 87410 41d905 87514 417f25 10 API calls _sprintf 87410->87514 87413 41d94a 87411->87413 87418 41d910 87411->87418 87510 420603 87411->87510 87415 414139 __stbuf 46 API calls 87413->87415 87416 41d95e 87415->87416 87417 41dfcc __read 59 API calls 87416->87417 87419 41d965 87417->87419 87418->87371 87419->87418 87420 414139 __stbuf 46 API calls 87419->87420 87421 41d988 87420->87421 87421->87418 87422 414139 __stbuf 46 API calls 87421->87422 87423 41d994 87422->87423 87423->87418 87424 414139 __stbuf 46 API calls 87423->87424 87425 41d9a1 87424->87425 87426 414139 __stbuf 46 API calls 87425->87426 87426->87418 87427->87363 87428->87366 87429->87371 87430->87363 87432 41da31 87431->87432 87433 41da4c 87431->87433 87435 417f8a __commit 46 API calls 87432->87435 87434 41da5b 87433->87434 87436 41da7a 87433->87436 87437 417f8a __commit 46 API calls 87434->87437 87438 41da36 87435->87438 87441 41da98 87436->87441 87452 41daac 87436->87452 87440 41da60 87437->87440 87439 417f77 _sprintf 46 API calls 87438->87439 87453 41da3e 87439->87453 87443 417f77 _sprintf 46 API calls 87440->87443 87444 417f8a __commit 46 API calls 87441->87444 87442 41db02 87446 417f8a __commit 46 API calls 87442->87446 87445 41da67 87443->87445 87447 41da9d 87444->87447 87448 417f25 _sprintf 10 API calls 87445->87448 87449 41db07 87446->87449 87450 417f77 _sprintf 46 API calls 87447->87450 87448->87453 87454 417f77 _sprintf 46 API calls 87449->87454 87451 41daa4 87450->87451 87456 417f25 _sprintf 10 API calls 87451->87456 87452->87442 87452->87453 87455 41dae1 87452->87455 87457 41db1b 87452->87457 87453->87403 87454->87451 87455->87442 87460 41daec ReadFile 87455->87460 87456->87453 87459 416b04 __malloc_crt 46 API calls 87457->87459 87461 41db31 87459->87461 87462 41dc17 87460->87462 87463 41df8f GetLastError 87460->87463 87466 41db59 87461->87466 87467 41db3b 87461->87467 87462->87463 87470 41dc2b 87462->87470 87464 41de16 87463->87464 87465 41df9c 87463->87465 87475 417f9d __dosmaperr 46 API calls 87464->87475 87479 41dd9b 87464->87479 87468 417f77 _sprintf 46 API calls 87465->87468 87471 420494 __lseeki64_nolock 48 API calls 87466->87471 87469 417f77 _sprintf 46 API calls 87467->87469 87473 41dfa1 87468->87473 87474 41db40 87469->87474 87470->87479 87480 41dc47 87470->87480 87483 41de5b 87470->87483 87472 41db67 87471->87472 87472->87460 87476 417f8a __commit 46 API calls 87473->87476 87477 417f8a __commit 46 API calls 87474->87477 87475->87479 87476->87479 87477->87453 87478 413748 _free 46 API calls 87478->87453 87479->87453 87479->87478 87481 41dcab ReadFile 87480->87481 87488 41dd28 87480->87488 87486 41dcc9 GetLastError 87481->87486 87491 41dcd3 87481->87491 87482 41ded0 ReadFile 87484 41deef GetLastError 87482->87484 87492 41def9 87482->87492 87483->87479 87483->87482 87484->87483 87484->87492 87485 41ddec MultiByteToWideChar 87485->87479 87487 41de10 GetLastError 87485->87487 87486->87480 87486->87491 87487->87464 87488->87479 87489 41dda3 87488->87489 87490 41dd96 87488->87490 87496 41dd60 87488->87496 87489->87496 87497 41ddda 87489->87497 87493 417f77 _sprintf 46 API calls 87490->87493 87491->87480 87494 420494 __lseeki64_nolock 48 API calls 87491->87494 87492->87483 87495 420494 __lseeki64_nolock 48 API calls 87492->87495 87493->87479 87494->87491 87495->87492 87496->87485 87498 420494 __lseeki64_nolock 48 API calls 87497->87498 87499 41dde9 87498->87499 87499->87485 87500->87383 87501->87400 87502->87387 87503->87401 87504->87400 87505->87393 87506->87401 87507->87404 87508->87403 87509->87400 87511 416b04 __malloc_crt 46 API calls 87510->87511 87512 420618 87511->87512 87512->87413 87513->87410 87514->87418 87518 4148b3 GetSystemTimeAsFileTime __aulldiv 87515->87518 87517 442c6b 87517->87021 87518->87517 87519->87028 87520->87034 87521->87034 87525 45272f __tzset_nolock _wcscpy 87522->87525 87523 44afef GetSystemTimeAsFileTime 87523->87525 87524 4528a4 87524->86942 87524->86943 87525->87523 87525->87524 87526 414d04 61 API calls __fread_nolock 87525->87526 87527 4150d1 81 API calls _fseek 87525->87527 87526->87525 87527->87525 87529 44b1bc 87528->87529 87530 44b1ca 87528->87530 87531 4149c2 116 API calls 87529->87531 87532 44b1e1 87530->87532 87533 4149c2 116 API calls 87530->87533 87534 44b1d8 87530->87534 87531->87530 87563 4321a4 87532->87563 87535 44b2db 87533->87535 87534->86969 87535->87532 87537 44b2e9 87535->87537 87539 44b2f6 87537->87539 87542 414a46 __fcloseall 82 API calls 87537->87542 87538 44b224 87540 44b253 87538->87540 87541 44b228 87538->87541 87539->86969 87567 43213d 87540->87567 87544 44b235 87541->87544 87547 414a46 __fcloseall 82 API calls 87541->87547 87542->87539 87545 44b245 87544->87545 87548 414a46 __fcloseall 82 API calls 87544->87548 87545->86969 87546 44b25a 87549 44b260 87546->87549 87550 44b289 87546->87550 87547->87544 87548->87545 87552 44b26d 87549->87552 87554 414a46 __fcloseall 82 API calls 87549->87554 87577 44b0bf 87550->87577 87555 44b27d 87552->87555 87557 414a46 __fcloseall 82 API calls 87552->87557 87553 44b28f 87586 4320f8 87553->87586 87554->87552 87555->86969 87557->87555 87559 414a46 __fcloseall 82 API calls 87561 44b2a2 87559->87561 87560 44b2b2 87560->86969 87561->87560 87562 414a46 __fcloseall 82 API calls 87561->87562 87562->87560 87564 4321cb 87563->87564 87566 4321b4 __tzset_nolock _memmove 87563->87566 87565 414d04 __fread_nolock 61 API calls 87564->87565 87565->87566 87566->87538 87568 4135bb _malloc 46 API calls 87567->87568 87569 432150 87568->87569 87570 4135bb _malloc 46 API calls 87569->87570 87571 432162 87570->87571 87572 4135bb _malloc 46 API calls 87571->87572 87573 432174 87572->87573 87574 4320f8 46 API calls 87573->87574 87576 432189 87573->87576 87575 432198 87574->87575 87575->87546 87576->87546 87578 44b18e 87577->87578 87584 44b0da 87577->87584 87596 43206e 79 API calls 87578->87596 87580 44b194 87580->87553 87581 442caf 61 API calls 87581->87584 87584->87578 87584->87581 87585 44b19d 87584->87585 87594 44b040 61 API calls 87584->87594 87595 442d48 79 API calls 87584->87595 87585->87553 87587 432109 87586->87587 87589 43210f 87586->87589 87588 413748 _free 46 API calls 87587->87588 87588->87589 87590 413748 _free 46 API calls 87589->87590 87592 432122 87589->87592 87590->87592 87591 432135 87591->87559 87591->87561 87592->87591 87593 413748 _free 46 API calls 87592->87593 87593->87591 87594->87584 87595->87584 87596->87580 87597->86872 87598->86875 87599->86892 87600->86892 87601->86892 87602->86884 87603->86892 87604->86892 87605->86897 87606->86906 87607->86908 87608->86908 87658 410160 87609->87658 87611 41012f GetFullPathNameW 87612 410147 ctype 87611->87612 87612->86727 87614 4102cb SHGetDesktopFolder 87613->87614 87617 410333 _wcsncpy 87613->87617 87615 4102e0 _wcsncpy 87614->87615 87614->87617 87616 41031c SHGetPathFromIDListW 87615->87616 87615->87617 87616->87617 87617->86731 87619 4101bb 87618->87619 87621 425f4a 87618->87621 87620 410160 52 API calls 87619->87620 87622 4101c7 87620->87622 87623 4114ab __wcsicoll 58 API calls 87621->87623 87626 425f6e 87621->87626 87662 410200 52 API calls 2 library calls 87622->87662 87623->87621 87625 4101d6 87663 410200 52 API calls 2 library calls 87625->87663 87626->86733 87628 4101e9 87628->86733 87630 40f760 128 API calls 87629->87630 87631 40f584 87630->87631 87632 429335 87631->87632 87633 40f58c 87631->87633 87636 4528bd 118 API calls 87632->87636 87634 40f598 87633->87634 87635 429358 87633->87635 87688 4033c0 113 API calls 7 library calls 87634->87688 87689 434034 86 API calls _wprintf 87635->87689 87638 42934b 87636->87638 87641 429373 87638->87641 87642 42934f 87638->87642 87640 40f5b4 87640->86730 87645 4115d7 52 API calls 87641->87645 87644 431e58 82 API calls 87642->87644 87643 429369 87643->87641 87644->87635 87657 4293c5 ctype 87645->87657 87646 42959c 87647 413748 _free 46 API calls 87646->87647 87648 4295a5 87647->87648 87649 431e58 82 API calls 87648->87649 87650 4295b1 87649->87650 87654 401b10 52 API calls 87654->87657 87657->87646 87657->87654 87664 444af8 87657->87664 87667 44b41c 87657->87667 87674 402780 87657->87674 87682 4022d0 87657->87682 87690 44c7dd 64 API calls 3 library calls 87657->87690 87659 410167 _wcslen 87658->87659 87660 4115d7 52 API calls 87659->87660 87661 41017e _wcscpy 87660->87661 87661->87611 87662->87625 87663->87628 87665 4115d7 52 API calls 87664->87665 87666 444b27 _memmove 87665->87666 87666->87657 87668 44b429 87667->87668 87669 4115d7 52 API calls 87668->87669 87670 44b440 87669->87670 87671 44b45e 87670->87671 87672 401b10 52 API calls 87670->87672 87671->87657 87673 44b453 87672->87673 87673->87657 87675 402790 ctype _memmove 87674->87675 87676 402827 87674->87676 87677 4115d7 52 API calls 87675->87677 87678 4115d7 52 API calls 87676->87678 87679 402797 87677->87679 87678->87675 87680 4115d7 52 API calls 87679->87680 87681 4027bd 87679->87681 87680->87681 87681->87657 87683 4022e0 87682->87683 87685 40239d 87682->87685 87684 4115d7 52 API calls 87683->87684 87683->87685 87686 402320 ctype 87683->87686 87684->87686 87685->87657 87686->87685 87687 4115d7 52 API calls 87686->87687 87687->87686 87688->87640 87689->87643 87690->87657 87692 402539 ctype 87691->87692 87693 402417 87691->87693 87692->86737 87693->87692 87694 4115d7 52 API calls 87693->87694 87695 402443 87694->87695 87696 4115d7 52 API calls 87695->87696 87697 4024b4 87696->87697 87697->87692 87699 4022d0 52 API calls 87697->87699 87720 402880 95 API calls 2 library calls 87697->87720 87699->87697 87705 401566 87700->87705 87701 401794 87721 40e9a0 90 API calls 87701->87721 87704 4010a0 52 API calls 87704->87705 87705->87701 87705->87704 87706 40167a 87705->87706 87707 4017c0 87706->87707 87722 45e737 90 API calls 3 library calls 87706->87722 87707->86739 87709 40bc70 52 API calls 87708->87709 87718 40d451 87709->87718 87710 40d50f 87725 410600 52 API calls 87710->87725 87712 427c01 87726 45e737 90 API calls 3 library calls 87712->87726 87713 40e0a0 52 API calls 87713->87718 87715 401b10 52 API calls 87715->87718 87716 40d519 87716->86742 87718->87710 87718->87712 87718->87713 87718->87715 87718->87716 87723 40f310 53 API calls 87718->87723 87724 40d860 91 API calls 87718->87724 87720->87697 87721->87706 87722->87707 87723->87718 87724->87718 87725->87716 87726->87716 87727->86756 87728->86755 87730 42c5fe 87729->87730 87745 4091c6 87729->87745 87731 40bc70 52 API calls 87730->87731 87730->87745 87732 42c64e InterlockedIncrement 87731->87732 87733 42c665 87732->87733 87738 42c697 87732->87738 87735 42c672 InterlockedDecrement Sleep InterlockedIncrement 87733->87735 87733->87738 87734 42c737 InterlockedDecrement 87736 42c74a 87734->87736 87735->87733 87735->87738 87739 408f40 VariantClear 87736->87739 87737 42c731 87737->87734 87738->87734 87738->87737 88013 408e80 87738->88013 87741 42c752 87739->87741 88022 410c60 VariantClear ctype 87741->88022 87745->86782 87746 42c6db 87747 402160 52 API calls 87746->87747 87748 42c6e5 87747->87748 88018 45340c 85 API calls 87748->88018 87750 42c6f1 88019 40d200 52 API calls 2 library calls 87750->88019 87752 42c6fb 88020 465124 53 API calls 87752->88020 87754 42c715 87755 42c76a 87754->87755 87756 42c719 87754->87756 87758 401b10 52 API calls 87755->87758 88021 46fe32 VariantClear 87756->88021 87759 42c77e 87758->87759 87760 401980 53 API calls 87759->87760 87765 42c796 87760->87765 87761 42c812 88029 46fe32 VariantClear 87761->88029 87763 42c82a InterlockedDecrement 88030 46ff07 54 API calls 87763->88030 87765->87761 87766 42c864 87765->87766 88023 40ba10 87765->88023 88031 45e737 90 API calls 3 library calls 87766->88031 87768 42c9ec 88074 47d33e 331 API calls 87768->88074 87771 42c9fe 88075 46feb1 VariantClear VariantClear 87771->88075 87772 401980 53 API calls 87783 42c849 87772->87783 87774 408f40 VariantClear 87774->87783 87775 42ca08 87776 408f40 VariantClear 87779 42c891 87776->87779 87777 402780 52 API calls 87777->87783 88032 410c60 VariantClear ctype 87779->88032 87783->87768 87783->87772 87783->87774 87783->87777 88033 40a780 87783->88033 87784 42c874 87784->87776 87786 42ca59 87784->87786 87786->87786 87788 40afc4 87787->87788 87789 40b156 87787->87789 87790 40afd5 87788->87790 87791 42d1e3 87788->87791 88085 45e737 90 API calls 3 library calls 87789->88085 87794 40a780 194 API calls 87790->87794 87809 40b11a ctype 87790->87809 88086 45e737 90 API calls 3 library calls 87791->88086 87797 40b00a 87794->87797 87795 42d1f8 87800 408f40 VariantClear 87795->87800 87796 40b143 87796->86782 87797->87795 87801 40b012 87797->87801 87799 42d4db 87799->87799 87800->87796 87802 40b04a 87801->87802 87803 42d231 VariantClear 87801->87803 87804 40b094 ctype 87801->87804 87812 40b05c ctype 87802->87812 88087 40e270 VariantClear ctype 87802->88087 87803->87812 87805 40b108 87804->87805 87807 42d425 ctype 87804->87807 87805->87809 88088 40e270 VariantClear ctype 87805->88088 87806 42d45a VariantClear 87806->87809 87807->87806 87807->87809 87809->87796 88089 45e737 90 API calls 3 library calls 87809->88089 87810 4115d7 52 API calls 87810->87804 87812->87804 87812->87810 87814 408fff 87813->87814 87833 40900d 87813->87833 88090 403ea0 52 API calls __cinit 87814->88090 87817 42c3f6 88093 45e737 90 API calls 3 library calls 87817->88093 87819 42c44a 88095 45e737 90 API calls 3 library calls 87819->88095 87820 40a780 194 API calls 87820->87833 87821 42c47b 88096 451b42 61 API calls 87821->88096 87825 42c4cb 88098 47faae 233 API calls 87825->88098 87826 42c564 87827 408f40 VariantClear 87826->87827 87847 4090f2 ctype 87827->87847 87828 42c491 87828->87847 88097 45e737 90 API calls 3 library calls 87828->88097 87830 42c548 88101 45e737 90 API calls 3 library calls 87830->88101 87831 42c4da 87831->87847 88099 45e737 90 API calls 3 library calls 87831->88099 87832 409112 87832->87830 87841 40912b 87832->87841 87833->87817 87833->87819 87833->87820 87833->87821 87833->87825 87833->87826 87833->87830 87833->87832 87834 4090df 87833->87834 87836 42c528 87833->87836 87838 4090ea 87833->87838 87833->87847 88092 4534e3 52 API calls 87833->88092 88094 40c4e0 194 API calls 87833->88094 87834->87838 87839 408e80 VariantClear 87834->87839 88100 45e737 90 API calls 3 library calls 87836->88100 87843 408f40 VariantClear 87838->87843 87839->87838 87841->87847 88091 403e10 53 API calls 87841->88091 87843->87847 87845 40914b 87846 408f40 VariantClear 87845->87846 87846->87847 87847->86782 88102 408d90 87848->88102 87850 429778 88132 410c60 VariantClear ctype 87850->88132 87852 429780 87853 408cf9 87853->87850 87854 42976c 87853->87854 87856 408d2d 87853->87856 88131 45e737 90 API calls 3 library calls 87854->88131 88118 403d10 87856->88118 87859 408d71 ctype 87859->86782 87860 408f40 VariantClear 87861 408d45 ctype 87860->87861 87861->87859 87861->87860 87863 4096c6 _wcslen 87862->87863 87864 40a70c ctype _memmove 87863->87864 87865 4115d7 52 API calls 87863->87865 87868 4013a0 52 API calls 87864->87868 87866 4096fa _memmove 87865->87866 87867 4115d7 52 API calls 87866->87867 87869 40971b 87867->87869 87870 4297aa 87868->87870 87869->87864 87872 409749 CharUpperBuffW 87869->87872 87876 40976a ctype 87869->87876 87871 4115d7 52 API calls 87870->87871 87873 4297d1 _memmove 87871->87873 87872->87876 88470 45e737 90 API calls 3 library calls 87873->88470 87921 4097e5 ctype 87876->87921 88445 47dcbb 196 API calls 87876->88445 87877 408f40 VariantClear 87878 42ae92 87877->87878 88471 410c60 VariantClear ctype 87878->88471 87880 42aea4 87881 409aa2 87881->87873 87883 4115d7 52 API calls 87881->87883 87887 409afe 87881->87887 87882 40a689 87884 4115d7 52 API calls 87882->87884 87883->87887 87906 40a6af ctype _memmove 87884->87906 87885 409b2a 87889 429dbe 87885->87889 87952 409b4d ctype _memmove 87885->87952 88452 40b400 VariantClear VariantClear ctype 87885->88452 87886 40c2c0 52 API calls 87886->87921 87887->87885 87888 4115d7 52 API calls 87887->87888 87890 429d31 87888->87890 87893 429dd3 87889->87893 88453 40b400 VariantClear VariantClear ctype 87889->88453 87892 429d42 87890->87892 88449 44a801 52 API calls 87890->88449 87904 40e0a0 52 API calls 87892->87904 87893->87952 88454 40e1c0 VariantClear ctype 87893->88454 87894 429a46 VariantClear 87894->87921 87895 409fd2 87897 40a045 87895->87897 87950 42a3f5 87895->87950 87901 4115d7 52 API calls 87897->87901 87898 408f40 VariantClear 87898->87921 87907 40a04c 87901->87907 87903 4115d7 52 API calls 87903->87921 87908 429d57 87904->87908 87912 4115d7 52 API calls 87906->87912 87913 40a0a7 87907->87913 87916 4091e0 317 API calls 87907->87916 88450 453443 52 API calls 87908->88450 87909 40ba10 52 API calls 87909->87921 87910 42a42f 88458 45e737 90 API calls 3 library calls 87910->88458 87912->87864 87934 40a0af 87913->87934 88459 40c790 VariantClear ctype 87913->88459 87914 4299d9 87917 408f40 VariantClear 87914->87917 87916->87913 87920 4299e2 87917->87920 87918 429abd 87918->86782 87919 429d88 88451 453443 52 API calls 87919->88451 88447 410c60 VariantClear ctype 87920->88447 87921->87873 87921->87881 87921->87882 87921->87886 87921->87894 87921->87898 87921->87903 87921->87906 87921->87909 87921->87914 87921->87918 87926 40a780 194 API calls 87921->87926 87932 42a452 87921->87932 88446 40c4e0 194 API calls 87921->88446 88448 40e270 VariantClear ctype 87921->88448 87926->87921 87928 4115d7 52 API calls 87928->87952 87929 44a801 52 API calls 87929->87952 87931 408f40 VariantClear 87964 40a162 ctype _memmove 87931->87964 87932->87877 87933 402780 52 API calls 87933->87952 87935 40a11b 87934->87935 87936 42a4b4 VariantClear 87934->87936 87934->87964 87942 40a12d ctype 87935->87942 88460 40e270 VariantClear ctype 87935->88460 87936->87942 87937 40a780 194 API calls 87937->87952 87938 408e80 VariantClear 87938->87952 87940 401980 53 API calls 87940->87952 87941 4115d7 52 API calls 87941->87964 87942->87941 87942->87964 87944 408e80 VariantClear 87944->87964 87945 42a74d VariantClear 87945->87964 87946 41130a 51 API calls __cinit 87946->87952 87947 40a368 87949 42aad4 87947->87949 87957 40a397 87947->87957 87948 40e270 VariantClear 87948->87964 88463 46fe90 VariantClear VariantClear ctype 87949->88463 88457 47390f VariantClear 87950->88457 87951 42a7e4 VariantClear 87951->87964 87952->87864 87952->87895 87952->87910 87952->87928 87952->87929 87952->87933 87952->87937 87952->87938 87952->87940 87952->87946 87952->87950 87954 409c95 87952->87954 88455 45f508 52 API calls 87952->88455 88456 403e10 53 API calls 87952->88456 87953 42a886 VariantClear 87953->87964 87954->86782 87955 40a3ce 87969 40a3d9 ctype 87955->87969 88464 40b400 VariantClear VariantClear ctype 87955->88464 87957->87955 87981 40a42c ctype 87957->87981 88444 40b400 VariantClear VariantClear ctype 87957->88444 87960 42abaf 87965 42abd4 VariantClear 87960->87965 87975 40a4ee ctype 87960->87975 87961 4115d7 52 API calls 87961->87964 87962 40a4dc 87962->87975 88466 40e270 VariantClear ctype 87962->88466 87963 4115d7 52 API calls 87966 42a5a6 VariantInit VariantCopy 87963->87966 87964->87931 87964->87944 87964->87945 87964->87947 87964->87948 87964->87949 87964->87951 87964->87953 87964->87961 87964->87963 88461 470870 52 API calls 87964->88461 88462 44ccf1 VariantClear ctype 87964->88462 87965->87975 87966->87964 87971 42a5c6 VariantClear 87966->87971 87967 42ac4f 87976 42ac79 VariantClear 87967->87976 87982 40a546 ctype 87967->87982 87970 40a41a 87969->87970 87973 42ab44 VariantClear 87969->87973 87969->87981 87970->87981 88465 40e270 VariantClear ctype 87970->88465 87971->87964 87972 40a534 87972->87982 88467 40e270 VariantClear ctype 87972->88467 87973->87981 87975->87967 87975->87972 87976->87982 87977 42ad28 87983 42ad4e VariantClear 87977->87983 87988 40a583 ctype 87977->87988 87980 40a571 87980->87988 88468 40e270 VariantClear ctype 87980->88468 87981->87960 87981->87962 87982->87977 87982->87980 87983->87988 87985 40a650 ctype 87985->86782 87986 42ae0e VariantClear 87986->87988 87988->87985 87988->87986 88469 40e270 VariantClear ctype 87988->88469 87989->86782 87990->86782 87991->86782 87992->86766 87993->86772 87994->86782 87995->86782 87996->86782 87997->86782 87998->86795 87999->86795 88000->86795 88001->86795 88002->86795 88003->86795 88004->86795 88006 403cdf 88005->88006 88007 408f40 VariantClear 88006->88007 88008 403ce7 88007->88008 88008->86812 88009->86795 88010->86795 88011->86782 88012->86763 88014 408e94 88013->88014 88015 408e88 88013->88015 88017 45340c 85 API calls 88014->88017 88016 408f40 VariantClear 88015->88016 88016->88014 88017->87746 88018->87750 88019->87752 88020->87754 88021->87737 88022->87745 88024 40ba49 88023->88024 88028 40ba1b ctype _memmove 88023->88028 88026 4115d7 52 API calls 88024->88026 88025 4115d7 52 API calls 88027 40ba22 88025->88027 88026->88028 88027->87765 88028->88025 88029->87763 88030->87783 88031->87784 88032->87745 88034 40a7a6 88033->88034 88035 40ae8c 88033->88035 88037 4115d7 52 API calls 88034->88037 88076 41130a 51 API calls __cinit 88035->88076 88046 40a7c6 ctype _memmove 88037->88046 88038 40a86d 88048 40abd1 88038->88048 88040 401b10 52 API calls 88040->88046 88042 408e80 VariantClear 88042->88046 88043 42b791 VariantClear 88043->88046 88046->88038 88046->88040 88046->88042 88046->88043 88047 42ba2d VariantClear 88046->88047 88046->88048 88049 42b459 VariantClear 88046->88049 88050 40e270 VariantClear 88046->88050 88051 42b6f6 VariantClear 88046->88051 88053 40bc10 53 API calls 88046->88053 88054 408cc0 187 API calls 88046->88054 88056 4115d7 52 API calls 88046->88056 88057 42bbf5 88046->88057 88058 42bb6a 88046->88058 88059 4115d7 52 API calls 88046->88059 88060 40b5f0 89 API calls 88046->88060 88062 408f40 VariantClear 88046->88062 88068 42bc37 88046->88068 88073 4530c9 VariantClear 88046->88073 88047->88046 88049->88046 88050->88046 88051->88046 88053->88046 88054->88046 88056->88046 88060->88046 88062->88046 88073->88046 88074->87771 88075->87775 88076->88046 88085->87791 88086->87795 88087->87812 88088->87809 88089->87799 88090->87833 88091->87845 88092->87833 88093->87847 88094->87833 88095->87847 88096->87828 88097->87847 88098->87831 88099->87847 88100->87847 88101->87826 88103 4289d2 88102->88103 88104 408db3 88102->88104 88138 45e737 90 API calls 3 library calls 88103->88138 88133 40bec0 88104->88133 88107 4289e5 88139 45e737 90 API calls 3 library calls 88107->88139 88108 408dc9 88108->88107 88110 40ba10 52 API calls 88108->88110 88111 428a05 88108->88111 88113 40a780 194 API calls 88108->88113 88114 408e64 88108->88114 88116 408f40 VariantClear 88108->88116 88117 408e5a 88108->88117 88110->88108 88112 408f40 VariantClear 88111->88112 88112->88117 88113->88108 88115 408f40 VariantClear 88114->88115 88115->88117 88116->88108 88117->87853 88119 408f40 VariantClear 88118->88119 88120 403d20 88119->88120 88121 403cd0 VariantClear 88120->88121 88122 403d4d 88121->88122 88125 4013c0 52 API calls 88122->88125 88141 45e17d 88122->88141 88151 40de10 88122->88151 88156 46e91c 88122->88156 88159 4755ad 88122->88159 88162 46ae3d 88122->88162 88167 467897 88122->88167 88123 403d76 88123->87850 88123->87861 88125->88123 88131->87850 88132->87852 88134 40bed0 88133->88134 88135 40bef2 88134->88135 88136 427ae9 88134->88136 88140 45e737 90 API calls 3 library calls 88134->88140 88135->88108 88136->88108 88138->88107 88139->88111 88140->88136 88142 45e198 88141->88142 88143 45e19c 88142->88143 88144 45e1b8 88142->88144 88145 408f40 VariantClear 88143->88145 88146 45e1cc 88144->88146 88147 45e1db FindClose 88144->88147 88148 45e1a4 88145->88148 88149 45e1d9 ctype 88146->88149 88211 44ae3e 88146->88211 88147->88149 88148->88123 88149->88123 88152 4115d7 52 API calls 88151->88152 88153 40de23 88152->88153 88154 40da20 CloseHandle 88153->88154 88155 40de2e 88154->88155 88155->88123 88226 46e785 88156->88226 88158 46e92f 88158->88123 88337 475077 88159->88337 88161 4755c0 88161->88123 88163 4680ed 55 API calls 88162->88163 88164 46ae50 88163->88164 88165 408f40 VariantClear 88164->88165 88166 46ae65 88165->88166 88166->88123 88168 4678bb 88167->88168 88198 467954 88168->88198 88438 45340c 85 API calls 88168->88438 88169 4115d7 52 API calls 88170 467989 88169->88170 88172 467995 88170->88172 88442 40da60 53 API calls 88170->88442 88176 4533eb 85 API calls 88172->88176 88173 4678f6 88175 413a0e __wsplitpath 46 API calls 88173->88175 88177 4678fc 88175->88177 88178 4679b7 88176->88178 88179 401b10 52 API calls 88177->88179 88180 40de40 60 API calls 88178->88180 88181 46790c 88179->88181 88182 4679c3 88180->88182 88439 40d200 52 API calls 2 library calls 88181->88439 88184 4679c7 GetLastError 88182->88184 88185 467a05 88182->88185 88187 403cd0 VariantClear 88184->88187 88188 467a2c 88185->88188 88189 467a4b 88185->88189 88186 467917 88186->88198 88440 4339fa GetFileAttributesW FindFirstFileW FindClose 88186->88440 88190 4679dc 88187->88190 88192 4115d7 52 API calls 88188->88192 88193 4115d7 52 API calls 88189->88193 88194 4679e6 88190->88194 88202 44ae3e CloseHandle 88190->88202 88200 467a31 88192->88200 88201 467a49 88193->88201 88197 408f40 VariantClear 88194->88197 88195 467928 88196 46792f 88195->88196 88195->88198 88441 4335cd 56 API calls 3 library calls 88196->88441 88204 4679ed 88197->88204 88198->88169 88199 467964 88198->88199 88199->88123 88443 436299 52 API calls 2 library calls 88200->88443 88206 408f40 VariantClear 88201->88206 88202->88194 88204->88123 88208 467a88 88206->88208 88207 467939 88207->88198 88209 408f40 VariantClear 88207->88209 88208->88123 88212 44ae4b ctype 88211->88212 88214 443fdf 88211->88214 88212->88149 88219 40da20 88214->88219 88216 443feb 88223 4340db 88216->88223 88218 444001 88218->88212 88220 40da37 88219->88220 88221 40da29 88219->88221 88220->88221 88222 40da3c CloseHandle 88220->88222 88221->88216 88222->88216 88224 40da20 CloseHandle 88223->88224 88225 4340e7 ctype 88224->88225 88225->88218 88227 46e7a2 88226->88227 88228 4115d7 52 API calls 88227->88228 88230 46e802 88227->88230 88229 46e7ad 88228->88229 88232 46e7b9 88229->88232 88274 40da60 53 API calls 88229->88274 88231 46e7e5 88230->88231 88239 46e82f 88230->88239 88233 408f40 VariantClear 88231->88233 88275 4533eb 88232->88275 88236 46e7ea 88233->88236 88236->88158 88238 46e8b5 88267 4680ed 88238->88267 88239->88238 88241 46e845 88239->88241 88244 4533eb 85 API calls 88241->88244 88254 46e84b 88244->88254 88246 46e8bb 88271 443fbe 88246->88271 88247 46e87a 88291 4689f4 59 API calls 88247->88291 88251 46e883 88253 4013c0 52 API calls 88251->88253 88255 46e88f 88253->88255 88254->88247 88254->88251 88257 40e0a0 52 API calls 88255->88257 88256 408f40 VariantClear 88265 46e881 88256->88265 88258 46e899 88257->88258 88292 40d200 52 API calls 2 library calls 88258->88292 88260 46e911 88260->88158 88261 46e8a5 88293 4689f4 59 API calls 88261->88293 88262 40da20 CloseHandle 88264 46e903 88262->88264 88266 44ae3e CloseHandle 88264->88266 88265->88260 88265->88262 88266->88260 88268 468100 88267->88268 88269 4680fa 88267->88269 88268->88246 88294 467ac4 88269->88294 88317 443e36 88271->88317 88273 443fd3 88273->88256 88273->88265 88274->88232 88276 453404 88275->88276 88277 4533f8 88275->88277 88279 40de40 88276->88279 88277->88276 88324 4531b1 85 API calls 5 library calls 88277->88324 88280 40da20 CloseHandle 88279->88280 88281 40de4e 88280->88281 88325 40f110 88281->88325 88284 4264fa 88286 40de84 88291->88265 88292->88261 88293->88265 88295 467adc 88294->88295 88308 467bb8 88294->88308 88296 467c1d 88295->88296 88297 467c16 88295->88297 88298 467b90 88295->88298 88303 467aed 88295->88303 88300 4115d7 52 API calls 88296->88300 88316 40e270 VariantClear ctype 88297->88316 88301 4115d7 52 API calls 88298->88301 88302 467b75 _memmove 88300->88302 88301->88302 88306 4115d7 52 API calls 88302->88306 88304 467b28 ctype 88303->88304 88310 4115d7 52 API calls 88303->88310 88304->88296 88304->88302 88305 467b55 88304->88305 88307 4115d7 52 API calls 88305->88307 88306->88308 88309 467b5b 88307->88309 88308->88268 88314 442ee0 52 API calls 88309->88314 88310->88304 88316->88296 88320 443e19 88317->88320 88321 443e26 88320->88321 88322 443e32 WriteFile 88320->88322 88323 443db4 SetFilePointerEx SetFilePointerEx 88321->88323 88322->88273 88323->88322 88324->88276 88326 40f125 CreateFileW 88325->88326 88327 42630c 88325->88327 88329 40de74 88326->88329 88328 426311 CreateFileW 88327->88328 88327->88329 88328->88329 88330 426337 88328->88330 88329->88284 88333 40dea0 55 API calls ctype 88329->88333 88336 40df90 SetFilePointerEx SetFilePointerEx 88330->88336 88333->88286 88338 4533eb 85 API calls 88337->88338 88339 4750b8 88338->88339 88340 4750ee 88339->88340 88341 475129 88339->88341 88342 408f40 VariantClear 88340->88342 88390 4646e0 88341->88390 88350 4750f5 88342->88350 88344 47515e 88345 475162 88344->88345 88370 47518e 88344->88370 88346 408f40 VariantClear 88345->88346 88364 475169 88346->88364 88347 475357 88348 475365 88347->88348 88349 4754ea 88347->88349 88350->88161 88357 4533eb 85 API calls 88357->88370 88364->88161 88366 475480 88367 408f40 VariantClear 88366->88367 88367->88364 88370->88347 88370->88357 88370->88366 88376 4754b5 88370->88376 88422 436299 52 API calls 2 library calls 88370->88422 88423 463ad5 64 API calls __wcsicoll 88370->88423 88378 408f40 VariantClear 88376->88378 88378->88364 88433 4536f7 53 API calls 88390->88433 88392 4646fc 88434 4426cd 59 API calls _wcslen 88392->88434 88394 464711 88396 40bc70 52 API calls 88394->88396 88402 46474b 88394->88402 88397 46472c 88396->88397 88435 461465 52 API calls _memmove 88397->88435 88399 464741 88400 40c600 52 API calls 88399->88400 88400->88402 88401 464793 88401->88344 88402->88401 88436 463ad5 64 API calls __wcsicoll 88402->88436 88422->88370 88423->88370 88433->88392 88434->88394 88435->88399 88436->88401 88438->88173 88439->88186 88440->88195 88441->88207 88442->88172 88443->88201 88444->87955 88445->87876 88446->87921 88447->87985 88448->87921 88449->87892 88450->87919 88451->87885 88452->87889 88453->87893 88454->87952 88455->87952 88456->87952 88457->87910 88458->87932 88459->87913 88460->87942 88461->87964 88462->87964 88463->87955 88464->87969 88465->87981 88466->87975 88467->87982 88468->87988 88469->87988 88470->87932 88471->87880 88472 42d154 88476 480a8d 88472->88476 88474 42d161 88475 480a8d 194 API calls 88474->88475 88475->88474 88477 480ae4 88476->88477 88478 480b26 88476->88478 88479 480aeb 88477->88479 88480 480b15 88477->88480 88481 40bc70 52 API calls 88478->88481 88482 480aee 88479->88482 88483 480b04 88479->88483 88509 4805bf 194 API calls 88480->88509 88500 480b2e 88481->88500 88482->88478 88485 480af3 88482->88485 88508 47fea2 194 API calls __itow_s 88483->88508 88507 47f135 194 API calls 88485->88507 88487 40e0a0 52 API calls 88487->88500 88490 408f40 VariantClear 88492 481156 88490->88492 88491 480aff 88491->88490 88493 408f40 VariantClear 88492->88493 88494 48115e 88493->88494 88494->88474 88495 401980 53 API calls 88495->88500 88497 40c2c0 52 API calls 88497->88500 88498 40e710 53 API calls 88498->88500 88499 40a780 194 API calls 88499->88500 88500->88487 88500->88491 88500->88495 88500->88497 88500->88498 88500->88499 88502 408e80 VariantClear 88500->88502 88503 480ff5 88500->88503 88510 45377f 52 API calls 88500->88510 88511 45e951 53 API calls 88500->88511 88512 40e830 53 API calls 88500->88512 88513 47925f 53 API calls 88500->88513 88514 47fcff 194 API calls 88500->88514 88502->88500 88515 45e737 90 API calls 3 library calls 88503->88515 88507->88491 88508->88491 88509->88491 88510->88500 88511->88500 88512->88500 88513->88500 88514->88500 88515->88491 88516 42b14b 88523 40bc10 88516->88523 88518 42b159 88519 4096a0 331 API calls 88518->88519 88520 42b177 88519->88520 88534 44b92d VariantClear 88520->88534 88522 42bc5b 88524 40bc24 88523->88524 88525 40bc17 88523->88525 88527 40bc2a 88524->88527 88528 40bc3c 88524->88528 88526 408e80 VariantClear 88525->88526 88529 40bc1f 88526->88529 88530 408e80 VariantClear 88527->88530 88531 4115d7 52 API calls 88528->88531 88529->88518 88532 40bc33 88530->88532 88533 40bc43 88531->88533 88532->88518 88533->88518 88534->88522 88535 425b2b 88540 40f000 88535->88540 88539 425b3a 88541 4115d7 52 API calls 88540->88541 88542 40f007 88541->88542 88543 4276ea 88542->88543 88549 40f030 88542->88549 88548 41130a 51 API calls __cinit 88548->88539 88550 40f039 88549->88550 88551 40f01a 88549->88551 88579 41130a 51 API calls __cinit 88550->88579 88553 40e500 88551->88553 88554 40bc70 52 API calls 88553->88554 88555 40e515 GetVersionExW 88554->88555 88556 402160 52 API calls 88555->88556 88557 40e557 88556->88557 88580 40e660 88557->88580 88562 427674 88566 4276c6 GetSystemInfo 88562->88566 88565 40e5cd GetCurrentProcess 88601 40ef20 LoadLibraryA GetProcAddress 88565->88601 88568 4276d5 GetSystemInfo 88566->88568 88569 40e5e0 88569->88568 88594 40efd0 88569->88594 88572 40e629 88598 40ef90 88572->88598 88575 40e641 FreeLibrary 88576 40e644 88575->88576 88577 40e653 FreeLibrary 88576->88577 88578 40e656 88576->88578 88577->88578 88578->88548 88579->88551 88581 40e667 88580->88581 88582 42761d 88581->88582 88583 40c600 52 API calls 88581->88583 88584 40e55c 88583->88584 88585 40e680 88584->88585 88586 40e687 88585->88586 88587 427616 88586->88587 88588 40c600 52 API calls 88586->88588 88589 40e566 88588->88589 88589->88562 88590 40ef60 88589->88590 88591 40e5c8 88590->88591 88592 40ef66 LoadLibraryA 88590->88592 88591->88565 88591->88569 88592->88591 88593 40ef77 GetProcAddress 88592->88593 88593->88591 88595 40e620 88594->88595 88596 40efd6 LoadLibraryA 88594->88596 88595->88566 88595->88572 88596->88595 88597 40efe7 GetProcAddress 88596->88597 88597->88595 88602 40efb0 LoadLibraryA GetProcAddress 88598->88602 88600 40e632 GetNativeSystemInfo 88600->88575 88600->88576 88601->88569 88602->88600 88603 3f1a99b 88606 3f1a610 88603->88606 88605 3f1a9e7 88607 3f18040 GetPEB 88606->88607 88610 3f1a6af 88607->88610 88609 3f1a6e0 CreateFileW 88609->88610 88611 3f1a6ed 88609->88611 88610->88611 88612 3f1a709 VirtualAlloc 88610->88612 88617 3f1a810 CloseHandle 88610->88617 88618 3f1a820 VirtualFree 88610->88618 88619 3f1b520 GetPEB 88610->88619 88614 3f1a90a 88611->88614 88615 3f1a8fc VirtualFree 88611->88615 88612->88611 88613 3f1a72a ReadFile 88612->88613 88613->88611 88616 3f1a748 VirtualAlloc 88613->88616 88614->88605 88615->88614 88616->88610 88616->88611 88617->88610 88618->88610 88620 3f1b54a 88619->88620 88620->88609 88621 425b5e 88626 40c7f0 88621->88626 88625 425b6d 88661 40db10 52 API calls 88626->88661 88628 40c82a 88662 410ab0 6 API calls 88628->88662 88630 40c86d 88631 40bc70 52 API calls 88630->88631 88632 40c877 88631->88632 88633 40bc70 52 API calls 88632->88633 88634 40c881 88633->88634 88635 40bc70 52 API calls 88634->88635 88636 40c88b 88635->88636 88637 40bc70 52 API calls 88636->88637 88638 40c8d1 88637->88638 88639 40bc70 52 API calls 88638->88639 88640 40c991 88639->88640 88663 40d2c0 52 API calls 88640->88663 88642 40c99b 88664 40d0d0 53 API calls 88642->88664 88644 40c9c1 88645 40bc70 52 API calls 88644->88645 88646 40c9cb 88645->88646 88665 40e310 53 API calls 88646->88665 88648 40ca28 88649 408f40 VariantClear 88648->88649 88650 40ca30 88649->88650 88651 408f40 VariantClear 88650->88651 88652 40ca38 GetStdHandle 88651->88652 88653 429630 88652->88653 88654 40ca87 88652->88654 88653->88654 88655 429639 88653->88655 88660 41130a 51 API calls __cinit 88654->88660 88666 4432c0 57 API calls 88655->88666 88657 429641 88667 44b6ab CreateThread 88657->88667 88659 42964f CloseHandle 88659->88654 88660->88625 88661->88628 88662->88630 88663->88642 88664->88644 88665->88648 88666->88657 88667->88659 88668 44b5cb 58 API calls 88667->88668 88669 425b6f 88674 40dc90 88669->88674 88673 425b7e 88675 40bc70 52 API calls 88674->88675 88676 40dd03 88675->88676 88683 40f210 88676->88683 88678 426a97 88680 40dd96 88680->88678 88681 40ddb7 88680->88681 88686 40dc00 52 API calls 2 library calls 88680->88686 88682 41130a 51 API calls __cinit 88681->88682 88682->88673 88687 40f250 RegOpenKeyExW 88683->88687 88685 40f230 88685->88680 88686->88680 88688 425e17 88687->88688 88689 40f275 RegQueryValueExW 88687->88689 88688->88685 88690 40f2c3 RegCloseKey 88689->88690 88691 40f298 88689->88691 88690->88685 88692 40f2a9 RegCloseKey 88691->88692 88693 425e1d 88691->88693 88692->88685
                      APIs
                      • _wcslen.LIBCMT ref: 004096C1
                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                      • _memmove.LIBCMT ref: 0040970C
                        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                      • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
                      • _memmove.LIBCMT ref: 00409D96
                      • _memmove.LIBCMT ref: 0040A6C4
                      • _memmove.LIBCMT ref: 004297E5
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
                      • String ID:
                      • API String ID: 2383988440-0
                      • Opcode ID: 0c7f704c1111840706a6f5d41559473282fc5ae19e9abcecf6c32e7dc2e8fb44
                      • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
                      • Opcode Fuzzy Hash: 0c7f704c1111840706a6f5d41559473282fc5ae19e9abcecf6c32e7dc2e8fb44
                      • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

                      Control-flow Graph

                      APIs
                      • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
                        • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
                        • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
                        • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
                        • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
                        • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
                        • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
                      • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
                      • GetFullPathNameW.KERNEL32(004A7F6C,00000104,?,004A7F50,004A7F54), ref: 0040D625
                        • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
                      • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
                      • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
                      • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
                      • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
                      • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
                        • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
                        • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                        • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
                        • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
                        • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
                        • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                        • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
                        • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                        • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                        • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
                        • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
                        • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                      Strings
                      • runas, xrefs: 0042E2AD, 0042E2DC
                      • This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support., xrefs: 0042E1C2
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
                      • String ID: This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                      • API String ID: 2495805114-3383388033
                      • Opcode ID: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
                      • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
                      • Opcode Fuzzy Hash: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
                      • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1904 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 1913 40e582-40e583 1904->1913 1914 427674-427679 1904->1914 1917 40e585-40e596 1913->1917 1918 40e5ba-40e5cb call 40ef60 1913->1918 1915 427683-427686 1914->1915 1916 42767b-427681 1914->1916 1920 427693-427696 1915->1920 1921 427688-427691 1915->1921 1919 4276b4-4276be 1916->1919 1922 427625-427629 1917->1922 1923 40e59c-40e59f 1917->1923 1931 40e5ec-40e60c 1918->1931 1932 40e5cd-40e5e6 GetCurrentProcess call 40ef20 1918->1932 1933 4276c6-4276ca GetSystemInfo 1919->1933 1920->1919 1930 427698-4276a8 1920->1930 1921->1919 1926 427636-427640 1922->1926 1927 42762b-427631 1922->1927 1928 40e5a5-40e5ae 1923->1928 1929 427654-427657 1923->1929 1926->1918 1927->1918 1935 40e5b4 1928->1935 1936 427645-42764f 1928->1936 1929->1918 1934 42765d-42766f 1929->1934 1937 4276b0 1930->1937 1938 4276aa-4276ae 1930->1938 1940 40e612-40e623 call 40efd0 1931->1940 1941 4276d5-4276df GetSystemInfo 1931->1941 1932->1931 1947 40e5e8 1932->1947 1933->1941 1934->1918 1935->1918 1936->1918 1937->1919 1938->1919 1940->1933 1946 40e629-40e63f call 40ef90 GetNativeSystemInfo 1940->1946 1950 40e641-40e642 FreeLibrary 1946->1950 1951 40e644-40e651 1946->1951 1947->1931 1950->1951 1952 40e653-40e654 FreeLibrary 1951->1952 1953 40e656-40e65d 1951->1953 1952->1953
                      APIs
                      • GetVersionExW.KERNEL32(?), ref: 0040E52A
                        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                      • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
                      • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
                      • FreeLibrary.KERNEL32(?), ref: 0040E642
                      • FreeLibrary.KERNEL32(?), ref: 0040E654
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
                      • String ID: 0SH
                      • API String ID: 3363477735-851180471
                      • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                      • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
