Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
gV3dy8Pfcp.exe

Overview

General Information

Sample name:gV3dy8Pfcp.exe
renamed because original name is a hash value
Original sample name:448d275dcea44de50f35e0cdec70f15757fbf37daeaae4715d188dcbcaa4d9fc.exe
Analysis ID:1530704
MD5:731f2c97a78525c4cffb48caa7ac9e73
SHA1:baa940d933b184a6f8001616e006cbbbc23c81e0
SHA256:448d275dcea44de50f35e0cdec70f15757fbf37daeaae4715d188dcbcaa4d9fc
Tags:exeuser-adrian__luca
Infos:

Detection

FormBook
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected FormBook
AI detected suspicious sample
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • gV3dy8Pfcp.exe (PID: 7076 cmdline: "C:\Users\user\Desktop\gV3dy8Pfcp.exe" MD5: 731F2C97A78525C4CFFB48CAA7AC9E73)
    • svchost.exe (PID: 6360 cmdline: "C:\Users\user\Desktop\gV3dy8Pfcp.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000001.00000002.1846791335.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000001.00000002.1846791335.0000000000400000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x2f223:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x172b2:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    00000001.00000002.1848117584.0000000003190000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000001.00000002.1848117584.0000000003190000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x2c010:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x1409f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      SourceRuleDescriptionAuthorStrings
      1.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        1.2.svchost.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
        • 0x2e423:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
        • 0x164b2:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
        1.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          1.2.svchost.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x2f223:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x172b2:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01