                      • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                      • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
                      APIs
                      • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
                      • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: IsThemeActive$uxtheme.dll
                      • API String ID: 2574300362-3542929980
                      • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                      • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
                      • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                      • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
                      APIs
                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
                      • Sleep.KERNEL32(0000000A,?), ref: 004094D1
                      • TranslateMessage.USER32(?), ref: 00409556
                      • DispatchMessageW.USER32(?), ref: 00409561
                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Message$Peek$DispatchSleepTranslate
                      • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
                      • API String ID: 1762048999-758534266
                      • Opcode ID: 23d079a985ba2b1b40b9133d067a4c416b55a71ed9da253c2d941bd9d0d29544
                      • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
                      • Opcode Fuzzy Hash: 23d079a985ba2b1b40b9133d067a4c416b55a71ed9da253c2d941bd9d0d29544
                      • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

                      Control-flow Graph

                      APIs
                      • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                      • __wcsicoll.LIBCMT ref: 00402007
                      • __wcsicoll.LIBCMT ref: 0040201D
                      • __wcsicoll.LIBCMT ref: 00402033
                        • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
                      • __wcsicoll.LIBCMT ref: 00402049
                      • _wcscpy.LIBCMT ref: 0040207C
                      • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104), ref: 00428B5B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
                      • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$CMDLINE$CMDLINERAW
                      • API String ID: 3948761352-1609664196
                      • Opcode ID: de7630e39462d0d30620e5d386b824db2ab2692deedf796b652438eb031e1025
                      • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
                      • Opcode Fuzzy Hash: de7630e39462d0d30620e5d386b824db2ab2692deedf796b652438eb031e1025
                      • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

                      Control-flow Graph

                      APIs
                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
                      • __wsplitpath.LIBCMT ref: 0040E41C
                        • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                      • _wcsncat.LIBCMT ref: 0040E433
                      • __wmakepath.LIBCMT ref: 0040E44F
                        • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
                        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                      • _wcscpy.LIBCMT ref: 0040E487
                        • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                      • _wcscat.LIBCMT ref: 00427541
                      • _wcslen.LIBCMT ref: 00427551
                      • _wcslen.LIBCMT ref: 00427562
                      • _wcscat.LIBCMT ref: 0042757C
                      • _wcsncpy.LIBCMT ref: 004275BC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
                      • String ID: Include$\
                      • API String ID: 3173733714-3429789819
                      • Opcode ID: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                      • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
                      • Opcode Fuzzy Hash: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                      • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

                      Control-flow Graph

                      APIs
                      • _fseek.LIBCMT ref: 0045292B
                        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                        • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                        • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                      • __fread_nolock.LIBCMT ref: 00452961
                      • __fread_nolock.LIBCMT ref: 00452971
                      • __fread_nolock.LIBCMT ref: 0045298A
                      • __fread_nolock.LIBCMT ref: 004529A5
                      • _fseek.LIBCMT ref: 004529BF
                      • _malloc.LIBCMT ref: 004529CA
                      • _malloc.LIBCMT ref: 004529D6
                      • __fread_nolock.LIBCMT ref: 004529E7
                      • _free.LIBCMT ref: 00452A17
                      • _free.LIBCMT ref: 00452A20
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
                      • String ID:
                      • API String ID: 1255752989-0
                      • Opcode ID: 3f43f4209565cf9930803292f55859f81113a3883ec0e7be7bac3bff720706a2
                      • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
                      • Opcode Fuzzy Hash: 3f43f4209565cf9930803292f55859f81113a3883ec0e7be7bac3bff720706a2
                      • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

                      Control-flow Graph

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: __fread_nolock$_fseek_wcscpy
                      • String ID: FILE
                      • API String ID: 3888824918-3121273764
                      • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                      • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
                      • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                      • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

                      Control-flow Graph

                      APIs
                      • GetSysColorBrush.USER32(0000000F), ref: 004104C3
                      • RegisterClassExW.USER32(00000030), ref: 004104ED
                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                      • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                      • LoadIconW.USER32(00400000,000000A9), ref: 00410542
                      • ImageList_ReplaceIcon.COMCTL32(00997E20,000000FF,00000000), ref: 00410552
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                      • API String ID: 2914291525-1005189915
                      • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                      • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
                      • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                      • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

                      Control-flow Graph

                      APIs
                      • GetSysColorBrush.USER32(0000000F), ref: 0041039B
                      • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                      • LoadIconW.USER32(?,00000063), ref: 004103C0
                      • LoadIconW.USER32(?,000000A4), ref: 004103D3
                      • LoadIconW.USER32(?,000000A2), ref: 004103E6
                      • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                      • RegisterClassExW.USER32(?), ref: 0041045D
                        • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
                        • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
                        • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                        • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                        • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                        • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
                        • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(00997E20,000000FF,00000000), ref: 00410552
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                      • String ID: #$0$AutoIt v3
                      • API String ID: 423443420-4155596026
                      • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                      • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
                      • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                      • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _malloc
                      • String ID: Default
                      • API String ID: 1579825452-753088835
                      • Opcode ID: 443df2c3c68efbd16d3948df002b7be0acb455de1234585f427717e2e3840c69
                      • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
                      • Opcode Fuzzy Hash: 443df2c3c68efbd16d3948df002b7be0acb455de1234585f427717e2e3840c69
                      • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1954 40f5c0-40f5cf call 422240 1957 40f5d0-40f5e8 1954->1957 1957->1957 1958 40f5ea-40f613 call 413650 call 410e60 1957->1958 1963 40f614-40f633 call 414d04 1958->1963 1966 40f691 1963->1966 1967 40f635-40f63c 1963->1967 1968 40f696-40f69c 1966->1968 1969 40f660-40f674 call 4150d1 1967->1969 1970 40f63e 1967->1970 1974 40f679-40f67c 1969->1974 1971 40f640 1970->1971 1973 40f642-40f650 1971->1973 1975 40f652-40f655 1973->1975 1976 40f67e-40f68c 1973->1976 1974->1963 1979 40f65b-40f65e 1975->1979 1980 425d1e-425d3e call 4150d1 call 414d04 1975->1980 1977 40f68e-40f68f 1976->1977 1978 40f69f-40f6ad 1976->1978 1977->1975 1981 40f6b4-40f6c2 1978->1981 1982 40f6af-40f6b2 1978->1982 1979->1969 1979->1971 1990 425d43-425d5f call 414d30 1980->1990 1985 425d16 1981->1985 1986 40f6c8-40f6d6 1981->1986 1982->1975 1985->1980 1988 425d05-425d0b 1986->1988 1989 40f6dc-40f6df 1986->1989 1988->1973 1991 425d11 1988->1991 1989->1975 1990->1968 1991->1985
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: __fread_nolock_fseek_memmove_strcat
                      • String ID: AU3!$EA06
                      • API String ID: 1268643489-2658333250
                      • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                      • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
                      • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                      • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1994 401100-401111 1995 401113-401119 1994->1995 1996 401179-401180 1994->1996 1998 401144-40114a 1995->1998 1999 40111b-40111e 1995->1999 1996->1995 1997 401182 1996->1997 2002 40112c-401141 DefWindowProcW 1997->2002 2000 401184-40118e call 401250 1998->2000 2001 40114c-40114f 1998->2001 1999->1998 2003 401120-401126 1999->2003 2011 401193-40119a 2000->2011 2004 401151-401157 2001->2004 2005 40119d 2001->2005 2003->2002 2007 42b038-42b03f 2003->2007 2008 401219-40121f 2004->2008 2009 40115d 2004->2009 2012 4011a3-4011a9 2005->2012 2013 42afb4-42afc5 call 40f190 2005->2013 2007->2002 2010 42b045-42b059 call 401000 call 40e0c0 2007->2010 2008->2003 2016 401225-42b06d call 468b0e 2008->2016 2014 401163-401166 2009->2014 2015 42b01d-42b024 2009->2015 2010->2002 2012->2003 2019 4011af 2012->2019 2013->2011 2021 42afe9-42b018 call 40f190 call 401a50 2014->2021 2022 40116c-401172 2014->2022 2015->2002 2020 42b02a-42b033 call 4370f4 2015->2020 2016->2011 2019->2003 2026 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 2019->2026 2027 4011db-401202 SetTimer RegisterWindowMessageW 2019->2027 2020->2002 2021->2002 2022->2003 2030 401174-42afde call 45fd57 2022->2030 2027->2011 2028 401204-401216 CreatePopupMenu 2027->2028 2030->2002 2045 42afe4 2030->2045 2045->2011
                      APIs
                      • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
                      • KillTimer.USER32(?,00000001,?), ref: 004011B9
                      • PostQuitMessage.USER32(00000000), ref: 004011CB
                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
                      • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
                      • CreatePopupMenu.USER32 ref: 00401204
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                      • String ID: TaskbarCreated
                      • API String ID: 129472671-2362178303
                      • Opcode ID: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                      • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
                      • Opcode Fuzzy Hash: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                      • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2046 4115d7-4115df 2047 4115ee-4115f9 call 4135bb 2046->2047 2050 4115e1-4115ec call 411988 2047->2050 2051 4115fb-4115fc 2047->2051 2050->2047 2054 4115fd-41160e 2050->2054 2055 411610-41163b call 417fc0 call 41130a 2054->2055 2056 41163c-411656 call 4180af call 418105 2054->2056 2055->2056
                      APIs
                      • _malloc.LIBCMT ref: 004115F1
                        • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                        • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                        • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                      • std::exception::exception.LIBCMT ref: 00411626
                      • std::exception::exception.LIBCMT ref: 00411640
                      • __CxxThrowException@8.LIBCMT ref: 00411651
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                      • String ID: ,*H$4*H$@fI
                      • API String ID: 615853336-1459471987
                      • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                      • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
                      • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                      • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2065 3f1a610-3f1a6be call 3f18040 2068 3f1a6c5-3f1a6eb call 3f1b520 CreateFileW 2065->2068 2071 3f1a6f2-3f1a702 2068->2071 2072 3f1a6ed 2068->2072 2079 3f1a704 2071->2079 2080 3f1a709-3f1a723 VirtualAlloc 2071->2080 2073 3f1a83d-3f1a841 2072->2073 2074 3f1a883-3f1a886 2073->2074 2075 3f1a843-3f1a847 2073->2075 2081 3f1a889-3f1a890 2074->2081 2077 3f1a853-3f1a857 2075->2077 2078 3f1a849-3f1a84c 2075->2078 2082 3f1a867-3f1a86b 2077->2082 2083 3f1a859-3f1a863 2077->2083 2078->2077 2079->2073 2084 3f1a725 2080->2084 2085 3f1a72a-3f1a741 ReadFile 2080->2085 2086 3f1a892-3f1a89d 2081->2086 2087 3f1a8e5-3f1a8fa 2081->2087 2090 3f1a87b 2082->2090 2091 3f1a86d-3f1a877 2082->2091 2083->2082 2084->2073 2092 3f1a743 2085->2092 2093 3f1a748-3f1a788 VirtualAlloc 2085->2093 2094 3f1a8a1-3f1a8ad 2086->2094 2095 3f1a89f 2086->2095 2088 3f1a90a-3f1a912 2087->2088 2089 3f1a8fc-3f1a907 VirtualFree 2087->2089 2089->2088 2090->2074 2091->2090 2092->2073 2098 3f1a78a 2093->2098 2099 3f1a78f-3f1a7aa call 3f1b770 2093->2099 2096 3f1a8c1-3f1a8cd 2094->2096 2097 3f1a8af-3f1a8bf 2094->2097 2095->2087 2102 3f1a8da-3f1a8e0 2096->2102 2103 3f1a8cf-3f1a8d8 2096->2103 2101 3f1a8e3 2097->2101 2098->2073 2105 3f1a7b5-3f1a7bf 2099->2105 2101->2081 2102->2101 2103->2101 2106 3f1a7c1-3f1a7f0 call 3f1b770 2105->2106 2107 3f1a7f2-3f1a806 call 3f1b580 2105->2107 2106->2105 2113 3f1a808 2107->2113 2114 3f1a80a-3f1a80e 2107->2114 2113->2073 2115 3f1a810-3f1a814 CloseHandle 2114->2115 2116 3f1a81a-3f1a81e 2114->2116 2115->2116 2117 3f1a820-3f1a82b VirtualFree 2116->2117 2118 3f1a82e-3f1a837 2116->2118 2117->2118 2118->2068 2118->2073
                      APIs
                      • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 03F1A6E1
                      • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 03F1A907
                      Memory Dump Source
                      • Source File: 00000000.00000002.2054269016.0000000003F18000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F18000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3f18000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CreateFileFreeVirtual
                      • String ID:
                      • API String ID: 204039940-0
                      • Opcode ID: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                      • Instruction ID: def28e536bd9fc9dd9b85b93f08e92bbcd5784641fa215ba89029087aaaae102
                      • Opcode Fuzzy Hash: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                      • Instruction Fuzzy Hash: CBA13475E01209EBDF14CFA4D994BAEBBB5FF48314F248199E101BB280D7B59A91CB90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2119 40e4c0-40e4e5 call 403350 RegOpenKeyExW 2122 427190-4271ae RegQueryValueExW 2119->2122 2123 40e4eb-40e4f0 2119->2123 2124 4271b0-4271f5 call 4115d7 call 43652f RegQueryValueExW 2122->2124 2125 42721a-42722a RegCloseKey 2122->2125 2130 427210-427219 call 436508 2124->2130 2131 4271f7-42720e call 402160 2124->2131 2130->2125 2131->2130
                      APIs
                      • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
                      • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: QueryValue$CloseOpen
                      • String ID: Include$Software\AutoIt v3\AutoIt
                      • API String ID: 1586453840-614718249
                      • Opcode ID: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                      • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
                      • Opcode Fuzzy Hash: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                      • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2136 410570-4105f1 CreateWindowExW * 2 ShowWindow * 2
                      APIs
                      • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                      • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                      • ShowWindow.USER32(?,00000000), ref: 004105E4
                      • ShowWindow.USER32(?,00000000), ref: 004105EE
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Window$CreateShow
                      • String ID: AutoIt v3$edit
                      • API String ID: 1584632944-3779509399
                      • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                      • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
                      • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                      • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2137 3f1a3f0-3f1a50e call 3f18040 call 3f1a2e0 CreateFileW 2144 3f1a510 2137->2144 2145 3f1a515-3f1a525 2137->2145 2146 3f1a5c5-3f1a5ca 2144->2146 2148 3f1a527 2145->2148 2149 3f1a52c-3f1a546 VirtualAlloc 2145->2149 2148->2146 2150 3f1a548 2149->2150 2151 3f1a54a-3f1a561 ReadFile 2149->2151 2150->2146 2152 3f1a563 2151->2152 2153 3f1a565-3f1a59f call 3f1a320 call 3f192e0 2151->2153 2152->2146 2158 3f1a5a1-3f1a5b6 call 3f1a370 2153->2158 2159 3f1a5bb-3f1a5c3 ExitProcess 2153->2159 2158->2159 2159->2146
                      APIs
                        • Part of subcall function 03F1A2E0: Sleep.KERNELBASE(000001F4), ref: 03F1A2F1
                      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 03F1A504
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2054269016.0000000003F18000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F18000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3f18000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CreateFileSleep
                      • String ID: L9WNUK12D1OX3QG
                      • API String ID: 2694422964-2812984501
                      • Opcode ID: 55315c0f6f01ad08e791e781d673788b9ba434cb00cb07b77f77c2ff7e595c81
                      • Instruction ID: ebb9d9771cf8d3da28602ff8405bdba48fd69cf172a4f441d8462ab2653ca81a
                      • Opcode Fuzzy Hash: 55315c0f6f01ad08e791e781d673788b9ba434cb00cb07b77f77c2ff7e595c81
                      • Instruction Fuzzy Hash: 33516F31D05249DAEF11DBF4D858BEEBB79AF08300F044199E608BB2C4D7B91B45CBA5
                      APIs
                      • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
                        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                      • _wcsncpy.LIBCMT ref: 00401C41
                      • _wcscpy.LIBCMT ref: 00401C5D
                      • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
                      • String ID: Line:
                      • API String ID: 1874344091-1585850449
                      • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                      • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
                      • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                      • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
                      APIs
                      • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
                      • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
                      • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
                      • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Close$OpenQueryValue
                      • String ID: Control Panel\Mouse
                      • API String ID: 1607946009-824357125
                      • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                      • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
                      • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                      • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
                      APIs
                      • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                      • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                      • _wcsncpy.LIBCMT ref: 004102ED
                      • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                      • _wcsncpy.LIBCMT ref: 00410340
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _wcsncpy$DesktopFolderFromListMallocPath
                      • String ID:
                      • API String ID: 3170942423-0
                      • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                      • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
                      • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                      • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4
                      APIs
                      • CreateProcessW.KERNELBASE(?,00000000), ref: 03F19B0D
                      • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03F19B31
                      • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03F19B53
                      Memory Dump Source
                      • Source File: 00000000.00000002.2054269016.0000000003F18000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F18000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3f18000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Process$ContextCreateMemoryReadThreadWow64
                      • String ID:
                      • API String ID: 2438371351-0
                      • Opcode ID: a5f8eca76df1c4d60a387bf050efe929c827b8bdc82418feca4108ede207e1c1
                      • Instruction ID: 7066474b9976bb647057faec13494829c386b25d09a3ba373b52f257474cc619
                      • Opcode Fuzzy Hash: a5f8eca76df1c4d60a387bf050efe929c827b8bdc82418feca4108ede207e1c1
                      • Instruction Fuzzy Hash: 70621F30A14259DBEB24CF64D850BDEB376EF58300F1091A9D10DEB390E7B99E91CB99
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _memmove
                      • String ID: Error:
                      • API String ID: 4104443479-232661952
                      • Opcode ID: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                      • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
                      • Opcode Fuzzy Hash: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                      • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
                      APIs
                      • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
                        • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                        • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                        • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                        • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
                        • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                        • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
                        • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
                      • String ID: X$pWH
                      • API String ID: 85490731-941433119
                      • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                      • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
                      • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                      • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
                      APIs
                      • _wcslen.LIBCMT ref: 00401B11
                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                      • _memmove.LIBCMT ref: 00401B57
                        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
                      • String ID: @EXITCODE
                      • API String ID: 2734553683-3436989551
                      • Opcode ID: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                      • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
                      • Opcode Fuzzy Hash: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                      • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                      • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
                      • Opcode Fuzzy Hash: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                      • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: __filbuf__getptd_noexit__read_memcpy_s
                      • String ID:
                      • API String ID: 1794320848-0
                      • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                      • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
                      • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                      • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
                      APIs
                      • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
                      • TerminateProcess.KERNEL32(00000000), ref: 004753CE
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Process$CurrentTerminate
                      • String ID:
                      • API String ID: 2429186680-0
                      • Opcode ID: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                      • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
                      • Opcode Fuzzy Hash: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                      • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
                      APIs
                      • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: IconNotifyShell_
                      • String ID:
                      • API String ID: 1144537725-0
                      • Opcode ID: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                      • Instruction ID: eb3a406907b17a2fb372061a5351d340f380801689ea858bebf243c914dbfa85
                      • Opcode Fuzzy Hash: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                      • Instruction Fuzzy Hash: 16318F70608701DFD320CF25D855797BBE4BB85314F000C3EE5AA87391E7B8A958CB5A
                      APIs
                      • _malloc.LIBCMT ref: 0043214B
                        • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                        • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                        • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                      • _malloc.LIBCMT ref: 0043215D
                      • _malloc.LIBCMT ref: 0043216F
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _malloc$AllocateHeap
                      • String ID:
                      • API String ID: 680241177-0
                      • Opcode ID: f71c381a9a4e64bea8472010c286ed0a2169748a03ca4327bb91778eef0474c7
                      • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
                      • Opcode Fuzzy Hash: f71c381a9a4e64bea8472010c286ed0a2169748a03ca4327bb91778eef0474c7
                      • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
                      APIs
                      • _free.LIBCMT ref: 0043210A
                        • Part of subcall function 00413748: RtlFreeHeap.NTDLL(00000000,00000000,?,00417A5A,00000000), ref: 0041375E
                        • Part of subcall function 00413748: GetLastError.KERNEL32(00000000,?,00417A5A,00000000), ref: 00413770
                      • _free.LIBCMT ref: 0043211D
                      • _free.LIBCMT ref: 00432130
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 471d261c1978e8fd492efb66726f25644d258391566ce7e49abf025be84b45d1
                      • Instruction ID: d08fe22c6a524c27e4c6c7bcf1019f14b9a5eff3fc739cf1d41fcb720108e0a5
                      • Opcode Fuzzy Hash: 471d261c1978e8fd492efb66726f25644d258391566ce7e49abf025be84b45d1
                      • Instruction Fuzzy Hash: 29E092F290071433CD1099219941A87F38C4B15B11F08402AFA15A3301E969FA40C1E9
                      APIs
                        • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
                      • _free.LIBCMT ref: 004295A0
                        • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                        • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                        • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
                        • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
                        • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
                        • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
                      • String ID: >>>AUTOIT SCRIPT<<<
                      • API String ID: 3938964917-2806939583
                      • Opcode ID: 04a933f2bae5c84e1ec678a83764c5dff2752dbbd219a3b8ffd94249686463e6
                      • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
                      • Opcode Fuzzy Hash: 04a933f2bae5c84e1ec678a83764c5dff2752dbbd219a3b8ffd94249686463e6
                      • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
                      Strings
                      • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _strcat
                      • String ID: >>>AUTOIT NO CMDEXECUTE<<<
                      • API String ID: 1765576173-2684727018
                      • Opcode ID: afbcd64a5de9b9cf0401a7756764eed502eca04e8b93ddfb1cf174919bef9872
                      • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
                      • Opcode Fuzzy Hash: afbcd64a5de9b9cf0401a7756764eed502eca04e8b93ddfb1cf174919bef9872
                      • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ClearVariant
                      • String ID:
                      • API String ID: 1473721057-0
                      • Opcode ID: f800691a6c58702cf5a996edc2c5780f63a8d9386b34bd2a46259168d6db88b9
                      • Instruction ID: 76271617df0236ab3ccd2777984eb13d60b28668e4953fb9a85eec064aa2abc3
                      • Opcode Fuzzy Hash: f800691a6c58702cf5a996edc2c5780f63a8d9386b34bd2a46259168d6db88b9
                      • Instruction Fuzzy Hash: F891A370A00204DFDB14DF65D884AAAB3B5EF09304F24C56BE915AB391D739EC41CBAE
                      APIs
                      • __wsplitpath.LIBCMT ref: 004678F7
                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                      • GetLastError.KERNEL32(00000000,00000000), ref: 004679C7
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ErrorLast__wsplitpath_malloc
                      • String ID:
                      • API String ID: 4163294574-0
                      • Opcode ID: b7e2b2e067b321cb14cd8dd870a284e502ce9d37bff932640fd458450c7e1011
                      • Instruction ID: 5ded281afda408fdcd401bf2365ceabb828b89a129c607e264fb1023d06c7d2e
                      • Opcode Fuzzy Hash: b7e2b2e067b321cb14cd8dd870a284e502ce9d37bff932640fd458450c7e1011
                      • Instruction Fuzzy Hash: FB5126712083018BD710EF75C881A5BB3E5AF84318F044A6EF9559B381EB39ED09CB97
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _memmove
                      • String ID:
                      • API String ID: 4104443479-0
                      • Opcode ID: 3d6c7d7a6ae677920793bf96237225282887b2b30ba90914ff16095f93448b68
                      • Instruction ID: 2565b1472f88146c75409e19c065a4aacb94a5f6c219594ae44f545f2623c2f3
                      • Opcode Fuzzy Hash: 3d6c7d7a6ae677920793bf96237225282887b2b30ba90914ff16095f93448b68
                      • Instruction Fuzzy Hash: 85412871D00104AFDB10AF15C881BAE7B74AF4670CF14C05AFA055B342E63DA946CBAA
                      APIs
                        • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
                        • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
                        • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
                      • _strcat.LIBCMT ref: 0040F786
                        • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
                        • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
                      • String ID:
                      • API String ID: 3199840319-0
                      • Opcode ID: bd3755d61cabc1630a419da0a5008bdf21fb0fae9682b7453e2f960da4ed9882
                      • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
                      • Opcode Fuzzy Hash: bd3755d61cabc1630a419da0a5008bdf21fb0fae9682b7453e2f960da4ed9882
                      • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
                      APIs
                      • SystemParametersInfoW.USER32(00002001,00000000,?,00000002), ref: 0040D779
                      • FreeLibrary.KERNEL32(?), ref: 0040D78E
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: FreeInfoLibraryParametersSystem
                      • String ID:
                      • API String ID: 3403648963-0
                      • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                      • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
                      • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                      • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
                      APIs
                      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 0040F13A
                      • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 00426326
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CreateFile
                      • String ID:
                      • API String ID: 823142352-0
                      • Opcode ID: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                      • Instruction ID: 8a88c5525f76e0b0fff62cf48ad84dc7055e673dbb4ccc29545257d8619b8f55
                      • Opcode Fuzzy Hash: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                      • Instruction Fuzzy Hash: 16011D70784310BAF2305A68DD0BF5266546B45B24F20473ABBE5BE2D1D2F86885870C
                      APIs
                        • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                      • __lock_file.LIBCMT ref: 00414A8D
                        • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
                      • __fclose_nolock.LIBCMT ref: 00414A98
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                      • String ID:
                      • API String ID: 2800547568-0
                      • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                      • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
                      • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                      • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
                      APIs
                      • __lock_file.LIBCMT ref: 00415012
                      • __ftell_nolock.LIBCMT ref: 0041501F
                        • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: __ftell_nolock__getptd_noexit__lock_file
                      • String ID:
                      • API String ID: 2999321469-0
                      • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                      • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
                      • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                      • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
                      APIs
                      • CreateProcessW.KERNELBASE(?,00000000), ref: 03F19B0D
                      • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03F19B31
                      • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03F19B53
                      Memory Dump Source
                      • Source File: 00000000.00000002.2054269016.0000000003F18000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F18000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3f18000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Process$ContextCreateMemoryReadThreadWow64
                      • String ID:
                      • API String ID: 2438371351-0
                      • Opcode ID: 6ff7500a3617197a005732162d507dd4d37460c8dcbf147a4ae2be43d63b6423
                      • Instruction ID: f0023bf09d31f3d038bd147c5dfded5ac5bcb2c777a9a7a01b4eaf9242d8e1ce
                      • Opcode Fuzzy Hash: 6ff7500a3617197a005732162d507dd4d37460c8dcbf147a4ae2be43d63b6423
                      • Instruction Fuzzy Hash: 2B12DF24E24658C6EB24DF64D8507DEB232EF68300F1094E9910DEB7A4E77A4F91CF5A
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _memmove
                      • String ID:
                      • API String ID: 4104443479-0
                      • Opcode ID: 6d743864f950f4e8dd6af4daa6c332586bf39a41c922c31670318adef7ff7de3
                      • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
                      • Opcode Fuzzy Hash: 6d743864f950f4e8dd6af4daa6c332586bf39a41c922c31670318adef7ff7de3
                      • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _memmove
                      • String ID:
                      • API String ID: 4104443479-0
                      • Opcode ID: 68aa9c4c5b5d14d70cb59537a1bb621dd1898131db9d16ab95866e5cac0f1ede
                      • Instruction ID: 412edbf2df7bf8c64f36b821a583ca4e96a0f18e0b9aed18a790d0e499aeb9a1
                      • Opcode Fuzzy Hash: 68aa9c4c5b5d14d70cb59537a1bb621dd1898131db9d16ab95866e5cac0f1ede
                      • Instruction Fuzzy Hash: 60319CB9600A21EFC714DF19C580A62F7E0FF08310B14C57ADA89CB795E774E892CB99
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ProtectVirtual
                      • String ID:
                      • API String ID: 544645111-0
                      • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                      • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
                      • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                      • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b88f9543b806201cae42d4d121fbe4b2eaeb6b479e9688354450343e49ff2077
                      • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
                      • Opcode Fuzzy Hash: b88f9543b806201cae42d4d121fbe4b2eaeb6b479e9688354450343e49ff2077
                      • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 53ac66c0a220e583b8bd8a833cb4d0ab2488ecf71834bb63135a5f6edfec8b4a
                      • Instruction ID: fe3c5e01fee558804f1d0cd68762aa03bf47037873853bda5dcd607d85013340
                      • Opcode Fuzzy Hash: 53ac66c0a220e583b8bd8a833cb4d0ab2488ecf71834bb63135a5f6edfec8b4a
                      • Instruction Fuzzy Hash: 2D118B352046019FDB10DF69D884E96B3E9AF8A314F14856EFD298B362CB35FC41CB95
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: __lock_file
                      • String ID:
                      • API String ID: 3031932315-0
                      • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                      • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
                      • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                      • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
                      APIs
                      • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,004263D0,?,00487ACC,00000003,0040DE90,?,?,00000001), ref: 00443E54
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: FileWrite
                      • String ID:
                      • API String ID: 3934441357-0
                      • Opcode ID: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                      • Instruction ID: f8d6e32d6ecef3e6c51c5ea05c7ff41eb941b2b6d152ec47b845c679c5cedb0e
                      • Opcode Fuzzy Hash: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                      • Instruction Fuzzy Hash: 6BE01276100318ABDB10DF98D844FDA77BCEF48765F10891AFA048B200C7B4EA908BE4
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: __wfsopen
                      • String ID:
                      • API String ID: 197181222-0
                      • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                      • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
                      • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                      • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
                      APIs
                      • CloseHandle.KERNELBASE(?,?,00426FBF), ref: 0040DA3D
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CloseHandle
                      • String ID:
                      • API String ID: 2962429428-0
                      • Opcode ID: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                      • Instruction ID: 552ddd844a8bbede063c80161f66c4637379340f91e2bb70a518b226642b2913
                      • Opcode Fuzzy Hash: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                      • Instruction Fuzzy Hash: B9E045B4A04B008BC6308F5BE444416FBF8EEE46203108E1FD4A6C2A64C3B4A1498F50
                      APIs
                      • Sleep.KERNELBASE(000001F4), ref: 03F1A2F1
                      Memory Dump Source
                      • Source File: 00000000.00000002.2054269016.0000000003F18000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F18000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3f18000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Sleep
                      • String ID:
                      • API String ID: 3472027048-0
                      • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                      • Instruction ID: 55dd4806a4b8280930aa3aa5fcf49379e08178d5498c0333c3f903ba064175ea
                      • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                      • Instruction Fuzzy Hash: 5AE0BF7494120DEFDB00EFA8D6496EE7BB4EF04301F1005A1FD05D7680DB319E648A62
                      APIs
                      • Sleep.KERNELBASE(000001F4), ref: 03F1A2F1
                      Memory Dump Source
                      • Source File: 00000000.00000002.2054269016.0000000003F18000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F18000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3f18000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Sleep
                      • String ID:
                      • API String ID: 3472027048-0
                      • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                      • Instruction ID: c3ee1a8e8e71eaafe3cd234bc9a9cef89ae8cff53fe062bb0a75240068590df8
                      • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                      • Instruction Fuzzy Hash: 80E0E67494120DDFDB00EFB8D6496AE7FB4EF04301F1001A1FD01D2280D6319D608A62
                      APIs
                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
                      • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
                      • GetKeyState.USER32(00000011), ref: 0047C92D
                      • GetKeyState.USER32(00000009), ref: 0047C936
                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
                      • GetKeyState.USER32(00000010), ref: 0047C953
                      • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
                      • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
                      • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
                      • _wcsncpy.LIBCMT ref: 0047CA29
                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
                      • SendMessageW.USER32 ref: 0047CA7F
                      • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
                      • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
                      • ImageList_SetDragCursorImage.COMCTL32(00997E20,00000000,00000000,00000000), ref: 0047CB9B
                      • ImageList_BeginDrag.COMCTL32(00997E20,00000000,000000F8,000000F0), ref: 0047CBAC
                      • SetCapture.USER32(?), ref: 0047CBB6
                      • ClientToScreen.USER32(?,?), ref: 0047CC17
                      • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
                      • ReleaseCapture.USER32 ref: 0047CC3A
                      • GetCursorPos.USER32(?), ref: 0047CC72
                      • ScreenToClient.USER32(?,?), ref: 0047CC80
                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
                      • SendMessageW.USER32 ref: 0047CD12
                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
                      • SendMessageW.USER32 ref: 0047CD80
                      • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
                      • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
                      • GetCursorPos.USER32(?), ref: 0047CDC8
                      • ScreenToClient.USER32(?,?), ref: 0047CDD6
                      • GetParent.USER32(00000000), ref: 0047CDF7
                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
                      • SendMessageW.USER32 ref: 0047CE93
                      • ClientToScreen.USER32(?,?), ref: 0047CEEE
                      • TrackPopupMenuEx.USER32(?,00000000,?,?,015F1B28,00000000,?,?,?,?), ref: 0047CF1C
                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
                      • SendMessageW.USER32 ref: 0047CF6B
                      • ClientToScreen.USER32(?,?), ref: 0047CFB5
                      • TrackPopupMenuEx.USER32(?,00000080,?,?,015F1B28,00000000,?,?,?,?), ref: 0047CFE6
                      • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                      • String ID: @GUI_DRAGID$F
                      • API String ID: 3100379633-4164748364
                      • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                      • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
                      • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                      • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
                      APIs
                      • GetForegroundWindow.USER32 ref: 00434420
                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
                      • IsIconic.USER32(?), ref: 0043444F
                      • ShowWindow.USER32(?,00000009), ref: 0043445C
                      • SetForegroundWindow.USER32(?), ref: 0043446A
                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
                      • GetCurrentThreadId.KERNEL32 ref: 00434485
                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
                      • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
                      • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
                      • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
                      • SetForegroundWindow.USER32(00000000), ref: 004344B7
                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
                      • keybd_event.USER32(00000012,00000000), ref: 004344CF
                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
                      • keybd_event.USER32(00000012,00000000), ref: 004344E6
                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
                      • keybd_event.USER32(00000012,00000000), ref: 004344FD
                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
                      • keybd_event.USER32(00000012,00000000), ref: 00434514
                      • SetForegroundWindow.USER32(00000000), ref: 0043451E
                      • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
                      • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                      • String ID: Shell_TrayWnd
                      • API String ID: 2889586943-2988720461
                      • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                      • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
                      • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                      • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
                      APIs
                      • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
                      • CloseHandle.KERNEL32(?), ref: 004463A0
                      • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
                      • GetProcessWindowStation.USER32 ref: 004463D1
                      • SetProcessWindowStation.USER32(00000000), ref: 004463DB
                      • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
                      • _wcslen.LIBCMT ref: 00446498
                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                      • _wcsncpy.LIBCMT ref: 004464C0
                      • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
                      • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
                      • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
                      • UnloadUserProfile.USERENV(?,?), ref: 00446555
                      • CloseWindowStation.USER32(00000000), ref: 0044656C
                      • CloseDesktop.USER32(?), ref: 0044657A
                      • SetProcessWindowStation.USER32(?), ref: 00446588
                      • CloseHandle.KERNEL32(?), ref: 00446592
                      • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
                      • String ID: $@OH$default$winsta0
                      • API String ID: 3324942560-3791954436
                      • Opcode ID: b5525f1ade2b057c7f9e31d74da72dff15b4031de69b799d2ab87430ccd2f155
                      • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
                      • Opcode Fuzzy Hash: b5525f1ade2b057c7f9e31d74da72dff15b4031de69b799d2ab87430ccd2f155
                      • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
                      APIs
                        • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                        • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 0043392E
                        • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 00433950
                        • Part of subcall function 00433908: __wcsicoll.LIBCMT ref: 00433974
                        • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                      • _wcscat.LIBCMT ref: 0044BD94
                      • _wcscat.LIBCMT ref: 0044BDBD
                      • __wsplitpath.LIBCMT ref: 0044BDEA
                      • FindFirstFileW.KERNEL32(?,?), ref: 0044BE02
                      • _wcscpy.LIBCMT ref: 0044BE71
                      • _wcscat.LIBCMT ref: 0044BE83
                      • _wcscat.LIBCMT ref: 0044BE95
                      • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC1
                      • DeleteFileW.KERNEL32(?), ref: 0044BED3
                      • MoveFileW.KERNEL32(?,?), ref: 0044BEF3
                      • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0A
                      • DeleteFileW.KERNEL32(?), ref: 0044BF15
                      • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2C
                      • FindClose.KERNEL32(00000000), ref: 0044BF33
                      • MoveFileW.KERNEL32(?,?), ref: 0044BF4F
                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF64
                      • FindClose.KERNEL32(00000000), ref: 0044BF7C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
                      • String ID: \*.*
                      • API String ID: 2188072990-1173974218
                      • Opcode ID: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                      • Instruction ID: 72a2fd59153234373391f972af8bc7e503bf673df65afccb4f4ecee040a4f935
                      • Opcode Fuzzy Hash: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
                      • Instruction Fuzzy Hash: E25167B2408384AAD734DB50DC45EDF73E9AFC8304F544E1EF68982141EB75D249CBA6
                      APIs
                      • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
                      • FindClose.KERNEL32(00000000), ref: 00478924
                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
                      • __swprintf.LIBCMT ref: 004789D3
                      • __swprintf.LIBCMT ref: 00478A1D
                      • __swprintf.LIBCMT ref: 00478A4B
                      • __swprintf.LIBCMT ref: 00478A79
                        • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
                        • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
                      • __swprintf.LIBCMT ref: 00478AA7
                      • __swprintf.LIBCMT ref: 00478AD5
                      • __swprintf.LIBCMT ref: 00478B03
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
                      • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                      • API String ID: 999945258-2428617273
                      • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                      • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
                      • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                      • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
                      APIs
                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                      • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                      • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                      • __wsplitpath.LIBCMT ref: 00403492
                        • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                      • _wcscpy.LIBCMT ref: 004034A7
                      • _wcscat.LIBCMT ref: 004034BC
                      • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                        • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
                        • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
                      • _wcscpy.LIBCMT ref: 004035A0
                      • _wcslen.LIBCMT ref: 00403623
                      • _wcslen.LIBCMT ref: 0040367D
                      Strings
                      • _, xrefs: 0040371C
                      • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
                      • Unterminated string, xrefs: 00428348
                      • Error opening the file, xrefs: 00428231
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
                      • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                      • API String ID: 3393021363-188983378
                      • Opcode ID: 7ca9ad7ef7208bb045d11657cd721343b767352ed1bccac0ebefd6c576abac4e
                      • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
                      • Opcode Fuzzy Hash: 7ca9ad7ef7208bb045d11657cd721343b767352ed1bccac0ebefd6c576abac4e
                      • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
                      APIs
                      • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
                      • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
                      • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
                      • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
                      • FindClose.KERNEL32(00000000), ref: 00431B20
                      • FindClose.KERNEL32(00000000), ref: 00431B34
                      • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
                      • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
                      • FindClose.KERNEL32(00000000), ref: 00431BCD
                      • FindClose.KERNEL32(00000000), ref: 00431BDB
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                      • String ID: *.*
                      • API String ID: 1409584000-438819550
                      • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                      • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
                      • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                      • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
                      APIs
                      • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
                      • __swprintf.LIBCMT ref: 00431C2E
                      • _wcslen.LIBCMT ref: 00431C3A
                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
                      • String ID: :$\$\??\%s
                      • API String ID: 2192556992-3457252023
                      • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                      • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
                      • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                      • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
                      APIs
                      • GetLocalTime.KERNEL32(?), ref: 004722A2
                      • __swprintf.LIBCMT ref: 004722B9
                      • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
                      • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
                      • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
                      • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
                      • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
                      • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
                      • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
                      • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
                      • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: FolderPath$LocalTime__swprintf
                      • String ID: %.3d
                      • API String ID: 3337348382-986655627
                      • Opcode ID: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                      • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
                      • Opcode Fuzzy Hash: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                      • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
                      APIs
                      • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
                      • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
                      • FindClose.KERNEL32(00000000), ref: 0044291C
                      • FindClose.KERNEL32(00000000), ref: 00442930
                      • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
                      • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
                      • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
                      • FindClose.KERNEL32(00000000), ref: 004429D4
                        • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
                      • FindClose.KERNEL32(00000000), ref: 004429E2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                      • String ID: *.*
                      • API String ID: 2640511053-438819550
                      • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                      • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
                      • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                      • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
                      APIs
                      • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
                      • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
                      • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
                      • GetLastError.KERNEL32 ref: 00433414
                      • ExitWindowsEx.USER32(?,00000000), ref: 00433437
                      • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
                      • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                      • String ID: SeShutdownPrivilege
                      • API String ID: 2938487562-3733053543
                      • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                      • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
                      • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                      • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
                      APIs
                        • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
                        • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
                        • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
                        • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
                      • GetLengthSid.ADVAPI32(?), ref: 004461D0
                      • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
                      • GetLengthSid.ADVAPI32(?), ref: 00446241
                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
                      • CopySid.ADVAPI32(00000000), ref: 00446271
                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                      • String ID:
                      • API String ID: 1255039815-0
                      • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                      • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
                      • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                      • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
                      APIs
                      • __swprintf.LIBCMT ref: 00433073
                      • __swprintf.LIBCMT ref: 00433085
                      • __wcsicoll.LIBCMT ref: 00433092
                      • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
                      • LoadResource.KERNEL32(?,00000000), ref: 004330BD
                      • LockResource.KERNEL32(00000000), ref: 004330CA
                      • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
                      • LoadResource.KERNEL32(?,00000000), ref: 00433105
                      • SizeofResource.KERNEL32(?,00000000), ref: 00433114
                      • LockResource.KERNEL32(?), ref: 00433120
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
                      • String ID:
                      • API String ID: 1158019794-0
                      • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                      • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
                      • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                      • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                      • String ID:
                      • API String ID: 1737998785-0
                      • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                      • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
                      • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                      • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
                      APIs
                      • SetErrorMode.KERNEL32(00000001), ref: 0045D627
                      • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
                      • GetLastError.KERNEL32 ref: 0045D6BF
                      • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Error$Mode$DiskFreeLastSpace
                      • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                      • API String ID: 4194297153-14809454
                      • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                      • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
                      • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                      • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _memmove$_strncmp
                      • String ID: @oH$\$^$h
                      • API String ID: 2175499884-3701065813
                      • Opcode ID: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                      • Instruction ID: 796dcd1322dc9123c5f4e5533c800aedaabe8dca19c5b95ba0af32eff2573e22
                      • Opcode Fuzzy Hash: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                      • Instruction Fuzzy Hash: 4242E170E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD856AB351D7399946CF55
                      APIs
                      • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 0046530D
                      • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
                      • bind.WSOCK32(00000000,?,00000010), ref: 00465356
                      • WSAGetLastError.WSOCK32(00000000), ref: 00465363
                      • closesocket.WSOCK32(00000000,00000000), ref: 00465377
                      • listen.WSOCK32(00000000,00000005), ref: 00465381
                      • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
                      • closesocket.WSOCK32(00000000,00000000), ref: 004653BD
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ErrorLast$closesocket$bindlistensocket
                      • String ID:
                      • API String ID: 540024437-0
                      • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                      • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
                      • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                      • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID:
                      • String ID: ERCP$VUUU$VUUU$VUUU$XjH
                      • API String ID: 0-2872873767
                      • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                      • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
                      • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                      • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
                      APIs
                      • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
                      • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
                      • __wsplitpath.LIBCMT ref: 00475644
                        • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                      • _wcscat.LIBCMT ref: 00475657
                      • __wcsicoll.LIBCMT ref: 0047567B
                      • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
                      • CloseHandle.KERNEL32(00000000), ref: 004756BA
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                      • String ID:
                      • API String ID: 2547909840-0
                      • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                      • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
                      • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                      • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
                      APIs
                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                      • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
                      • Sleep.KERNEL32(0000000A), ref: 0045250B
                      • FindNextFileW.KERNEL32(?,?), ref: 004525E9
                      • FindClose.KERNEL32(?), ref: 004525FF
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
                      • String ID: *.*$\VH
                      • API String ID: 2786137511-2657498754
                      • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                      • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
                      • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                      • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
                      APIs
                      • IsDebuggerPresent.KERNEL32 ref: 00421FC1
                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
                      • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
                      • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
                      • TerminateProcess.KERNEL32(00000000), ref: 00422004
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                      • String ID: pqI
                      • API String ID: 2579439406-2459173057
                      • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                      • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
                      • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                      • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
                      APIs
                      • __wcsicoll.LIBCMT ref: 00433349
                      • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
                      • __wcsicoll.LIBCMT ref: 00433375
                      • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: __wcsicollmouse_event
                      • String ID: DOWN
                      • API String ID: 1033544147-711622031
                      • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                      • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
                      • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                      • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
                      APIs
                      • GetKeyboardState.USER32(?), ref: 0044C3D2
                      • SetKeyboardState.USER32(00000080), ref: 0044C3F6
                      • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
                      • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
                      • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: KeyboardMessagePostState$InputSend
                      • String ID:
                      • API String ID: 3031425849-0
                      • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                      • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
                      • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                      • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
                      APIs
                        • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                      • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 0047666F
                      • WSAGetLastError.WSOCK32(00000000), ref: 00476692
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ErrorLastinet_addrsocket
                      • String ID:
                      • API String ID: 4170576061-0
                      • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                      • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
                      • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                      • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
                      APIs
                        • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                      • IsWindowVisible.USER32 ref: 0047A368
                      • IsWindowEnabled.USER32 ref: 0047A378
                      • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
                      • IsIconic.USER32 ref: 0047A393
                      • IsZoomed.USER32 ref: 0047A3A1
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Window$EnabledForegroundIconicVisibleZoomed
                      • String ID:
                      • API String ID: 292994002-0
                      • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                      • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
                      • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                      • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
                      APIs
                        • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                      • CoInitialize.OLE32(00000000), ref: 00478442
                      • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
                      • CoUninitialize.OLE32 ref: 0047863C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CreateInitializeInstanceUninitialize_wcslen
                      • String ID: .lnk
                      • API String ID: 886957087-24824748
                      • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                      • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
                      • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                      • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
                      APIs
                      • OpenClipboard.USER32(?), ref: 0046DCE7
                      • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                      • GetClipboardData.USER32(0000000D), ref: 0046DD01
                      • CloseClipboard.USER32 ref: 0046DD0D
                      • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                      • CloseClipboard.USER32 ref: 0046DD41
                      • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                      • GetClipboardData.USER32(00000001), ref: 0046DD8D
                      • CloseClipboard.USER32 ref: 0046DD99
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                      • String ID:
                      • API String ID: 15083398-0
                      • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                      • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
                      • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                      • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _memmove
                      • String ID: U$\
                      • API String ID: 4104443479-100911408
                      • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                      • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
                      • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                      • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
                      APIs
                      • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
                      • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
                      • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Find$File$CloseFirstNext
                      • String ID:
                      • API String ID: 3541575487-0
                      • Opcode ID: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                      • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
                      • Opcode Fuzzy Hash: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                      • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
                      APIs
                      • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
                      • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
                      • FindClose.KERNEL32(00000000), ref: 004339EB
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: FileFind$AttributesCloseFirst
                      • String ID:
                      • API String ID: 48322524-0
                      • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                      • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
                      • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                      • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
                      APIs
                      • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
                      • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
                        • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Internet$AvailableDataErrorFileLastQueryRead
                      • String ID:
                      • API String ID: 901099227-0
                      • Opcode ID: a84f1234d60d0bfd4ae1c18445e4b4f4e353c9d3ff10812a8b0aa1e25e6dfae4
                      • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
                      • Opcode Fuzzy Hash: a84f1234d60d0bfd4ae1c18445e4b4f4e353c9d3ff10812a8b0aa1e25e6dfae4
                      • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
                      APIs
                      • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Proc
                      • String ID:
                      • API String ID: 2346855178-0
                      • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                      • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
                      • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                      • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
                      APIs
                      • BlockInput.USER32(00000001), ref: 0045A38B
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: BlockInput
                      • String ID:
                      • API String ID: 3456056419-0
                      • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                      • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
                      • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                      • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
                      APIs
                      • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: LogonUser
                      • String ID:
                      • API String ID: 1244722697-0
                      • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                      • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
                      • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                      • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
                      APIs
                      • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: NameUser
                      • String ID:
                      • API String ID: 2645101109-0
                      • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                      • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
                      • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                      • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                      • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
                      • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                      • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID:
                      • String ID: N@
                      • API String ID: 0-1509896676
                      • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                      • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
                      • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                      • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                      • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
                      • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                      • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                      • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
                      • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                      • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                      • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
                      • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                      • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                      • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
                      • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                      • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
                      APIs
                      • DeleteObject.GDI32(?), ref: 0045953B
                      • DeleteObject.GDI32(?), ref: 00459551
                      • DestroyWindow.USER32(?), ref: 00459563
                      • GetDesktopWindow.USER32 ref: 00459581
                      • GetWindowRect.USER32(00000000), ref: 00459588
                      • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
                      • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
                      • GetClientRect.USER32(00000000,?), ref: 004596F8
                      • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
                      • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
                      • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
                      • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
                      • GlobalLock.KERNEL32(00000000), ref: 0045978F
                      • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
                      • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
                      • CloseHandle.KERNEL32(00000000), ref: 004597AC
                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
                      • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
                      • GlobalFree.KERNEL32(00000000), ref: 004597E2
                      • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
                      • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
                      • ShowWindow.USER32(?,00000004), ref: 00459865
                      • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
                      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
                      • GetStockObject.GDI32(00000011), ref: 004598CD
                      • SelectObject.GDI32(00000000,00000000), ref: 004598D5
                      • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
                      • DeleteDC.GDI32(00000000), ref: 004598F8
                      • _wcslen.LIBCMT ref: 00459916
                      • _wcscpy.LIBCMT ref: 0045993A
                      • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
                      • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
                      • GetDC.USER32(00000000), ref: 004599FC
                      • SelectObject.GDI32(00000000,?), ref: 00459A0C
                      • SelectObject.GDI32(00000000,00000007), ref: 00459A37
                      • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