          System Summary

          barindex
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\gV3dy8Pfcp.exe", CommandLine: "C:\Users\user\Desktop\gV3dy8Pfcp.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\gV3dy8Pfcp.exe", ParentImage: C:\Users\user\Desktop\gV3dy8Pfcp.exe, ParentProcessId: 7076, ParentProcessName: gV3dy8Pfcp.exe, ProcessCommandLine: "C:\Users\user\Desktop\gV3dy8Pfcp.exe", ProcessId: 6360, ProcessName: svchost.exe
          Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\gV3dy8Pfcp.exe", CommandLine: "C:\Users\user\Desktop\gV3dy8Pfcp.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\gV3dy8Pfcp.exe", ParentImage: C:\Users\user\Desktop\gV3dy8Pfcp.exe, ParentProcessId: 7076, ParentProcessName: gV3dy8Pfcp.exe, ProcessCommandLine: "C:\Users\user\Desktop\gV3dy8Pfcp.exe", ProcessId: 6360, ProcessName: svchost.exe
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: gV3dy8Pfcp.exeReversingLabs: Detection: 71%
          Source: gV3dy8Pfcp.exeVirustotal: Detection: 54%Perma Link
          Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000001.00000002.1846791335.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.1848117584.0000000003190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: gV3dy8Pfcp.exeJoe Sandbox ML: detected
          Source: gV3dy8Pfcp.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: Binary string: wntdll.pdbUGP source: gV3dy8Pfcp.exe, 00000000.00000003.1714905592.0000000004600000.00000004.00001000.00020000.00000000.sdmp, gV3dy8Pfcp.exe, 00000000.00000003.1712624788.0000000004410000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1848366433.0000000003400000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1808195611.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1848366433.000000000359E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1810335842.0000000003200000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: gV3dy8Pfcp.exe, 00000000.00000003.1714905592.0000000004600000.00000004.00001000.00020000.00000000.sdmp, gV3dy8Pfcp.exe, 00000000.00000003.1712624788.0000000004410000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000002.1848366433.0000000003400000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1808195611.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1848366433.000000000359E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1810335842.0000000003200000.00000004.00000020.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000001.00000002.1846791335.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.1848117584.0000000003190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000001.00000002.1846791335.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000001.00000002.1848117584.0000000003190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0042C4E3 NtClose,1_2_0042C4E3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472B60 NtClose,LdrInitializeThunk,1_2_03472B60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472DF0 NtQuerySystemInformation,LdrInitializeThunk,1_2_03472DF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034735C0 NtCreateMutant,LdrInitializeThunk,1_2_034735C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03474340 NtSetContextThread,1_2_03474340
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03474650 NtSuspendThread,1_2_03474650
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472BE0 NtQueryValueKey,1_2_03472BE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472BF0 NtAllocateVirtualMemory,1_2_03472BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472B80 NtQueryInformationFile,1_2_03472B80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472BA0 NtEnumerateValueKey,1_2_03472BA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472AD0 NtReadFile,1_2_03472AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472AF0 NtWriteFile,1_2_03472AF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472AB0 NtWaitForSingleObject,1_2_03472AB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472F60 NtCreateProcessEx,1_2_03472F60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472F30 NtCreateSection,1_2_03472F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472FE0 NtCreateFile,1_2_03472FE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472F90 NtProtectVirtualMemory,1_2_03472F90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472FA0 NtQuerySection,1_2_03472FA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472FB0 NtResumeThread,1_2_03472FB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472E30 NtWriteVirtualMemory,1_2_03472E30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472EE0 NtQueueApcThread,1_2_03472EE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472E80 NtReadVirtualMemory,1_2_03472E80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472EA0 NtAdjustPrivilegesToken,1_2_03472EA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472D00 NtSetInformationFile,1_2_03472D00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472D10 NtMapViewOfSection,1_2_03472D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472D30 NtUnmapViewOfSection,1_2_03472D30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472DD0 NtDelayExecution,1_2_03472DD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472DB0 NtEnumerateKey,1_2_03472DB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472C60 NtCreateKey,1_2_03472C60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472C70 NtFreeVirtualMemory,1_2_03472C70
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472C00 NtQueryInformationProcess,1_2_03472C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472CC0 NtQueryVirtualMemory,1_2_03472CC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472CF0 NtOpenProcess,1_2_03472CF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472CA0 NtQueryInformationToken,1_2_03472CA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03473010 NtOpenDirectoryObject,1_2_03473010
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03473090 NtSetValueKey,1_2_03473090
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034739B0 NtGetContextThread,1_2_034739B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03473D70 NtOpenThread,1_2_03473D70
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03473D10 NtOpenProcessToken,1_2_03473D10
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_004096A00_2_004096A0
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0042200C0_2_0042200C
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0041A2170_2_0041A217
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_004122160_2_00412216
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0042435D0_2_0042435D
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_004033C00_2_004033C0
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0044F4300_2_0044F430
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_004125E80_2_004125E8
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0044663B0_2_0044663B
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_004138010_2_00413801
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0042096F0_2_0042096F
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_004129D00_2_004129D0
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_004119E30_2_004119E3
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0041C9AE0_2_0041C9AE
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0047EA6F0_2_0047EA6F
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0040FA100_2_0040FA10
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0044EB590_2_0044EB59
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_00423C810_2_00423C81
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_00411E780_2_00411E78
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_00442E0C0_2_00442E0C
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_00420EC00_2_00420EC0
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0044CF170_2_0044CF17
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_00444FD20_2_00444FD2
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_03F5C6300_2_03F5C630
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004011C01_2_004011C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0042EB131_2_0042EB13
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004023A01_2_004023A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040FC7A1_2_0040FC7A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040FC831_2_0040FC83
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004166231_2_00416623
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040FEA31_2_0040FEA3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004026AA1_2_004026AA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004026B01_2_004026B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00402F701_2_00402F70
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040DF231_2_0040DF23
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034FA3521_2_034FA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0344E3F01_2_0344E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_035003E61_2_035003E6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034E02741_2_034E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034C02C01_2_034C02C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034C81581_2_034C8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034301001_2_03430100