                      • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
                      • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                      • String ID: $AutoIt v3$DISPLAY$static
                      • API String ID: 4040870279-2373415609
                      • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                      • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
                      • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                      • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
                      APIs
                      • GetSysColor.USER32(00000012), ref: 0044181E
                      • SetTextColor.GDI32(?,?), ref: 00441826
                      • GetSysColorBrush.USER32(0000000F), ref: 0044183D
                      • GetSysColor.USER32(0000000F), ref: 00441849
                      • SetBkColor.GDI32(?,?), ref: 00441864
                      • SelectObject.GDI32(?,?), ref: 00441874
                      • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
                      • GetSysColor.USER32(00000010), ref: 004418B2
                      • CreateSolidBrush.GDI32(00000000), ref: 004418B9
                      • FrameRect.USER32(?,?,00000000), ref: 004418CA
                      • DeleteObject.GDI32(?), ref: 004418D5
                      • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
                      • FillRect.USER32(?,?,?), ref: 00441970
                        • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
                        • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
                        • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
                        • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
                        • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
                        • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                        • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
                        • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
                        • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
                        • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                        • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                        • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                        • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                      • String ID:
                      • API String ID: 69173610-0
                      • Opcode ID: 0916c3cf28f962cebf3c58740b3ff5bfe8190551d5af4ba49c76a685ec03c0b9
                      • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
                      • Opcode Fuzzy Hash: 0916c3cf28f962cebf3c58740b3ff5bfe8190551d5af4ba49c76a685ec03c0b9
                      • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
                      APIs
                      • DestroyWindow.USER32(?), ref: 004590F2
                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
                      • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
                      • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
                      • GetClientRect.USER32(00000000,?), ref: 0045924E
                      • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
                      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
                      • GetStockObject.GDI32(00000011), ref: 004592AC
                      • SelectObject.GDI32(00000000,00000000), ref: 004592B4
                      • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
                      • DeleteDC.GDI32(00000000), ref: 004592D6
                      • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
                      • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
                      • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
                      • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
                      • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
                      • GetStockObject.GDI32(00000011), ref: 004593D3
                      • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
                      • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                      • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                      • API String ID: 2910397461-517079104
                      • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                      • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
                      • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                      • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: __wcsnicmp
                      • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                      • API String ID: 1038674560-3360698832
                      • Opcode ID: 60e7c0ccc2de36542d37a783a5f9e034653244a609c45985bfd1ff28648e5169
                      • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
                      • Opcode Fuzzy Hash: 60e7c0ccc2de36542d37a783a5f9e034653244a609c45985bfd1ff28648e5169
                      • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
                      APIs
                      • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
                      • SetCursor.USER32(00000000), ref: 0043075B
                      • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
                      • SetCursor.USER32(00000000), ref: 00430773
                      • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
                      • SetCursor.USER32(00000000), ref: 0043078B
                      • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
                      • SetCursor.USER32(00000000), ref: 004307A3
                      • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
                      • SetCursor.USER32(00000000), ref: 004307BB
                      • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
                      • SetCursor.USER32(00000000), ref: 004307D3
                      • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
                      • SetCursor.USER32(00000000), ref: 004307EB
                      • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
                      • SetCursor.USER32(00000000), ref: 00430803
                      • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
                      • SetCursor.USER32(00000000), ref: 0043081B
                      • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
                      • SetCursor.USER32(00000000), ref: 00430833
                      • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
                      • SetCursor.USER32(00000000), ref: 0043084B
                      • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
                      • SetCursor.USER32(00000000), ref: 00430863
                      • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
                      • SetCursor.USER32(00000000), ref: 0043087B
                      • SetCursor.USER32(00000000), ref: 00430887
                      • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
                      • SetCursor.USER32(00000000), ref: 0043089F
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Cursor$Load
                      • String ID:
                      • API String ID: 1675784387-0
                      • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                      • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
                      • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                      • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
                      APIs
                      • GetSysColor.USER32(0000000E), ref: 00430913
                      • SetTextColor.GDI32(?,00000000), ref: 0043091B
                      • GetSysColor.USER32(00000012), ref: 00430933
                      • SetTextColor.GDI32(?,?), ref: 0043093B
                      • GetSysColorBrush.USER32(0000000F), ref: 0043094E
                      • GetSysColor.USER32(0000000F), ref: 00430959
                      • CreateSolidBrush.GDI32(?), ref: 00430962
                      • GetSysColor.USER32(00000011), ref: 00430979
                      • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                      • SelectObject.GDI32(?,00000000), ref: 0043099C
                      • SetBkColor.GDI32(?,?), ref: 004309A6
                      • SelectObject.GDI32(?,?), ref: 004309B4
                      • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                      • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                      • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                      • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
                      • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
                      • DrawFocusRect.USER32(?,?), ref: 00430A91
                      • GetSysColor.USER32(00000011), ref: 00430A9F
                      • SetTextColor.GDI32(?,00000000), ref: 00430AA7
                      • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
                      • SelectObject.GDI32(?,?), ref: 00430AD0
                      • DeleteObject.GDI32(00000105), ref: 00430ADC
                      • SelectObject.GDI32(?,?), ref: 00430AE3
                      • DeleteObject.GDI32(?), ref: 00430AE9
                      • SetTextColor.GDI32(?,?), ref: 00430AF0
                      • SetBkColor.GDI32(?,?), ref: 00430AFB
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                      • String ID:
                      • API String ID: 1582027408-0
                      • Opcode ID: 86b869e5b8bb6c2dba163effb8278b4f001f0824fd106c928e18bea154194c17
                      • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
                      • Opcode Fuzzy Hash: 86b869e5b8bb6c2dba163effb8278b4f001f0824fd106c928e18bea154194c17
                      • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
                      APIs
                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
                      • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
                      • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CloseConnectCreateRegistry
                      • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                      • API String ID: 3217815495-966354055
                      • Opcode ID: 453de95d6c883e283cc67a734ea30baf1d578f6691a1b8183987f1ec63ce4679
                      • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
                      • Opcode Fuzzy Hash: 453de95d6c883e283cc67a734ea30baf1d578f6691a1b8183987f1ec63ce4679
                      • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
                      APIs
                      • GetCursorPos.USER32(?), ref: 004566AE
                      • GetDesktopWindow.USER32 ref: 004566C3
                      • GetWindowRect.USER32(00000000), ref: 004566CA
                      • GetWindowLongW.USER32(?,000000F0), ref: 00456722
                      • GetWindowLongW.USER32(?,000000F0), ref: 00456735
                      • DestroyWindow.USER32(?), ref: 00456746
                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
                      • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
                      • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
                      • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
                      • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
                      • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
                      • IsWindowVisible.USER32(?), ref: 0045682C
                      • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
                      • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
                      • GetWindowRect.USER32(?,?), ref: 00456873
                      • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
                      • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
                      • CopyRect.USER32(?,?), ref: 004568BE
                      • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                      • String ID: ($,$tooltips_class32
                      • API String ID: 225202481-3320066284
                      • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                      • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
                      • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                      • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
                      APIs
                      • OpenClipboard.USER32(?), ref: 0046DCE7
                      • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                      • GetClipboardData.USER32(0000000D), ref: 0046DD01
                      • CloseClipboard.USER32 ref: 0046DD0D
                      • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                      • CloseClipboard.USER32 ref: 0046DD41
                      • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                      • GetClipboardData.USER32(00000001), ref: 0046DD8D
                      • CloseClipboard.USER32 ref: 0046DD99
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                      • String ID:
                      • API String ID: 15083398-0
                      • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                      • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
                      • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                      • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
                      APIs
                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                      • GetWindowRect.USER32(?,?), ref: 00471CF7
                      • GetClientRect.USER32(?,?), ref: 00471D05
                      • GetSystemMetrics.USER32(00000007), ref: 00471D0D
                      • GetSystemMetrics.USER32(00000008), ref: 00471D20
                      • GetSystemMetrics.USER32(00000004), ref: 00471D42
                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
                      • GetSystemMetrics.USER32(00000007), ref: 00471D79
                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
                      • GetSystemMetrics.USER32(00000008), ref: 00471DAB
                      • GetSystemMetrics.USER32(00000004), ref: 00471DCF
                      • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
                      • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
                      • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
                      • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
                      • GetClientRect.USER32(?,?), ref: 00471E8A
                      • GetStockObject.GDI32(00000011), ref: 00471EA6
                      • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
                      • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                      • String ID: @$AutoIt v3 GUI
                      • API String ID: 867697134-3359773793
                      • Opcode ID: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                      • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
                      • Opcode Fuzzy Hash: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                      • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
                      • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                      • API String ID: 1503153545-1459072770
                      • Opcode ID: 317b836bd45d303022c8cfe41fd482541af156a870e12d87d8544c7d52709fdd
                      • Instruction ID: bf9a9138137c8e48d15734b0b0bf1383f69a7efb75f9ce998fc77f2ad016157b
                      • Opcode Fuzzy Hash: 317b836bd45d303022c8cfe41fd482541af156a870e12d87d8544c7d52709fdd
                      • Instruction Fuzzy Hash: D551F672A402043BD610BB269C43EFFB36C9F49715F10055FFE09A6242EA7DEA5183AD
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: __wcsicoll$__wcsnicmp
                      • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
                      • API String ID: 790654849-32604322
                      • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                      • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
                      • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                      • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 37a5c787a7b2188dc8d5479775b41731b0c96863aaa01ab20318fba061c3c2a8
                      • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
                      • Opcode Fuzzy Hash: 37a5c787a7b2188dc8d5479775b41731b0c96863aaa01ab20318fba061c3c2a8
                      • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
                      APIs
                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Window
                      • String ID: 0
                      • API String ID: 2353593579-4108050209
                      • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                      • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
                      • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                      • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
                      APIs
                      • GetSysColor.USER32(0000000F), ref: 0044A05E
                      • GetClientRect.USER32(?,?), ref: 0044A0D1
                      • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
                      • GetWindowDC.USER32(?), ref: 0044A0F6
                      • GetPixel.GDI32(00000000,?,?), ref: 0044A108
                      • ReleaseDC.USER32(?,?), ref: 0044A11B
                      • GetSysColor.USER32(0000000F), ref: 0044A131
                      • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
                      • GetSysColor.USER32(0000000F), ref: 0044A14F
                      • GetSysColor.USER32(00000005), ref: 0044A15B
                      • GetWindowDC.USER32(?), ref: 0044A1BE
                      • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
                      • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
                      • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
                      • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
                      • ReleaseDC.USER32(?,00000000), ref: 0044A229
                      • SetBkColor.GDI32(?,00000000), ref: 0044A24C
                      • GetSysColor.USER32(00000008), ref: 0044A265
                      • SetTextColor.GDI32(?,00000000), ref: 0044A270
                      • SetBkMode.GDI32(?,00000001), ref: 0044A282
                      • GetStockObject.GDI32(00000005), ref: 0044A28A
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                      • String ID:
                      • API String ID: 1744303182-0
                      • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                      • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
                      • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                      • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
                      APIs
                      • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
                      • __mtterm.LIBCMT ref: 00417C34
                        • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
                        • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
                        • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
                        • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
                      • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
                      • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
                      • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
                      • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
                      • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
                      • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
                      • __init_pointers.LIBCMT ref: 00417CE6
                      • __calloc_crt.LIBCMT ref: 00417D54
                      • GetCurrentThreadId.KERNEL32 ref: 00417D80
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                      • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                      • API String ID: 4163708885-3819984048
                      • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                      • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
                      • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                      • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID:
                      • String ID: >>>AUTOIT SCRIPT<<<$\
                      • API String ID: 0-1896584978
                      • Opcode ID: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                      • Instruction ID: daa296ce3da71eb1ea4b2d74bac6de3536c6b190185545f0361092b1072d42a3
                      • Opcode Fuzzy Hash: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                      • Instruction Fuzzy Hash: 4081B9B1900204ABCB20EB61CD85FDB73ED9F54304F40859EF505AB142EA39EA85CB99
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: __wcsicoll$IconLoad
                      • String ID: blank$info$question$stop$warning
                      • API String ID: 2485277191-404129466
                      • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                      • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
                      • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                      • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
                      APIs
                      • LoadIconW.USER32(?,00000063), ref: 0045464C
                      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
                      • SetWindowTextW.USER32(?,?), ref: 00454678
                      • GetDlgItem.USER32(?,000003EA), ref: 00454690
                      • SetWindowTextW.USER32(00000000,?), ref: 00454697
                      • GetDlgItem.USER32(?,000003E9), ref: 004546A8
                      • SetWindowTextW.USER32(00000000,?), ref: 004546AF
                      • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
                      • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
                      • GetWindowRect.USER32(?,?), ref: 004546F5
                      • SetWindowTextW.USER32(?,?), ref: 00454765
                      • GetDesktopWindow.USER32 ref: 0045476F
                      • GetWindowRect.USER32(00000000), ref: 00454776
                      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
                      • GetClientRect.USER32(?,?), ref: 004547D2
                      • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
                      • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                      • String ID:
                      • API String ID: 3869813825-0
                      • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                      • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
                      • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                      • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
                      APIs
                      • _wcslen.LIBCMT ref: 00464B28
                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
                      • _wcslen.LIBCMT ref: 00464C28
                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
                      • _wcslen.LIBCMT ref: 00464CBA
                      • _wcslen.LIBCMT ref: 00464CD0
                      • _wcslen.LIBCMT ref: 00464CEF
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _wcslen$Directory$CurrentSystem
                      • String ID: D
                      • API String ID: 1914653954-2746444292
                      • Opcode ID: 0d94b415f8f4be32da9437a4562fd2ea9250d6af123b13f45aceadf0defadff8
                      • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
                      • Opcode Fuzzy Hash: 0d94b415f8f4be32da9437a4562fd2ea9250d6af123b13f45aceadf0defadff8
                      • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
                      APIs
                      • _wcsncpy.LIBCMT ref: 0045CE39
                      • __wsplitpath.LIBCMT ref: 0045CE78
                      • _wcscat.LIBCMT ref: 0045CE8B
                      • _wcscat.LIBCMT ref: 0045CE9E
                      • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEB2
                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEC5
                        • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                      • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF05
                      • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF1D
                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF2E
                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF3F
                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF53
                      • _wcscpy.LIBCMT ref: 0045CF61
                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CFA4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
                      • String ID: *.*
                      • API String ID: 1153243558-438819550
                      • Opcode ID: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                      • Instruction ID: eacc2f87ca0c49a88fd160cf35c0ab61f7b8ac52d7ffc0430f804bda47b2a69a
                      • Opcode Fuzzy Hash: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                      • Instruction Fuzzy Hash: F071D572900208AEDB24DB54CCC5AEEB7B5AB44305F1489ABE805D7242D67C9ECDCB99
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: __wcsicoll
                      • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                      • API String ID: 3832890014-4202584635
                      • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                      • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
                      • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                      • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
                      APIs
                      • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
                      • GetFocus.USER32 ref: 0046A0DD
                      • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
                      • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessagePost$CtrlFocus
                      • String ID: 0
                      • API String ID: 1534620443-4108050209
                      • Opcode ID: 5cb98421042f455ec4000b61dd51e58b9a21b7b09c176f3470d706b88b7d88ce
                      • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
                      • Opcode Fuzzy Hash: 5cb98421042f455ec4000b61dd51e58b9a21b7b09c176f3470d706b88b7d88ce
                      • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
                      APIs
                      • DestroyWindow.USER32(?), ref: 004558E3
                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Window$CreateDestroy
                      • String ID: ,$tooltips_class32
                      • API String ID: 1109047481-3856767331
                      • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                      • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
                      • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                      • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
                      APIs
                      • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
                      • GetMenuItemCount.USER32(?), ref: 00468C45
                      • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
                      • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
                      • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
                      • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
                      • GetMenuItemCount.USER32 ref: 00468CFD
                      • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
                      • GetCursorPos.USER32(?), ref: 00468D3F
                      • SetForegroundWindow.USER32(?), ref: 00468D49
                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
                      • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
                      • String ID: 0
                      • API String ID: 1441871840-4108050209
                      • Opcode ID: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                      • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
                      • Opcode Fuzzy Hash: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                      • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
                      APIs
                      • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                      • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                      • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                      • __swprintf.LIBCMT ref: 00460915
                      • __swprintf.LIBCMT ref: 0046092D
                      • _wprintf.LIBCMT ref: 004609E1
                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
                      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                      • API String ID: 3631882475-2268648507
                      • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                      • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
                      • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                      • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
                      APIs
                      • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
                      • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
                      • SendMessageW.USER32 ref: 00471740
                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
                      • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
                      • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
                      • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
                      • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
                      • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
                      • SendMessageW.USER32 ref: 0047184F
                      • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
                      • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
                      • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
                      • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
                      • String ID:
                      • API String ID: 4116747274-0
                      • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                      • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
                      • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                      • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
                      APIs
                      • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
                      • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
                      • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: InfoItemMenu$Sleep
                      • String ID: 0
                      • API String ID: 1196289194-4108050209
                      • Opcode ID: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
                      • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
                      • Opcode Fuzzy Hash: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
                      • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
                      APIs
                      • GetDC.USER32(00000000), ref: 0043143E
                      • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
                      • CreateCompatibleDC.GDI32(00000000), ref: 00431459
                      • SelectObject.GDI32(00000000,?), ref: 00431466
                      • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
                      • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                      • String ID: (
                      • API String ID: 3300687185-3887548279
                      • Opcode ID: 7cf8b5f06cf9837a80c5bf18f75efab984d242103ae75fea6cfb4fef03d4f8e7
                      • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
                      • Opcode Fuzzy Hash: 7cf8b5f06cf9837a80c5bf18f75efab984d242103ae75fea6cfb4fef03d4f8e7
                      • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
                      APIs
                        • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                        • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                      • GetDriveTypeW.KERNEL32 ref: 0045DB32
                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
                        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
                      • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                      • API String ID: 1976180769-4113822522
                      • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                      • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
                      • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                      • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _wcslen$_wcsncpy$LocalTime__fassign
                      • String ID:
                      • API String ID: 461458858-0
                      • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                      • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
                      • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                      • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
                      APIs
                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
                      • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
                      • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
                      • GlobalLock.KERNEL32(00000000), ref: 004300F6
                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
                      • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
                      • CloseHandle.KERNEL32(00000000), ref: 00430113
                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
                      • GlobalFree.KERNEL32(00000000), ref: 00430150
                      • GetObjectW.GDI32(?,00000018,?), ref: 00430177
                      • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
                      • DeleteObject.GDI32(?), ref: 004301D0
                      • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                      • String ID:
                      • API String ID: 3969911579-0
                      • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                      • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
                      • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                      • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
                      • String ID: 0
                      • API String ID: 956284711-4108050209
                      • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                      • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
                      • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                      • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
                      • String ID: 0.0.0.0
                      • API String ID: 1965227024-3771769585
                      • Opcode ID: 076f4e753302d8e1360c69636e2804f45f3b9e513b8bc5fd0a6f442411ef1df6
                      • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
                      • Opcode Fuzzy Hash: 076f4e753302d8e1360c69636e2804f45f3b9e513b8bc5fd0a6f442411ef1df6
                      • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
                      APIs
                        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                      • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
                      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
                      • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
                      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
                      • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: SendString$_memmove_wcslen
                      • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                      • API String ID: 369157077-1007645807
                      • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                      • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
                      • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                      • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
                      APIs
                      • GetParent.USER32 ref: 00445BF8
                      • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
                      • __wcsicoll.LIBCMT ref: 00445C33
                      • __wcsicoll.LIBCMT ref: 00445C4F
                      • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: __wcsicoll$ClassMessageNameParentSend
                      • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                      • API String ID: 3125838495-3381328864
                      • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                      • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
                      • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                      • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
                      APIs
                      • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
                      • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
                      • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
                      • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
                      • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
                      • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
                      • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
                      • SendMessageW.USER32(?,00000402,?), ref: 00449399
                      • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessageSend$CharNext
                      • String ID:
                      • API String ID: 1350042424-0
                      • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                      • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
                      • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                      • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
                      APIs
                        • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                        • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                      • GetDriveTypeW.KERNEL32(?), ref: 004787B9
                      • _wcscpy.LIBCMT ref: 004787E5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                      • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
                      • API String ID: 3052893215-2127371420
                      • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                      • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
                      • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                      • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
                      APIs
                      • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                      • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
                      • __swprintf.LIBCMT ref: 0045E7F7
                      • _wprintf.LIBCMT ref: 0045E8B3
                      • _wprintf.LIBCMT ref: 0045E8D7
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                      • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                      • API String ID: 2295938435-2354261254
                      • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                      • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
                      • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                      • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: __swprintf_wcscpy$__i64tow__itow
                      • String ID: %.15g$0x%p$False$True
                      • API String ID: 3038501623-2263619337
                      • Opcode ID: 0ed174719ccce37c49a7b10a239214af4415cbf245d9ef728fb1cecd9ea5956d
                      • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
                      • Opcode Fuzzy Hash: 0ed174719ccce37c49a7b10a239214af4415cbf245d9ef728fb1cecd9ea5956d
                      • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
                      APIs
                      • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                      • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
                      • __swprintf.LIBCMT ref: 0045E5F6
                      • _wprintf.LIBCMT ref: 0045E6A3
                      • _wprintf.LIBCMT ref: 0045E6C7
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                      • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                      • API String ID: 2295938435-8599901
                      • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                      • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
                      • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                      • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
                      APIs
                      • timeGetTime.WINMM ref: 00443B67
                        • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
                      • Sleep.KERNEL32(0000000A), ref: 00443B9F
                      • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00443BC8
                      • SetActiveWindow.USER32(?), ref: 00443BEC
                      • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
                      • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00443C22
                      • Sleep.KERNEL32(000000FA), ref: 00443C2D
                      • IsWindow.USER32(?), ref: 00443C3A
                      • EndDialog.USER32(?,00000000), ref: 00443C4C
                        • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                        • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                        • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                      • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
                      • String ID: BUTTON
                      • API String ID: 1834419854-3405671355
                      • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                      • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
                      • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                      • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
                      APIs
                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
                      • LoadStringW.USER32(00000000), ref: 00454040
                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                      • _wprintf.LIBCMT ref: 00454074
                      • __swprintf.LIBCMT ref: 004540A3
                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
                      • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                      • API String ID: 455036304-4153970271
                      • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                      • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
                      • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                      • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
                      APIs
                      • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
                      • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
                      • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
                      • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
                      • _memmove.LIBCMT ref: 00467EB8
                      • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
                      • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
                      • _memmove.LIBCMT ref: 00467F6C
                      • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
                      • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
                        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                      • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                      • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
                      • String ID:
                      • API String ID: 2170234536-0
                      • Opcode ID: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                      • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
                      • Opcode Fuzzy Hash: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                      • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
                      APIs
                      • GetKeyboardState.USER32(?), ref: 00453CE0
                      • SetKeyboardState.USER32(?), ref: 00453D3B
                      • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
                      • GetKeyState.USER32(000000A0), ref: 00453D75
                      • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
                      • GetKeyState.USER32(000000A1), ref: 00453DB5
                      • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
                      • GetKeyState.USER32(00000011), ref: 00453DEF
                      • GetAsyncKeyState.USER32(00000012), ref: 00453E18
                      • GetKeyState.USER32(00000012), ref: 00453E26
                      • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
                      • GetKeyState.USER32(0000005B), ref: 00453E5D
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: State$Async$Keyboard
                      • String ID:
                      • API String ID: 541375521-0
                      • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                      • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
                      • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                      • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
                      APIs
                      • GetDlgItem.USER32(?,00000001), ref: 004357DB
                      • GetWindowRect.USER32(00000000,?), ref: 004357ED
                      • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
                      • GetDlgItem.USER32(?,00000002), ref: 0043586A
                      • GetWindowRect.USER32(00000000,?), ref: 0043587C
                      • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
                      • GetDlgItem.USER32(?,000003E9), ref: 004358DC
                      • GetWindowRect.USER32(00000000,?), ref: 004358EE
                      • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
                      • GetDlgItem.USER32(?,000003EA), ref: 00435941
                      • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Window$ItemMoveRect$Invalidate
                      • String ID:
                      • API String ID: 3096461208-0
                      • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                      • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
                      • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                      • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
                      APIs
                      • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
                      • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
                      • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
                      • DeleteObject.GDI32(?), ref: 0047151E
                      • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
                      • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
                      • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
                      • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
                      • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
                      • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
                      • DeleteObject.GDI32(?), ref: 004715EA
                      • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
                      • String ID:
                      • API String ID: 3218148540-0
                      • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                      • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
                      • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                      • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                      • String ID:
                      • API String ID: 136442275-0
                      • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                      • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
                      • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                      • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
                      APIs
                      • _wcsncpy.LIBCMT ref: 00467490
                      • _wcsncpy.LIBCMT ref: 004674BC
                        • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                        • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                      • _wcstok.LIBCMT ref: 004674FF
                        • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                      • _wcstok.LIBCMT ref: 004675B2
                      • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                      • _wcslen.LIBCMT ref: 00467793
                      • _wcscpy.LIBCMT ref: 00467641
                        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                      • _wcslen.LIBCMT ref: 004677BD
                      • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                        • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                      • String ID: X
                      • API String ID: 3104067586-3081909835
                      • Opcode ID: eb9283ffadc70d7ae5f0b14c33a6b36f7734343f68681e5f3ce0481c1d9d9f7d
                      • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
                      • Opcode Fuzzy Hash: eb9283ffadc70d7ae5f0b14c33a6b36f7734343f68681e5f3ce0481c1d9d9f7d
                      • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
                      APIs
                      • OleInitialize.OLE32(00000000), ref: 0046CBC7
                      • CLSIDFromProgID.OLE32(?,?), ref: 0046CBDF
                      • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
                      • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
                      • _wcslen.LIBCMT ref: 0046CDB0
                      • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
                      • CoTaskMemFree.OLE32(?), ref: 0046CE42
                      • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
                        • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
                        • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
                        • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
                      Strings
                      • NULL Pointer assignment, xrefs: 0046CEA6
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
                      • String ID: NULL Pointer assignment
                      • API String ID: 440038798-2785691316
                      • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                      • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
                      • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                      • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95
                      APIs
                      • GetClassNameW.USER32(?,?,00000400), ref: 00461056
                      • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
                      • _wcslen.LIBCMT ref: 004610A3
                      • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
                      • GetClassNameW.USER32(?,?,00000400), ref: 00461124
                      • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
                      • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
                      • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
                      • GetWindowRect.USER32(?,?), ref: 00461248
                        • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
                      • String ID: ThumbnailClass
                      • API String ID: 4136854206-1241985126
                      • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                      • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
                      • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                      • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
                      APIs
                      • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
                      • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
                      • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
                      • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
                      • GetClientRect.USER32(?,?), ref: 00471A1A
                      • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
                      • DestroyIcon.USER32(?), ref: 00471AF4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                      • String ID: 2
                      • API String ID: 1331449709-450215437
                      • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                      • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
                      • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                      • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
                      APIs
                      • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                      • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                      • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                      • __swprintf.LIBCMT ref: 00460915
                      • __swprintf.LIBCMT ref: 0046092D
                      • _wprintf.LIBCMT ref: 004609E1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
                      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
                      • API String ID: 3054410614-2561132961
                      • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                      • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
                      • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                      • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
                      APIs
                        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                      • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
                      • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
                      • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
                      • CLSIDFromString.OLE32(?,?), ref: 004587B3
                      • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
                      • RegCloseKey.ADVAPI32(?), ref: 004587C5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
                      • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                      • API String ID: 600699880-22481851
                      • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                      • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
                      • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                      • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: DestroyWindow
                      • String ID: static
                      • API String ID: 3375834691-2160076837
                      • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                      • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
                      • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                      • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
                      APIs
                      • SetErrorMode.KERNEL32(00000001), ref: 0045D959
                      • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
                      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ErrorMode$DriveType
                      • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
                      • API String ID: 2907320926-3566645568
                      • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                      • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
                      • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                      • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
                      APIs
                        • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                      • DestroyAcceleratorTable.USER32(?), ref: 0047094A
                      • ImageList_Destroy.COMCTL32(?), ref: 004709AD
                      • ImageList_Destroy.COMCTL32(?), ref: 004709C5
                      • ImageList_Destroy.COMCTL32(?), ref: 004709D5
                      • DeleteObject.GDI32(?), ref: 00470A04
                      • DestroyIcon.USER32(?), ref: 00470A1C
                      • DeleteObject.GDI32(?), ref: 00470A34
                      • DestroyWindow.USER32(?), ref: 00470A4C
                      • DestroyIcon.USER32(?), ref: 00470A73
                      • DestroyIcon.USER32(?), ref: 00470A81
                      • KillTimer.USER32(00000000,00000000), ref: 00470B00
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
                      • String ID:
                      • API String ID: 1237572874-0
                      • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                      • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
                      • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                      • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
                      APIs
                      • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
                      • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
                      • VariantInit.OLEAUT32(?), ref: 004793E1
                      • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
                      • VariantCopy.OLEAUT32(?,?), ref: 00479461
                      • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
                      • VariantClear.OLEAUT32(?), ref: 00479489
                      • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
                      • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
                      • VariantClear.OLEAUT32(?), ref: 004794CA
                      • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                      • String ID:
                      • API String ID: 2706829360-0
                      • Opcode ID: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                      • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
                      • Opcode Fuzzy Hash: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                      • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
                      APIs
                      • GetKeyboardState.USER32(?), ref: 0044480E
                      • GetAsyncKeyState.USER32(000000A0), ref: 00444899
                      • GetKeyState.USER32(000000A0), ref: 004448AA
                      • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
                      • GetKeyState.USER32(000000A1), ref: 004448D9
                      • GetAsyncKeyState.USER32(00000011), ref: 004448F5
                      • GetKeyState.USER32(00000011), ref: 00444903
                      • GetAsyncKeyState.USER32(00000012), ref: 0044491F
                      • GetKeyState.USER32(00000012), ref: 0044492D
                      • GetAsyncKeyState.USER32(0000005B), ref: 00444949
                      • GetKeyState.USER32(0000005B), ref: 00444958
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: State$Async$Keyboard
                      • String ID:
                      • API String ID: 541375521-0
                      • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                      • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
                      • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                      • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: InitVariant$_malloc_wcscpy_wcslen
                      • String ID:
                      • API String ID: 3413494760-0
                      • Opcode ID: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                      • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
                      • Opcode Fuzzy Hash: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                      • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: AddressProc_free_malloc$_strcat_strlen
                      • String ID: AU3_FreeVar
                      • API String ID: 2634073740-771828931
                      • Opcode ID: 0205934085a73e828eb836af54efcf0b2f745960cf3f8f52847b126bcd632882
                      • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
                      • Opcode Fuzzy Hash: 0205934085a73e828eb836af54efcf0b2f745960cf3f8f52847b126bcd632882
                      • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
                      APIs
                      • CoInitialize.OLE32 ref: 0046C63A
                      • CoUninitialize.OLE32 ref: 0046C645
                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                        • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
                        • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
                      • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
                      • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
                      • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
                      • IIDFromString.OLE32(?,?), ref: 0046C705
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
                      • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                      • API String ID: 2294789929-1287834457
                      • Opcode ID: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                      • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
                      • Opcode Fuzzy Hash: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                      • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
                      APIs
                        • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
                        • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
                        • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
                        • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
                      • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
                      • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
                      • ImageList_EndDrag.COMCTL32 ref: 00471169
                      • ReleaseCapture.USER32 ref: 0047116F
                      • SetWindowTextW.USER32(?,00000000), ref: 00471206
                      • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                      • String ID: @GUI_DRAGFILE$@GUI_DROPID
                      • API String ID: 2483343779-2107944366
                      • Opcode ID: 20a5a3ce7c175183900f948b12cd71fc676271c7bfbce6bb48b8262f94f29e03
                      • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
                      • Opcode Fuzzy Hash: 20a5a3ce7c175183900f948b12cd71fc676271c7bfbce6bb48b8262f94f29e03
                      • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
                      APIs
                      • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
                      • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
                      • _wcslen.LIBCMT ref: 00450720
                      • _wcscat.LIBCMT ref: 00450733
                      • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
                      • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessageSend$Window_wcscat_wcslen
                      • String ID: -----$SysListView32
                      • API String ID: 4008455318-3975388722
                      • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                      • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
                      • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                      • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
                      APIs
                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                      • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
                      • GetDlgCtrlID.USER32(00000000), ref: 00469C84
                      • GetParent.USER32 ref: 00469C98
                      • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
                      • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
                      • GetParent.USER32 ref: 00469CBC
                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessageSend$CtrlParent$_memmove_wcslen
                      • String ID: ComboBox$ListBox
                      • API String ID: 2360848162-1403004172
                      • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                      • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
                      • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                      • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
                      • String ID:
                      • API String ID: 262282135-0
                      • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                      • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
                      • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                      • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
                      APIs
                      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
                      • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
                      • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
                      • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
                      • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
                      • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
                      • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
                      • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
                      • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessageSend$LongWindow
                      • String ID:
                      • API String ID: 312131281-0
                      • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                      • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
                      • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                      • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
                      APIs
                        • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
                      • SendMessageW.USER32(75A923D0,00001001,00000000,?), ref: 00448E16
                      • SendMessageW.USER32(75A923D0,00001026,00000000,?), ref: 00448E25
                        • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessageSend$BrushCreateDeleteObjectSolid
                      • String ID:
                      • API String ID: 3771399671-0
                      • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                      • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
                      • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                      • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
                      APIs
                      • GetCurrentThreadId.KERNEL32 ref: 00434643
                      • GetForegroundWindow.USER32(00000000), ref: 00434655
                      • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
                      • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
                      • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
                      • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
                      • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
                      • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
                      • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
                      • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                      • String ID:
                      • API String ID: 2156557900-0
                      • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                      • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
                      • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                      • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID:
                      • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                      • API String ID: 0-1603158881
                      • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                      • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
                      • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                      • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
                      APIs
                      • CreateMenu.USER32 ref: 00448603
                      • SetMenu.USER32(?,00000000), ref: 00448613
                      • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
                      • IsMenu.USER32(?), ref: 004486AB
                      • CreatePopupMenu.USER32 ref: 004486B5
                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
                      • DrawMenuBar.USER32 ref: 004486F5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Menu$CreateItem$DrawInfoInsertPopup
                      • String ID: 0
                      • API String ID: 161812096-4108050209
                      • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                      • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
                      • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                      • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0b34b3a5b5d670eb49a5e2d7b5cd424f37d7569b2aa50e3450060746f4beba41
                      • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
                      • Opcode Fuzzy Hash: 0b34b3a5b5d670eb49a5e2d7b5cd424f37d7569b2aa50e3450060746f4beba41
                      • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                      • Instruction ID: d12da5a9263b129e99c802cec43d72d92cc496201e336192e500ad81068e5f87
                      • Opcode Fuzzy Hash: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                      • Instruction Fuzzy Hash: D7519C70600305ABEB20DF69CC81F9B77A8AB08715F50462AFE05DB3C1E7B5E8588B58
                      APIs
                        • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                        • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                      • lstrcmpiW.KERNEL32(?,?), ref: 00453900
                      • MoveFileW.KERNEL32(?,?), ref: 00453932
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: File$AttributesFullMoveNamePathlstrcmpi
                      • String ID:
                      • API String ID: 978794511-0
                      • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                      • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
                      • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                      • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                      • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
                      • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                      • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ClearVariant
                      • String ID:
                      • API String ID: 1473721057-0
                      • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                      • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
                      • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                      • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _memmove$_memcmp
                      • String ID: '$\$h
                      • API String ID: 2205784470-1303700344
                      • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                      • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
                      • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                      • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
                      APIs
                      • VariantInit.OLEAUT32(00000000), ref: 0045EA56
                      • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
                      • VariantClear.OLEAUT32 ref: 0045EA6D
                      • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
                      • __swprintf.LIBCMT ref: 0045EC33
                      • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
                      Strings
                      • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Variant$InitTime$ClearCopySystem__swprintf
                      • String ID: %4d%02d%02d%02d%02d%02d
                      • API String ID: 2441338619-1568723262
                      • Opcode ID: c256a0e8f79103727635468c6c39d920c699b266699b53e39892a4f9942b48fe
                      • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
                      • Opcode Fuzzy Hash: c256a0e8f79103727635468c6c39d920c699b266699b53e39892a4f9942b48fe
                      • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
                      APIs
                      • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
                      • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
                      • Sleep.KERNEL32(0000000A), ref: 0042C67F
                      • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
                      • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Interlocked$DecrementIncrement$Sleep
                      • String ID: @COM_EVENTOBJ
                      • API String ID: 327565842-2228938565
                      • Opcode ID: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
                      • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
                      • Opcode Fuzzy Hash: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
                      • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
                      APIs
                      • VariantClear.OLEAUT32(?), ref: 0047031B
                      • VariantClear.OLEAUT32(?), ref: 0047044F
                      • VariantInit.OLEAUT32(?), ref: 004704A3
                      • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
                      • VariantClear.OLEAUT32(?), ref: 00470516
                        • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
                      • VariantCopy.OLEAUT32(?,?), ref: 0047057A
                        • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
                      • VariantClear.OLEAUT32(00000000), ref: 0047060D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Variant$Clear$Copy$CallDispFuncInit
                      • String ID: H
                      • API String ID: 3613100350-2852464175
                      • Opcode ID: a0993396c5b8998c97eda62eb292956ea80afa76050d6468dceab7f561fa4670
                      • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
                      • Opcode Fuzzy Hash: a0993396c5b8998c97eda62eb292956ea80afa76050d6468dceab7f561fa4670
                      • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
                      APIs
                      • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
                      • DestroyWindow.USER32(?), ref: 00426F50
                      • UnregisterHotKey.USER32(?), ref: 00426F77
                      • FreeLibrary.KERNEL32(?), ref: 0042701F
                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                      • String ID: close all
                      • API String ID: 4174999648-3243417748
                      • Opcode ID: 2f66c89a40f0e85c5d6dd4ec67defb2116834faec8b505cc193eeea2d12e665d
                      • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
                      • Opcode Fuzzy Hash: 2f66c89a40f0e85c5d6dd4ec67defb2116834faec8b505cc193eeea2d12e665d
                      • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
                      APIs
                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
                      • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
                      • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
                      • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
                      • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
                        • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                      • String ID:
                      • API String ID: 1291720006-3916222277
                      • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                      • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
                      • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                      • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
                      APIs
                      • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
                      • IsMenu.USER32(?), ref: 0045FC5F
                      • CreatePopupMenu.USER32 ref: 0045FC97
                      • GetMenuItemCount.USER32(?), ref: 0045FCFD
                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Menu$Item$CountCreateInfoInsertPopup
                      • String ID: 0$2
                      • API String ID: 93392585-3793063076
                      • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                      • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
                      • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                      • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
                      APIs
                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
                      • VariantClear.OLEAUT32(?), ref: 00435320
                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
                      • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
                      • VariantClear.OLEAUT32(?), ref: 004353B3
                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
                      • String ID: crts
                      • API String ID: 586820018-3724388283
                      • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                      • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
                      • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                      • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
                      APIs
                        • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                      • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
                      • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
                      • _wcscat.LIBCMT ref: 0044BCAF
                      • _wcslen.LIBCMT ref: 0044BCBB
                      • _wcslen.LIBCMT ref: 0044BCD1
                      • SHFileOperationW.SHELL32(?), ref: 0044BD17
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                      • String ID: \*.*
                      • API String ID: 2326526234-1173974218
                      • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                      • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
                      • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                      • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
                      APIs
                        • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
                      • _wcslen.LIBCMT ref: 004335F2
                      • GetFileAttributesW.KERNEL32(?), ref: 0043361C
                      • GetLastError.KERNEL32 ref: 0043362B
                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
                      • _wcsrchr.LIBCMT ref: 00433666
                        • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                      • String ID: \
                      • API String ID: 321622961-2967466578
                      • Opcode ID: c150a4e9996d72ab87fed94048e5703dbc8ac01b5d1c28e2aacddbc68f85fc9a
                      • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
                      • Opcode Fuzzy Hash: c150a4e9996d72ab87fed94048e5703dbc8ac01b5d1c28e2aacddbc68f85fc9a
                      • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: __wcsnicmp
                      • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                      • API String ID: 1038674560-2734436370
                      • Opcode ID: 7c13aa0513e4bb2138c96398a5a2566d58b08304d963883aeef11e8644bf4991
                      • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
                      • Opcode Fuzzy Hash: 7c13aa0513e4bb2138c96398a5a2566d58b08304d963883aeef11e8644bf4991
                      • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
                      APIs
                      • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,004A7F6C), ref: 00434057
                      • LoadStringW.USER32(00000000), ref: 00434060
                      • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
                      • LoadStringW.USER32(00000000), ref: 00434078
                      • _wprintf.LIBCMT ref: 004340A1
                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
                      Strings
                      • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: HandleLoadModuleString$Message_wprintf
                      • String ID: %s (%d) : ==> %s: %s %s
                      • API String ID: 3648134473-3128320259
                      • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                      • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
                      • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                      • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
                      APIs
                      • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
                      • __lock.LIBCMT ref: 00417981
                        • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
                        • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
                        • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
                      • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
                      • __lock.LIBCMT ref: 004179A2
                      • ___addlocaleref.LIBCMT ref: 004179C0
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                      • String ID: KERNEL32.DLL$pI
                      • API String ID: 637971194-197072765
                      • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                      • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
                      • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                      • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _memmove$_malloc
                      • String ID:
                      • API String ID: 1938898002-0
                      • Opcode ID: 1f9281079767c86d8b96628a3580c8a8d8da7ec8fe09033d6c47d2aab1b684b9
                      • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
                      • Opcode Fuzzy Hash: 1f9281079767c86d8b96628a3580c8a8d8da7ec8fe09033d6c47d2aab1b684b9
                      • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
                      APIs
                      • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                      • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
                      • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
                      • _memmove.LIBCMT ref: 0044B555
                      • _memmove.LIBCMT ref: 0044B578
                      • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
                      • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
                      • String ID:
                      • API String ID: 2737351978-0
                      • Opcode ID: 7e8c1d8edbf82e8c7821aeb5991414bf18d3cd2399c52039398c0efb06360fcc
                      • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
                      • Opcode Fuzzy Hash: 7e8c1d8edbf82e8c7821aeb5991414bf18d3cd2399c52039398c0efb06360fcc
                      • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
                      APIs
                      • ___set_flsgetvalue.LIBCMT ref: 0041523A
                      • __calloc_crt.LIBCMT ref: 00415246
                      • __getptd.LIBCMT ref: 00415253
                      • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
                      • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
                      • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
                      • _free.LIBCMT ref: 0041529E
                      • __dosmaperr.LIBCMT ref: 004152A9
                        • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                      • String ID:
                      • API String ID: 3638380555-0
                      • Opcode ID: ceb77f577b932ecc061a214adf97d6bda1f2bbbde8b0acc1a90a04adb45bcfac
                      • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
                      • Opcode Fuzzy Hash: ceb77f577b932ecc061a214adf97d6bda1f2bbbde8b0acc1a90a04adb45bcfac
                      • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
                      APIs
                      • VariantInit.OLEAUT32(?), ref: 0046C96E
                        • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
                        • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Variant$Copy$ClearErrorInitLast
                      • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                      • API String ID: 3207048006-625585964
                      • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                      • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
                      • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                      • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
                      APIs
                      • WSAStartup.WSOCK32(00000101,?), ref: 00465559
                        • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                      • inet_addr.WSOCK32(?,00000000,?,?), ref: 0046559B
                      • gethostbyname.WSOCK32(?), ref: 004655A6
                      • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
                      • _memmove.LIBCMT ref: 004656CA
                      • GlobalFree.KERNEL32(00000000), ref: 0046575C
                      • WSACleanup.WSOCK32 ref: 00465762
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
                      • String ID:
                      • API String ID: 2945290962-0
                      • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                      • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
                      • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                      • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
                      APIs
                      • GetSystemMetrics.USER32(0000000F), ref: 00440527
                      • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
                      • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
                      • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
                      • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
                      • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
                      • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
                      • String ID:
                      • API String ID: 1457242333-0
                      • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                      • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
                      • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                      • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
                      APIs
                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ConnectRegistry_memmove_wcslen
                      • String ID:
                      • API String ID: 15295421-0
                      • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                      • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
                      • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                      • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
                      APIs
                        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                      • _wcstok.LIBCMT ref: 004675B2
                        • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                      • _wcscpy.LIBCMT ref: 00467641
                      • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                      • _wcslen.LIBCMT ref: 00467793
                      • _wcslen.LIBCMT ref: 004677BD
                        • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                      • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
                      • String ID: X
                      • API String ID: 780548581-3081909835
                      • Opcode ID: 59d8333ba564867e966a45eb1cae5b5c9aa55f5f2a82546ce07c615cef46a44c
                      • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
                      • Opcode Fuzzy Hash: 59d8333ba564867e966a45eb1cae5b5c9aa55f5f2a82546ce07c615cef46a44c
                      • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
                      APIs
                        • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                        • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                        • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                      • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
                      • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
                      • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
                      • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
                      • CloseFigure.GDI32(?), ref: 0044751F
                      • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
                      • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                      • String ID:
                      • API String ID: 4082120231-0
                      • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                      • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
                      • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                      • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
                      APIs
                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
                      • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
                      • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
                      • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
                      • RegCloseKey.ADVAPI32(?), ref: 0046B49D
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
                      • String ID:
                      • API String ID: 2027346449-0
                      • Opcode ID: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                      • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
                      • Opcode Fuzzy Hash: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                      • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
                      APIs
                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                        • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                      • GetMenu.USER32 ref: 0047A703
                      • GetMenuItemCount.USER32(00000000), ref: 0047A74F
                      • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
                      • _wcslen.LIBCMT ref: 0047A79E
                      • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
                      • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
                      • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
                      • String ID:
                      • API String ID: 3257027151-0
                      • Opcode ID: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                      • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
                      • Opcode Fuzzy Hash: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                      • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
                      APIs
                      • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
                      • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ErrorLastselect
                      • String ID:
                      • API String ID: 215497628-0
                      • Opcode ID: bd199fa730e01bd6eb844f10b5a9d2666f16aab98b040269f67dcb89f4e9aede
                      • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
                      • Opcode Fuzzy Hash: bd199fa730e01bd6eb844f10b5a9d2666f16aab98b040269f67dcb89f4e9aede
                      • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
                      APIs
                      • GetParent.USER32(?), ref: 0044443B
                      • GetKeyboardState.USER32(?), ref: 00444450
                      • SetKeyboardState.USER32(?), ref: 004444A4
                      • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
                      • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
                      • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
                      • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessagePost$KeyboardState$Parent
                      • String ID:
                      • API String ID: 87235514-0
                      • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                      • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
                      • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                      • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
                      APIs
                      • GetParent.USER32(?), ref: 00444633
                      • GetKeyboardState.USER32(?), ref: 00444648
                      • SetKeyboardState.USER32(?), ref: 0044469C
                      • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
                      • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
                      • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
                      • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessagePost$KeyboardState$Parent
                      • String ID:
                      • API String ID: 87235514-0
                      • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                      • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
                      • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                      • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
                      APIs
                      • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
                      • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
                      • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
                      • DeleteObject.GDI32(?), ref: 00455736
                      • DeleteObject.GDI32(?), ref: 00455744
                      • DestroyIcon.USER32(?), ref: 00455752
                      • DestroyWindow.USER32(?), ref: 00455760
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                      • String ID:
                      • API String ID: 2354583917-0
                      • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                      • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
                      • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                      • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                      • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
                      • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                      • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
                      APIs
                      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
                      • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
                      • EnableWindow.USER32(?,00000000), ref: 00448B5C
                      • EnableWindow.USER32(?,00000001), ref: 00448B72
                      • ShowWindow.USER32(?,00000000), ref: 00448BE8
                      • ShowWindow.USER32(?,00000004), ref: 00448BF4
                      • EnableWindow.USER32(?,00000001), ref: 00448C09
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Window$Enable$Show$MessageMoveSend
                      • String ID:
                      • API String ID: 896007046-0
                      • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                      • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
                      • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                      • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
                      APIs
                      • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
                      • GetFocus.USER32 ref: 00448ACF
                      • EnableWindow.USER32(?,00000000), ref: 00448B5C
                      • EnableWindow.USER32(?,00000001), ref: 00448B72
                      • ShowWindow.USER32(?,00000000), ref: 00448BE8
                      • ShowWindow.USER32(?,00000004), ref: 00448BF4
                      • EnableWindow.USER32(?,00000001), ref: 00448C09
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Window$Enable$Show$FocusMessageSend
                      • String ID:
                      • API String ID: 3429747543-0
                      • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                      • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
                      • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                      • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
                      APIs
                        • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
                        • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
                        • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                      • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
                      • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
                      • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
                      • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
                      • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
                      • String ID:
                      • API String ID: 3300667738-0
                      • Opcode ID: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                      • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
                      • Opcode Fuzzy Hash: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                      • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A
                      APIs
                      • SetErrorMode.KERNEL32(00000001), ref: 0045D459
                      • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
                      • __swprintf.LIBCMT ref: 0045D4E9
                      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ErrorMode$InformationVolume__swprintf
                      • String ID: %lu$\VH
                      • API String ID: 3164766367-2432546070
                      • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                      • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
                      • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                      • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
                      APIs
                      • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
                      • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
                      • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
                      • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
                      • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessageSend
                      • String ID: Msctls_Progress32
                      • API String ID: 3850602802-3636473452
                      • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                      • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
                      • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                      • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
                      APIs
                      • _malloc.LIBCMT ref: 0041F707
                        • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                        • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                        • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                      • _free.LIBCMT ref: 0041F71A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: AllocateHeap_free_malloc
                      • String ID: [B
                      • API String ID: 1020059152-632041663
                      • Opcode ID: 5ae3695c4899d33c0c5016eec090c96391fe5f6cd2bec6778d3ea2d81492c429
                      • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
                      • Opcode Fuzzy Hash: 5ae3695c4899d33c0c5016eec090c96391fe5f6cd2bec6778d3ea2d81492c429
                      • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
                      APIs
                      • ___set_flsgetvalue.LIBCMT ref: 00413DA4
                      • __calloc_crt.LIBCMT ref: 00413DB0
                      • __getptd.LIBCMT ref: 00413DBD
                      • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
                      • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
                      • _free.LIBCMT ref: 00413E07
                      • __dosmaperr.LIBCMT ref: 00413E12
                        • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                      • String ID:
                      • API String ID: 155776804-0
                      • Opcode ID: 2348856d60b5f8ae92a3c52096df9563f03509e61ea6f3f8618797eae5d9925f
                      • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
                      • Opcode Fuzzy Hash: 2348856d60b5f8ae92a3c52096df9563f03509e61ea6f3f8618797eae5d9925f
                      • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
                      APIs
                        • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
                        • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
                      • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
                      • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
                      • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
                      • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
                      • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
                      • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                      • String ID:
                      • API String ID: 1957940570-0
                      • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                      • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
                      • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                      • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
                      APIs
                      • ___set_flsgetvalue.LIBCMT ref: 00413D20
                        • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                        • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                      • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                        • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                      • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                      • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                      • ExitThread.KERNEL32 ref: 00413D4E
                      • GetCurrentThreadId.KERNEL32 ref: 00413D54
                      • __freefls@4.LIBCMT ref: 00413D74
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                      • String ID:
                      • API String ID: 259663610-0
                      • Opcode ID: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                      • Instruction ID: 675159a2c5a9d795bd3e19fa90b6febf5cd616b5876767659bafc4934cd781b8
                      • Opcode Fuzzy Hash: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                      • Instruction Fuzzy Hash: 0DF0FF75504700AFC704BF72D9498CE7BB9AF48349720846EB80987222DA3DD9C2DBA9
                      APIs
                      • GetClientRect.USER32(?,?), ref: 004302E6
                      • GetWindowRect.USER32(00000000,?), ref: 00430316
                      • GetClientRect.USER32(?,?), ref: 00430364
                      • GetSystemMetrics.USER32(0000000F), ref: 004303B1
                      • GetWindowRect.USER32(?,?), ref: 004303C3
                      • ScreenToClient.USER32(?,?), ref: 004303EC
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Rect$Client$Window$MetricsScreenSystem
                      • String ID:
                      • API String ID: 3220332590-0
                      • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                      • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
                      • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                      • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _malloc_wcslen$_strcat_wcscpy
                      • String ID:
                      • API String ID: 1612042205-0
                      • Opcode ID: de986be264bc4095e11606319f6bc53bb2fe9b52cfcfc757ffd23d2b2712e847
                      • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
                      • Opcode Fuzzy Hash: de986be264bc4095e11606319f6bc53bb2fe9b52cfcfc757ffd23d2b2712e847
                      • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _memmove_strncmp
                      • String ID: >$U$\
                      • API String ID: 2666721431-237099441
                      • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                      • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
                      • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                      • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
                      APIs
                      • GetKeyboardState.USER32(?), ref: 0044C570
                      • SetKeyboardState.USER32(00000080), ref: 0044C594
                      • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
                      • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
                      • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
                      • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessagePost$KeyboardState$InputSend
                      • String ID:
                      • API String ID: 2221674350-0
                      • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                      • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
                      • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                      • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _wcscpy$_wcscat
                      • String ID:
                      • API String ID: 2037614760-0
                      • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                      • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
                      • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                      • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
                      APIs
                      • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                      • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                      • VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                      • VariantCopy.OLEAUT32(?,?), ref: 00451C27
                      • VariantClear.OLEAUT32(?), ref: 00451CA1
                      • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Variant$Copy$AllocClearErrorLastString
                      • String ID:
                      • API String ID: 960795272-0
                      • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                      • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
                      • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                      • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
                      APIs
                      • BeginPaint.USER32(00000000,?), ref: 00447BDF
                      • GetWindowRect.USER32(?,?), ref: 00447C5D
                      • ScreenToClient.USER32(?,?), ref: 00447C7B
                      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                      • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                      • EndPaint.USER32(?,?), ref: 00447D13
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                      • String ID:
                      • API String ID: 4189319755-0
                      • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                      • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
                      • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                      • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
                      APIs
                      • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
                      • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
                      • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
                      • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
                      • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessageSend$LongWindow$InvalidateRect
                      • String ID:
                      • API String ID: 1976402638-0
                      • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                      • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
                      • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                      • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
                      APIs
                      • ShowWindow.USER32(?,00000000), ref: 00440A8A
                      • EnableWindow.USER32(?,00000000), ref: 00440AAF
                      • ShowWindow.USER32(?,00000000), ref: 00440B18
                      • ShowWindow.USER32(?,00000004), ref: 00440B2B
                      • EnableWindow.USER32(?,00000001), ref: 00440B50
                      • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Window$Show$Enable$MessageSend
                      • String ID:
                      • API String ID: 642888154-0
                      • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                      • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
                      • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                      • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Variant$Copy$ClearErrorLast
                      • String ID: NULL Pointer assignment$Not an Object type
                      • API String ID: 2487901850-572801152
                      • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                      • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
                      • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                      • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
                      APIs
                      • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
                      • EnableWindow.USER32(?,00000000), ref: 00448B5C
                      • EnableWindow.USER32(?,00000001), ref: 00448B72
                      • ShowWindow.USER32(?,00000000), ref: 00448BE8
                      • ShowWindow.USER32(?,00000004), ref: 00448BF4
                      • EnableWindow.USER32(?,00000001), ref: 00448C09
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Window$Enable$Show$MessageSend
                      • String ID:
                      • API String ID: 1871949834-0
                      • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                      • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
                      • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                      • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                      • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
                      • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                      • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
                      APIs
                      • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
                      • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
                      • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
                      • SendMessageW.USER32 ref: 00471AE3
                      • DestroyIcon.USER32(?), ref: 00471AF4
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
                      • String ID:
                      • API String ID: 3611059338-0
                      • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                      • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
                      • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                      • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: DestroyWindow$DeleteObject$IconMove
                      • String ID:
                      • API String ID: 1640429340-0
                      • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                      • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
                      • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                      • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
                      APIs
                        • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                        • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                      • _wcslen.LIBCMT ref: 004438CD
                      • _wcslen.LIBCMT ref: 004438E6
                      • _wcstok.LIBCMT ref: 004438F8
                      • _wcslen.LIBCMT ref: 0044390C
                      • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
                      • _wcstok.LIBCMT ref: 00443931
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
                      • String ID:
                      • API String ID: 3632110297-0
                      • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                      • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
                      • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                      • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Destroy$DeleteMenuObject$IconWindow
                      • String ID:
                      • API String ID: 752480666-0
                      • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                      • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
                      • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                      • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Destroy$DeleteObjectWindow$IconImageList_
                      • String ID:
                      • API String ID: 3275902921-0
                      • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                      • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
                      • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                      • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Destroy$DeleteObjectWindow$IconImageList_
                      • String ID:
                      • API String ID: 3275902921-0
                      • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                      • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
                      • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                      • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
                      APIs
                      • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                      • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
                      • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: PerformanceQuery$CounterSleep$Frequency
                      • String ID:
                      • API String ID: 2833360925-0
                      • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                      • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
                      • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                      • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
                      APIs
                      • SendMessageW.USER32 ref: 004555C7
                      • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
                      • DeleteObject.GDI32(?), ref: 00455736
                      • DeleteObject.GDI32(?), ref: 00455744
                      • DestroyIcon.USER32(?), ref: 00455752
                      • DestroyWindow.USER32(?), ref: 00455760
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: DeleteDestroyMessageObjectSend$IconWindow
                      • String ID:
                      • API String ID: 3691411573-0
                      • Opcode ID: da631fe096052ef5bd48ea011818ab2276afcb1e35ba95b92101ff2cabc01c83
                      • Instruction ID: ee39a3c17b45488341a0d6beee4a1abd3419bb98b1a9b0cd73eda499273a4889
                      • Opcode Fuzzy Hash: da631fe096052ef5bd48ea011818ab2276afcb1e35ba95b92101ff2cabc01c83
                      • Instruction Fuzzy Hash: C011B6B12047419BC710DF65EDC8A2A77A8BF18322F10066AFD50DB2D2D779D849C729
                      APIs
                        • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                        • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                        • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                      • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
                      • LineTo.GDI32(?,?,?), ref: 004472AC
                      • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
                      • LineTo.GDI32(?,?,?), ref: 004472C6
                      • EndPath.GDI32(?), ref: 004472D6
                      • StrokePath.GDI32(?), ref: 004472E4
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                      • String ID:
                      • API String ID: 372113273-0
                      • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                      • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
                      • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                      • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
                      APIs
                      • GetDC.USER32(00000000), ref: 0044CC6D
                      • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
                      • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
                      • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
                      • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CapsDevice$Release
                      • String ID:
                      • API String ID: 1035833867-0
                      • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                      • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
                      • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                      • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
                      APIs
                      • __getptd.LIBCMT ref: 0041708E
                        • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                        • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                      • __amsg_exit.LIBCMT ref: 004170AE
                      • __lock.LIBCMT ref: 004170BE
                      • InterlockedDecrement.KERNEL32(?), ref: 004170DB
                      • _free.LIBCMT ref: 004170EE
                      • InterlockedIncrement.KERNEL32(015F2D00), ref: 00417106
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                      • String ID:
                      • API String ID: 3470314060-0
                      • Opcode ID: 24516f4010ce0b93e8566e6a8de288d1d1524a4de8e6263f522fbb499f39661f
                      • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
                      • Opcode Fuzzy Hash: 24516f4010ce0b93e8566e6a8de288d1d1524a4de8e6263f522fbb499f39661f
                      • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
                      APIs
                      • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
                      • EnterCriticalSection.KERNEL32(?), ref: 0044B666
                      • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
                      • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
                        • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
                      • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                      • String ID:
                      • API String ID: 3495660284-0
                      • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                      • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
                      • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                      • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
                      APIs
                      • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
                      • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
                      • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
                      • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
                      • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Virtual
                      • String ID:
                      • API String ID: 4278518827-0
                      • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                      • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
                      • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                      • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
                      APIs
                      • ___set_flsgetvalue.LIBCMT ref: 004151C0
                        • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                        • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                      • ___fls_getvalue@4.LIBCMT ref: 004151CB
                        • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                      • ___fls_setvalue@8.LIBCMT ref: 004151DD
                      • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                      • ExitThread.KERNEL32 ref: 004151ED
                      • __freefls@4.LIBCMT ref: 00415209
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                      • String ID:
                      • API String ID: 442100245-0
                      • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                      • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
                      • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                      • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
                      APIs
                        • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                        • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                      • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
                      • _wcslen.LIBCMT ref: 0045F94A
                      • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                      • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
                      • String ID: 0
                      • API String ID: 621800784-4108050209
                      • Opcode ID: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                      • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
                      • Opcode Fuzzy Hash: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                      • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
                      APIs
                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                      • SetErrorMode.KERNEL32 ref: 004781CE
                      • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
                        • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                      • SetErrorMode.KERNEL32(?), ref: 00478270
                      • SetErrorMode.KERNEL32(?), ref: 00478340
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ErrorMode$AttributesFile_memmove_wcslen
                      • String ID: \VH
                      • API String ID: 3884216118-234962358
                      • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                      • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
                      • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                      • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
                      APIs
                      • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
                      • IsMenu.USER32(?), ref: 0044854D
                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
                      • DrawMenuBar.USER32 ref: 004485AF
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Menu$Item$DrawInfoInsert
                      • String ID: 0
                      • API String ID: 3076010158-4108050209
                      • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                      • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
                      • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                      • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
                      APIs
                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                      • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
                      • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
                      • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
                        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessageSend$_memmove_wcslen
                      • String ID: ComboBox$ListBox
                      • API String ID: 1589278365-1403004172
                      • Opcode ID: e833c5f683c324df3584e13527d60df096f9c23fae9490791bb62fc6faf22f53
                      • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
                      • Opcode Fuzzy Hash: e833c5f683c324df3584e13527d60df096f9c23fae9490791bb62fc6faf22f53
                      • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Handle
                      • String ID: nul
                      • API String ID: 2519475695-2873401336
                      • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                      • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
                      • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                      • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
                      APIs
                      • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Handle
                      • String ID: nul
                      • API String ID: 2519475695-2873401336
                      • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                      • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
                      • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                      • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID:
                      • String ID: SysAnimate32
                      • API String ID: 0-1011021900
                      • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                      • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
                      • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                      • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
                      APIs
                        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                        • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                        • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                        • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
                        • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
                      • GetFocus.USER32 ref: 0046157B
                        • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
                        • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
                      • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
                      • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
                      • __swprintf.LIBCMT ref: 00461608
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
                      • String ID: %s%d
                      • API String ID: 2645982514-1110647743
                      • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                      • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
                      • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                      • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                      • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
                      • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                      • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
                      APIs
                      • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
                      • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
                      • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
                      • CloseHandle.KERNEL32(00000000), ref: 00475A4D
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Process$CloseCountersCurrentHandleOpen
                      • String ID:
                      • API String ID: 3488606520-0
                      • Opcode ID: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                      • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
                      • Opcode Fuzzy Hash: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                      • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
                      APIs
                        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ConnectRegistry_memmove_wcslen
                      • String ID:
                      • API String ID: 15295421-0
                      • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                      • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
                      • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                      • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
                      APIs
                      • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
                      • GetProcAddress.KERNEL32(?,?), ref: 004648F7
                      • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
                      • GetProcAddress.KERNEL32(?,?), ref: 0046495A
                      • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: AddressProc$Library$FreeLoad
                      • String ID:
                      • API String ID: 2449869053-0
                      • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                      • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
                      • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                      • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
                      APIs
                      • GetCursorPos.USER32(?), ref: 004563A6
                      • ScreenToClient.USER32(?,?), ref: 004563C3
                      • GetAsyncKeyState.USER32(?), ref: 00456400
                      • GetAsyncKeyState.USER32(?), ref: 00456410
                      • GetWindowLongW.USER32(?,000000F0), ref: 00456466
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: AsyncState$ClientCursorLongScreenWindow
                      • String ID:
                      • API String ID: 3539004672-0
                      • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                      • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
                      • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                      • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
                      APIs
                      • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
                      • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
                      • Sleep.KERNEL32(0000000A), ref: 0047D455
                      • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
                      • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Interlocked$DecrementIncrement$Sleep
                      • String ID:
                      • API String ID: 327565842-0
                      • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                      • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
                      • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                      • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
                      APIs
                      • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
                      • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
                      • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
                      • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: PrivateProfile$SectionWrite$String
                      • String ID:
                      • API String ID: 2832842796-0
                      • Opcode ID: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                      • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
                      • Opcode Fuzzy Hash: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                      • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
                      APIs
                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
                      • RegCloseKey.ADVAPI32(?), ref: 00441CFE
                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Enum$CloseDeleteOpen
                      • String ID:
                      • API String ID: 2095303065-0
                      • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                      • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
                      • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                      • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
                      APIs
                      • GetWindowRect.USER32(?,?), ref: 00436A24
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: RectWindow
                      • String ID:
                      • API String ID: 861336768-0
                      • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                      • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
                      • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                      • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
                      APIs
                      • SendMessageW.USER32 ref: 00449598
                        • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                      • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
                      • _wcslen.LIBCMT ref: 0044960D
                      • _wcslen.LIBCMT ref: 0044961A
                      • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessageSend$_wcslen$_wcspbrk
                      • String ID:
                      • API String ID: 1856069659-0
                      • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                      • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
                      • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                      • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
                      APIs
                      • GetCursorPos.USER32(?), ref: 004478E2
                      • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
                      • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
                      • GetCursorPos.USER32(00000000), ref: 0044796A
                      • TrackPopupMenuEx.USER32(?,00000000,00000000,?,?,00000000), ref: 00447991
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CursorMenuPopupTrack$Proc
                      • String ID:
                      • API String ID: 1300944170-0
                      • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                      • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
                      • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                      • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
                      APIs
                      • GetClientRect.USER32(?,?), ref: 004479CC
                      • GetCursorPos.USER32(?), ref: 004479D7
                      • ScreenToClient.USER32(?,?), ref: 004479F3
                      • WindowFromPoint.USER32(?,?), ref: 00447A34
                      • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Client$CursorFromPointProcRectScreenWindow
                      • String ID:
                      • API String ID: 1822080540-0
                      • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                      • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
                      • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                      • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
                      APIs
                      • GetWindowRect.USER32(?,?), ref: 00447C5D
                      • ScreenToClient.USER32(?,?), ref: 00447C7B
                      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                      • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                      • EndPaint.USER32(?,?), ref: 00447D13
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ClientPaintRectRectangleScreenViewportWindow
                      • String ID:
                      • API String ID: 659298297-0
                      • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                      • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
                      • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                      • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
                      APIs
                      • EnableWindow.USER32(?,00000000), ref: 00448B5C
                      • EnableWindow.USER32(?,00000001), ref: 00448B72
                      • ShowWindow.USER32(?,00000000), ref: 00448BE8
                      • ShowWindow.USER32(?,00000004), ref: 00448BF4
                      • EnableWindow.USER32(?,00000001), ref: 00448C09
                        • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
                        • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
                        • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
                        • Part of subcall function 00440D98: SendMessageW.USER32(015F1B28,000000F1,00000000,00000000), ref: 00440E6E
                        • Part of subcall function 00440D98: SendMessageW.USER32(015F1B28,000000F1,00000001,00000000), ref: 00440E9A
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Window$EnableMessageSend$LongShow
                      • String ID:
                      • API String ID: 142311417-0
                      • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                      • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
                      • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                      • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                      • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
                      • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                      • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
                      APIs
                      • IsWindowVisible.USER32(?), ref: 00445879
                      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
                      • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
                      • _wcslen.LIBCMT ref: 004458FB
                      • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                      • String ID:
                      • API String ID: 3087257052-0
                      • Opcode ID: 622372a4a32610ce73fb3647056b26e365a1681bd10d6cc102ac189a3bd4553b
                      • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
                      • Opcode Fuzzy Hash: 622372a4a32610ce73fb3647056b26e365a1681bd10d6cc102ac189a3bd4553b
                      • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
                      APIs
                        • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                      • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 004653FE
                      • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
                      • connect.WSOCK32(00000000,?,00000010), ref: 00465446
                      • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
                      • closesocket.WSOCK32(00000000,00000000), ref: 00465481
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ErrorLast$closesocketconnectinet_addrsocket
                      • String ID:
                      • API String ID: 245547762-0
                      • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                      • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
                      • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                      • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
                      APIs
                      • DeleteObject.GDI32(00000000), ref: 004471D8
                      • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                      • SelectObject.GDI32(?,00000000), ref: 00447228
                      • BeginPath.GDI32(?), ref: 0044723D
                      • SelectObject.GDI32(?,00000000), ref: 00447266
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Object$Select$BeginCreateDeletePath
                      • String ID:
                      • API String ID: 2338827641-0
                      • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                      • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
                      • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                      • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
                      APIs
                      • Sleep.KERNEL32(00000000), ref: 00434598
                      • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
                      • Sleep.KERNEL32(00000000), ref: 004345D4
                      • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CounterPerformanceQuerySleep
                      • String ID:
                      • API String ID: 2875609808-0
                      • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                      • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
                      • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                      • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
                      APIs
                      • GetDlgItem.USER32(?,000003E9), ref: 00460C17
                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
                      • MessageBeep.USER32(00000000), ref: 00460C46
                      • KillTimer.USER32(?,0000040A), ref: 00460C68
                      • EndDialog.USER32(?,00000001), ref: 00460C83
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: BeepDialogItemKillMessageTextTimerWindow
                      • String ID:
                      • API String ID: 3741023627-0
                      • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                      • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
                      • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                      • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Destroy$DeleteObjectWindow$Icon
                      • String ID:
                      • API String ID: 4023252218-0
                      • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                      • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
                      • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                      • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
                      APIs
                      • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
                      • DeleteObject.GDI32(?), ref: 00455736
                      • DeleteObject.GDI32(?), ref: 00455744
                      • DestroyIcon.USER32(?), ref: 00455752
                      • DestroyWindow.USER32(?), ref: 00455760
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: DeleteDestroyObject$IconMessageSendWindow
                      • String ID:
                      • API String ID: 1489400265-0
                      • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                      • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
                      • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                      • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
                      APIs
                        • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                      • DestroyWindow.USER32(?), ref: 00455728
                      • DeleteObject.GDI32(?), ref: 00455736
                      • DeleteObject.GDI32(?), ref: 00455744
                      • DestroyIcon.USER32(?), ref: 00455752
                      • DestroyWindow.USER32(?), ref: 00455760
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                      • String ID:
                      • API String ID: 1042038666-0
                      • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                      • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
                      • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                      • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Path$ObjectStroke$DeleteFillSelect
                      • String ID:
                      • API String ID: 2625713937-0
                      • Opcode ID: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
                      • Instruction ID: 382768f54733291aaafbd4c53fc5fd67df7ff3e11fccf1fbf51b229105ba29ed
                      • Opcode Fuzzy Hash: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
                      • Instruction Fuzzy Hash: B3F036751125109BD3519F28FD4875E3B68E747321F94423AEA15923F0CB785449CB6D
                      APIs
                      • __getptd.LIBCMT ref: 0041780F
                        • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                        • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                      • __getptd.LIBCMT ref: 00417826
                      • __amsg_exit.LIBCMT ref: 00417834
                      • __lock.LIBCMT ref: 00417844
                      • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                      • String ID:
                      • API String ID: 938513278-0
                      • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                      • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
                      • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                      • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
                      APIs
                        • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                      • ___set_flsgetvalue.LIBCMT ref: 00413D20
                        • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                        • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                      • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                        • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                      • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                      • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                      • ExitThread.KERNEL32 ref: 00413D4E
                      • GetCurrentThreadId.KERNEL32 ref: 00413D54
                      • __freefls@4.LIBCMT ref: 00413D74
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                      • String ID:
                      • API String ID: 2403457894-0
                      • Opcode ID: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                      • Instruction ID: 99982f4671f9afe760f134679f3a1374bf557b67af872bc9692f731b59fefeca
                      • Opcode Fuzzy Hash: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                      • Instruction Fuzzy Hash: 1AE04F318443056B8F013BB39C1E8CF363C9E0434AB20082ABE1493112DA2C99C1C6BE
                      APIs
                        • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                      • ___set_flsgetvalue.LIBCMT ref: 004151C0
                        • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                        • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                      • ___fls_getvalue@4.LIBCMT ref: 004151CB
                        • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                      • ___fls_setvalue@8.LIBCMT ref: 004151DD
                      • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                      • ExitThread.KERNEL32 ref: 004151ED
                      • __freefls@4.LIBCMT ref: 00415209
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                      • String ID:
                      • API String ID: 4247068974-0
                      • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                      • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
                      • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                      • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID:
                      • String ID: )$U$\
                      • API String ID: 0-3705770531
                      • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                      • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
                      • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                      • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
                      APIs
                        • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                      • CoInitialize.OLE32(00000000), ref: 0046E505
                      • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                      • CoUninitialize.OLE32 ref: 0046E53D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CreateInitializeInstanceUninitialize_wcslen
                      • String ID: .lnk
                      • API String ID: 886957087-24824748
                      • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                      • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
                      • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                      • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _memmove
                      • String ID: \
                      • API String ID: 4104443479-2967466578
                      • Opcode ID: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                      • Instruction ID: 90b25fc4546a2c21e21e7939c456fa175a28996bec6c3309f7edcf8d77039fcb
                      • Opcode Fuzzy Hash: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                      • Instruction Fuzzy Hash: 8AB1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _memmove
                      • String ID: \
                      • API String ID: 4104443479-2967466578
                      • Opcode ID: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                      • Instruction ID: 47d8400a167da4587eb122393216330e55bf30386b581c043e0675457d4a745f
                      • Opcode Fuzzy Hash: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                      • Instruction Fuzzy Hash: F1B1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _memmove
                      • String ID: \
                      • API String ID: 4104443479-2967466578
                      • Opcode ID: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                      • Instruction ID: 4d1558bed40bbae7f26d93592334ac0d2c658ca85fbb7fec499742c135aa7d63
                      • Opcode Fuzzy Hash: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                      • Instruction Fuzzy Hash: E5A1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED441AB381D7795946CB1A
                      Strings
                      • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
                      • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                      • API String ID: 708495834-557222456
                      • Opcode ID: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                      • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
                      • Opcode Fuzzy Hash: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                      • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
                      APIs
                        • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
                      • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
                        • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
                        • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
                        • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
                        • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
                      • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                      • String ID: @
                      • API String ID: 4150878124-2766056989
                      • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                      • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
                      • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                      • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _memmove
                      • String ID: \$]$h
                      • API String ID: 4104443479-3262404753
                      • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                      • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
                      • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                      • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
                      APIs
                      • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
                        • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                        • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                      • CloseHandle.KERNEL32(?), ref: 00457E09
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CloseExecuteHandleShell_wcscpy_wcslen
                      • String ID: <$@
                      • API String ID: 2417854910-1426351568
                      • Opcode ID: 024707e8d0be736fd9aee974053134abdf34597ecb22147b7e98c4ffc578353a
                      • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
                      • Opcode Fuzzy Hash: 024707e8d0be736fd9aee974053134abdf34597ecb22147b7e98c4ffc578353a
                      • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
                      APIs
                      • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
                        • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                      • String ID:
                      • API String ID: 3705125965-3916222277
                      • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                      • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
                      • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                      • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
                      APIs
                      • GetMenuItemInfoW.USER32 ref: 0045FAC4
                      • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
                      • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Menu$Delete$InfoItem
                      • String ID: 0
                      • API String ID: 135850232-4108050209
                      • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                      • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
                      • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                      • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
                      APIs
                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
                      • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Window$Long
                      • String ID: SysTreeView32
                      • API String ID: 847901565-1698111956
                      • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                      • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
                      • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                      • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
                      APIs
                      • LoadLibraryA.KERNEL32(?), ref: 00434B10
                      • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
                      • FreeLibrary.KERNEL32(?), ref: 00434B9F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Library$AddressFreeLoadProc
                      • String ID: AU3_GetPluginDetails
                      • API String ID: 145871493-4132174516
                      • Opcode ID: eeab42aefd2d36d06d7687f66def4b4fc74e6333f2f3c4216b61849e5f0d6007
                      • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
                      • Opcode Fuzzy Hash: eeab42aefd2d36d06d7687f66def4b4fc74e6333f2f3c4216b61849e5f0d6007
                      • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
                      APIs
                      • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessageSend$Window
                      • String ID: SysMonthCal32
                      • API String ID: 2326795674-1439706946
                      • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                      • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
                      • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                      • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
                      APIs
                      • DestroyWindow.USER32(00000000), ref: 00450A2F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: DestroyWindow
                      • String ID: msctls_updown32
                      • API String ID: 3375834691-2298589950
                      • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                      • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
                      • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                      • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _memmove
                      • String ID: $<
                      • API String ID: 4104443479-428540627
                      • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                      • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
                      • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                      • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
                      APIs
                      • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ErrorMode$DiskFreeSpace
                      • String ID: \VH
                      • API String ID: 1682464887-234962358
                      • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                      • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
                      • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                      • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
                      APIs
                      • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ErrorMode$DiskFreeSpace
                      • String ID: \VH
                      • API String ID: 1682464887-234962358
                      • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                      • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
                      • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                      • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
                      APIs
                      • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
                      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
                      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ErrorMode$DiskFreeSpace
                      • String ID: \VH
                      • API String ID: 1682464887-234962358
                      • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                      • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
                      • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                      • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
                      APIs
                      • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
                      • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
                      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ErrorMode$InformationVolume
                      • String ID: \VH
                      • API String ID: 2507767853-234962358
                      • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                      • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
                      • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                      • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
                      APIs
                      • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
                      • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
                      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ErrorMode$InformationVolume
                      • String ID: \VH
                      • API String ID: 2507767853-234962358
                      • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                      • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
                      • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                      • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
                      APIs
                      • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
                      • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
                      • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessageSend
                      • String ID: msctls_trackbar32
                      • API String ID: 3850602802-1010561917
                      • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                      • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
                      • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                      • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
                      APIs
                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                      • CLSIDFromString.OLE32(?,00000000), ref: 00435236
                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
                      • String ID: crts
                      • API String ID: 943502515-3724388283
                      • Opcode ID: 529e37b86e0cb06f9ed43835dc92f00344189a4a835cae890eb44c126e03fe94
                      • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
                      • Opcode Fuzzy Hash: 529e37b86e0cb06f9ed43835dc92f00344189a4a835cae890eb44c126e03fe94
                      • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
                      APIs
                      • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
                      • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
                      • SetErrorMode.KERNEL32(?), ref: 0045D35C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ErrorMode$LabelVolume
                      • String ID: \VH
                      • API String ID: 2006950084-234962358
                      • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                      • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
                      • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                      • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
                      APIs
                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                      • GetMenuItemInfoW.USER32 ref: 00449727
                      • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
                      • DrawMenuBar.USER32 ref: 00449761
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Menu$InfoItem$Draw_malloc
                      • String ID: 0
                      • API String ID: 772068139-4108050209
                      • Opcode ID: 15a76c8cdafcabc0d330a2bd3afc87876622b04de3c231e264bb1fcb70d0c272
                      • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
                      • Opcode Fuzzy Hash: 15a76c8cdafcabc0d330a2bd3afc87876622b04de3c231e264bb1fcb70d0c272
                      • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _wcslen$_wcscpy
                      • String ID: 3, 3, 8, 1
                      • API String ID: 3469035223-357260408
                      • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                      • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
                      • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                      • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
                      APIs
                      • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
                      • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: ICMP.DLL$IcmpCloseHandle
                      • API String ID: 2574300362-3530519716
                      • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                      • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
                      • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                      • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
                      APIs
                      • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
                      • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: ICMP.DLL$IcmpCreateFile
                      • API String ID: 2574300362-275556492
                      • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                      • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
                      • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                      • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
                      APIs
                      • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
                      • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: ICMP.DLL$IcmpSendEcho
                      • API String ID: 2574300362-58917771
                      • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                      • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
                      • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                      • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
                      APIs
                      • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
                      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: RegDeleteKeyExW$advapi32.dll
                      • API String ID: 2574300362-4033151799
                      • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                      • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
                      • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                      • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                      • Instruction ID: c5df29d3d24fc858ebdc5227190e2e918b6fbc7f8fe9fd347d916346834f6d96
                      • Opcode Fuzzy Hash: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                      • Instruction Fuzzy Hash: 66E17F75600209AFCB04DF98C880EAEB7B9FF88714F10859AE909DB351D775EE45CBA0
                      APIs
                      • VariantInit.OLEAUT32(?), ref: 0047950F
                      • SysAllocString.OLEAUT32(00000000), ref: 004795D8
                      • VariantCopy.OLEAUT32(?,?), ref: 0047960F
                      • VariantClear.OLEAUT32(?), ref: 00479650
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Variant$AllocClearCopyInitString
                      • String ID:
                      • API String ID: 2808897238-0
                      • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                      • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
                      • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                      • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
                      APIs
                      • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
                      • __itow.LIBCMT ref: 004699CD
                        • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
                      • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
                      • __itow.LIBCMT ref: 00469A97
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessageSend$__itow
                      • String ID:
                      • API String ID: 3379773720-0
                      • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                      • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
                      • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                      • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
                      APIs
                      • GetWindowRect.USER32(?,?), ref: 00449A4A
                      • ScreenToClient.USER32(?,?), ref: 00449A80
                      • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Window$ClientMoveRectScreen
                      • String ID:
                      • API String ID: 3880355969-0
                      • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                      • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
                      • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                      • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                      • String ID:
                      • API String ID: 2782032738-0
                      • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                      • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
                      • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                      • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
                      APIs
                      • ClientToScreen.USER32(00000000,?), ref: 0044169A
                      • GetWindowRect.USER32(?,?), ref: 00441722
                      • PtInRect.USER32(?,?,?), ref: 00441734
                      • MessageBeep.USER32(00000000), ref: 004417AD
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Rect$BeepClientMessageScreenWindow
                      • String ID:
                      • API String ID: 1352109105-0
                      • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                      • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
                      • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                      • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
                      APIs
                      • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
                      • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
                      • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
                      • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CreateHardLink$DeleteErrorFileLast
                      • String ID:
                      • API String ID: 3321077145-0
                      • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                      • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
                      • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                      • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
                      APIs
                      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
                      • __isleadbyte_l.LIBCMT ref: 004208A6
                      • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
                      • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                      • String ID:
                      • API String ID: 3058430110-0
                      • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                      • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
                      • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                      • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
                      APIs
                      • GetParent.USER32(?), ref: 004503C8
                      • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
                      • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
                      • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Proc$Parent
                      • String ID:
                      • API String ID: 2351499541-0
                      • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                      • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
                      • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                      • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
                      APIs
                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
                      • TranslateMessage.USER32(?), ref: 00442B01
                      • DispatchMessageW.USER32(?), ref: 00442B0B
                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Message$Peek$DispatchTranslate
                      • String ID:
                      • API String ID: 1795658109-0
                      • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                      • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
                      • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                      • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
                      APIs
                      • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
                        • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                        • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                        • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                      • GetCaretPos.USER32(?), ref: 004743B2
                      • ClientToScreen.USER32(00000000,?), ref: 004743E8
                      • GetForegroundWindow.USER32 ref: 004743EE
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                      • String ID:
                      • API String ID: 2759813231-0
                      • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                      • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
                      • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                      • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
                      APIs
                        • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                      • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
                      • _wcslen.LIBCMT ref: 00449519
                      • _wcslen.LIBCMT ref: 00449526
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessageSend_wcslen$_wcspbrk
                      • String ID:
                      • API String ID: 2886238975-0
                      • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                      • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
                      • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                      • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: __setmode$DebugOutputString_fprintf
                      • String ID:
                      • API String ID: 1792727568-0
                      • Opcode ID: 3c2651e04b8c58a568eb85e9359acfd0b4abd62d0fba5903cdd8226a6c0f261c
                      • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
                      • Opcode Fuzzy Hash: 3c2651e04b8c58a568eb85e9359acfd0b4abd62d0fba5903cdd8226a6c0f261c
                      • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
                      APIs
                        • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                      • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
                      • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Window$Long$AttributesLayered
                      • String ID:
                      • API String ID: 2169480361-0
                      • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                      • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
                      • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                      • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
                      APIs
                        • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
                        • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
                        • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
                      • lstrlenW.KERNEL32(?), ref: 00434CF6
                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                      • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
                      • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: lstrcmpilstrcpylstrlen$_malloc
                      • String ID: cdecl
                      • API String ID: 3850814276-3896280584
                      • Opcode ID: c1d0e3fd88ced86f6f3832065c3908be80ab03c979ff4d6bcf24e5a7885ffd19
                      • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
                      • Opcode Fuzzy Hash: c1d0e3fd88ced86f6f3832065c3908be80ab03c979ff4d6bcf24e5a7885ffd19
                      • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
                      APIs
                        • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                      • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046D42D
                      • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
                      • _memmove.LIBCMT ref: 0046D475
                      • inet_ntoa.WSOCK32(?), ref: 0046D481
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
                      • String ID:
                      • API String ID: 2502553879-0
                      • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                      • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
                      • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                      • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
                      APIs
                      • SendMessageW.USER32 ref: 00448C69
                      • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
                      • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
                      • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessageSend$LongWindow
                      • String ID:
                      • API String ID: 312131281-0
                      • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                      • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
                      • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                      • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
                      APIs
                      • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
                      • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
                      • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
                      • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ErrorLastacceptselect
                      • String ID:
                      • API String ID: 385091864-0
                      • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                      • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
                      • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                      • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
                      APIs
                      • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessageSend
                      • String ID:
                      • API String ID: 3850602802-0
                      • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                      • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
                      • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                      • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
                      APIs
                      • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
                      • GetStockObject.GDI32(00000011), ref: 00430258
                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
                      • ShowWindow.USER32(00000000,00000000), ref: 0043027D
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Window$CreateMessageObjectSendShowStock
                      • String ID:
                      • API String ID: 1358664141-0
                      • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                      • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
                      • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                      • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
                      APIs
                      • GetCurrentThreadId.KERNEL32 ref: 00443CA6
                      • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
                      • CloseHandle.KERNEL32(00000000), ref: 00443CF9
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                      • String ID:
                      • API String ID: 2880819207-0
                      • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                      • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
                      • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                      • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
                      APIs
                      • GetWindowRect.USER32(?,?), ref: 00430BA2
                      • ScreenToClient.USER32(?,?), ref: 00430BC1
                      • ScreenToClient.USER32(?,?), ref: 00430BE2
                      • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ClientRectScreen$InvalidateWindow
                      • String ID:
                      • API String ID: 357397906-0
                      • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                      • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
                      • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                      • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
                      APIs
                      • __wsplitpath.LIBCMT ref: 0043392E
                        • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                      • __wsplitpath.LIBCMT ref: 00433950
                      • __wcsicoll.LIBCMT ref: 00433974
                      • __wcsicoll.LIBCMT ref: 0043398A
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                      • String ID:
                      • API String ID: 1187119602-0
                      • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                      • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
                      • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                      • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _wcslen$_malloc_wcscat_wcscpy
                      • String ID:
                      • API String ID: 1597257046-0
                      • Opcode ID: 15947565afd9da0c51d6b39d986381e9b8142da2aa4972dda906e7c054fe1a7b
                      • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
                      • Opcode Fuzzy Hash: 15947565afd9da0c51d6b39d986381e9b8142da2aa4972dda906e7c054fe1a7b
                      • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
                      APIs
                      • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
                      • __malloc_crt.LIBCMT ref: 0041F5B6
                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: EnvironmentStrings$Free__malloc_crt
                      • String ID:
                      • API String ID: 237123855-0
                      • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                      • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
                      • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                      • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: DeleteDestroyObject$IconWindow
                      • String ID:
                      • API String ID: 3349847261-0
                      • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                      • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
                      • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                      • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
                      APIs
                      • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
                      • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
                      • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
                      • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                      • String ID:
                      • API String ID: 2223660684-0
                      • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                      • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
                      • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                      • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
                      APIs
                        • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                        • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                        • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                      • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
                      • LineTo.GDI32(?,?,?), ref: 00447326
                      • EndPath.GDI32(?), ref: 00447336
                      • StrokePath.GDI32(?), ref: 00447344
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                      • String ID:
                      • API String ID: 2783949968-0
                      • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                      • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
                      • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                      • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
                      APIs
                      • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                      • GetCurrentThreadId.KERNEL32 ref: 004364A3
                      • AttachThreadInput.USER32(00000000), ref: 004364AA
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                      • String ID:
                      • API String ID: 2710830443-0
                      • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                      • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
                      • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                      • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
                      APIs
                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
                      • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
                      • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
                      • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
                        • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
                        • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                      • String ID:
                      • API String ID: 146765662-0
                      • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                      • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
                      • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                      • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
                      APIs
                      • GetDesktopWindow.USER32 ref: 00472B63
                      • GetDC.USER32(00000000), ref: 00472B6C
                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
                      • ReleaseDC.USER32(00000000,?), ref: 00472B99
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CapsDesktopDeviceReleaseWindow
                      • String ID:
                      • API String ID: 2889604237-0
                      • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                      • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
                      • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                      • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
                      APIs
                      • GetDesktopWindow.USER32 ref: 00472BB2
                      • GetDC.USER32(00000000), ref: 00472BBB
                      • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
                      • ReleaseDC.USER32(00000000,?), ref: 00472BE8
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CapsDesktopDeviceReleaseWindow
                      • String ID:
                      • API String ID: 2889604237-0
                      • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                      • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
                      • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                      • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
                      APIs
                      • __getptd_noexit.LIBCMT ref: 00415150
                        • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
                        • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
                        • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
                        • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
                        • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
                      • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
                      • __freeptd.LIBCMT ref: 0041516B
                      • ExitThread.KERNEL32 ref: 00415173
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
                      • String ID:
                      • API String ID: 1454798553-0
                      • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                      • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
                      • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                      • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _strncmp
                      • String ID: Q\E
                      • API String ID: 909875538-2189900498
                      • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                      • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
                      • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                      • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
                      APIs
                      • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                        • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
                        • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
                        • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
                      • String ID: AutoIt3GUI$Container
                      • API String ID: 2652923123-3941886329
                      • Opcode ID: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                      • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
                      • Opcode Fuzzy Hash: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                      • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _memmove_strncmp
                      • String ID: U$\
                      • API String ID: 2666721431-100911408
                      • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                      • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
                      • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                      • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
                      APIs
                        • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                        • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                      • __wcsnicmp.LIBCMT ref: 00467288
                      • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Connection__wcsnicmp_wcscpy_wcslen
                      • String ID: LPT
                      • API String ID: 3035604524-1350329615
                      • Opcode ID: d6ee32a1e65a10be59cd2aee46927f2afb98f966929ec107a83db754813dcd00
                      • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
                      • Opcode Fuzzy Hash: d6ee32a1e65a10be59cd2aee46927f2afb98f966929ec107a83db754813dcd00
                      • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _memmove
                      • String ID: \$h
                      • API String ID: 4104443479-677774858
                      • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                      • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
                      • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                      • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _memcmp
                      • String ID: &
                      • API String ID: 2931989736-1010288
                      • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                      • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
                      • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                      • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _memmove
                      • String ID: \
                      • API String ID: 4104443479-2967466578
                      • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                      • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
                      • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                      • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
                      APIs
                      • _wcslen.LIBCMT ref: 00466825
                      • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CrackInternet_wcslen
                      • String ID: |
                      • API String ID: 596671847-2343686810
                      • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                      • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
                      • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                      • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
                      APIs
                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessageSend
                      • String ID: '
                      • API String ID: 3850602802-1997036262
                      • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                      • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
                      • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                      • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
                      APIs
                      • _strlen.LIBCMT ref: 0040F858
                        • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
                        • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
                      • _sprintf.LIBCMT ref: 0040F9AE
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _memmove$_sprintf_strlen
                      • String ID: %02X
                      • API String ID: 1921645428-436463671
                      • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                      • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
                      • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                      • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
                      APIs
                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessageSend
                      • String ID: Combobox
                      • API String ID: 3850602802-2096851135
                      • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                      • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
                      • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                      • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
                      APIs
                      • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: LengthMessageSendTextWindow
                      • String ID: edit
                      • API String ID: 2978978980-2167791130
                      • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                      • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
                      • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                      • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
                      APIs
                      • Sleep.KERNEL32(00000000), ref: 00476CB0
                      • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: GlobalMemorySleepStatus
                      • String ID: @
                      • API String ID: 2783356886-2766056989
                      • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                      • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
                      • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                      • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: htonsinet_addr
                      • String ID: 255.255.255.255
                      • API String ID: 3832099526-2422070025
                      • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                      • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
                      • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                      • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
                      APIs
                      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: InternetOpen
                      • String ID: <local>
                      • API String ID: 2038078732-4266983199
                      • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                      • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
                      • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                      • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: __fread_nolock_memmove
                      • String ID: EA06
                      • API String ID: 1988441806-3962188686
                      • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                      • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
                      • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                      • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: _memmove
                      • String ID: u,D
                      • API String ID: 4104443479-3858472334
                      • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                      • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
                      • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                      • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
                      APIs
                      • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
                        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                      • wsprintfW.USER32 ref: 0045612A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: MessageSend_mallocwsprintf
                      • String ID: %d/%02d/%02d
                      • API String ID: 1262938277-328681919
                      • Opcode ID: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                      • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
                      • Opcode Fuzzy Hash: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                      • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
                      APIs
                      • InternetCloseHandle.WININET(?), ref: 00442663
                      • InternetCloseHandle.WININET ref: 00442668
                        • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: CloseHandleInternet$ObjectSingleWait
                      • String ID: aeB
                      • API String ID: 857135153-906807131
                      • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                      • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
                      • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                      • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
                      APIs
                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
                      • PostMessageW.USER32(00000000), ref: 00441C05
                        • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: FindMessagePostSleepWindow
                      • String ID: Shell_TrayWnd
                      • API String ID: 529655941-2988720461
                      • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                      • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
                      • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                      • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
                      APIs
                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
                      • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
                        • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: FindMessagePostSleepWindow
                      • String ID: Shell_TrayWnd
                      • API String ID: 529655941-2988720461
                      • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                      • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
                      • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                      • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
                      APIs
                      • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
                        • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2051766434.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2051749525.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051829076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051854247.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051867508.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051882407.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2051919463.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_114mCZlpa3.jbxd
                      Similarity
                      • API ID: Message_doexit
                      • String ID: AutoIt$Error allocating memory.
                      • API String ID: 1993061046-4017498283
                      • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                      • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
                      • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                      • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D