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034DA1181_2_034DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034F81CC1_2_034F81CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034F41A21_2_034F41A2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_035001AA1_2_035001AA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034D20001_2_034D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034647501_2_03464750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034407701_2_03440770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343C7C01_2_0343C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345C6E01_2_0345C6E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034405351_2_03440535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_035005911_2_03500591
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034F24461_2_034F2446
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034E44201_2_034E4420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034EE4F61_2_034EE4F6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034FAB401_2_034FAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034F6BD71_2_034F6BD7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343EA801_2_0343EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034569621_2_03456962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034429A01_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0350A9A61_2_0350A9A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0344A8401_2_0344A840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034428401_2_03442840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346E8F01_2_0346E8F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034268B81_2_034268B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B4F401_2_034B4F40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03482F281_2_03482F28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03460F301_2_03460F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034E2F301_2_034E2F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03432FC81_2_03432FC8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034BEFA01_2_034BEFA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03440E591_2_03440E59
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034FEE261_2_034FEE26
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034FEEDB1_2_034FEEDB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03452E901_2_03452E90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034FCE931_2_034FCE93
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0344AD001_2_0344AD00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034DCD1F1_2_034DCD1F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343ADE01_2_0343ADE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03458DBF1_2_03458DBF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03440C001_2_03440C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03430CF21_2_03430CF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034E0CB51_2_034E0CB5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0342D34C1_2_0342D34C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034F132D1_2_034F132D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0348739A1_2_0348739A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345B2C01_2_0345B2C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034E12ED1_2_034E12ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034452A01_2_034452A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0347516C1_2_0347516C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0342F1721_2_0342F172
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0350B16B1_2_0350B16B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0344B1B01_2_0344B1B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034EF0CC1_2_034EF0CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034470C01_2_034470C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034F70E91_2_034F70E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034FF0E01_2_034FF0E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034FF7B01_2_034FF7B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034856301_2_03485630
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034F16CC1_2_034F16CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034F75711_2_034F7571
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_035095C31_2_035095C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034DD5B01_2_034DD5B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034314601_2_03431460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034FF43F1_2_034FF43F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034FFB761_2_034FFB76
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B5BF01_2_034B5BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0347DBF91_2_0347DBF9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345FB801_2_0345FB80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034FFA491_2_034FFA49
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034F7A461_2_034F7A46
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B3A6C1_2_034B3A6C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034EDAC61_2_034EDAC6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034DDAAC1_2_034DDAAC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03485AA01_2_03485AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034E1AA31_2_034E1AA3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034499501_2_03449950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345B9501_2_0345B950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034D59101_2_034D5910
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034AD8001_2_034AD800
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034438E01_2_034438E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034FFF091_2_034FFF09
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03403FD21_2_03403FD2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03403FD51_2_03403FD5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03441F921_2_03441F92
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034FFFB11_2_034FFFB1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03449EB01_2_03449EB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03443D401_2_03443D40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034F1D5A1_2_034F1D5A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034F7D731_2_034F7D73
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345FDC01_2_0345FDC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B9C321_2_034B9C32
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034FFCF21_2_034FFCF2
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: String function: 004115D7 appears 36 times
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: String function: 00416C70 appears 39 times
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: String function: 00445AE0 appears 65 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 034BF290 appears 105 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 034AEA12 appears 86 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0342B970 appears 265 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03475130 appears 58 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03487E54 appears 108 times
          Source: gV3dy8Pfcp.exe, 00000000.00000003.1714721147.0000000004583000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs gV3dy8Pfcp.exe
          Source: gV3dy8Pfcp.exe, 00000000.00000003.1713256833.00000000046DD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs gV3dy8Pfcp.exe
          Source: gV3dy8Pfcp.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000001.00000002.1846791335.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000001.00000002.1848117584.0000000003190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: classification engineClassification label: mal84.troj.evad.winEXE@3/1@0/0
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0047839D CoInitialize,CoCreateInstance,CoUninitialize,0_2_0047839D
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeFile created: C:\Users\user\AppData\Local\Temp\niellistsJump to behavior
          Source: gV3dy8Pfcp.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: gV3dy8Pfcp.exeReversingLabs: Detection: 71%
          Source: gV3dy8Pfcp.exeVirustotal: Detection: 54%
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeFile read: C:\Users\user\Desktop\gV3dy8Pfcp.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\gV3dy8Pfcp.exe "C:\Users\user\Desktop\gV3dy8Pfcp.exe"
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\gV3dy8Pfcp.exe"
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\gV3dy8Pfcp.exe"Jump to behavior
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
          Source: gV3dy8Pfcp.exeStatic file information: File size 1324321 > 1048576
          Source: Binary string: wntdll.pdbUGP source: gV3dy8Pfcp.exe, 00000000.00000003.1714905592.0000000004600000.00000004.00001000.00020000.00000000.sdmp, gV3dy8Pfcp.exe, 00000000.00000003.1712624788.0000000004410000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1848366433.0000000003400000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1808195611.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1848366433.000000000359E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1810335842.0000000003200000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: gV3dy8Pfcp.exe, 00000000.00000003.1714905592.0000000004600000.00000004.00001000.00020000.00000000.sdmp, gV3dy8Pfcp.exe, 00000000.00000003.1712624788.0000000004410000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000002.1848366433.0000000003400000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1808195611.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1848366433.000000000359E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1810335842.0000000003200000.00000004.00000020.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
          Source: gV3dy8Pfcp.exeStatic PE information: real checksum: 0xa961f should be: 0x14597e
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_00462463 push edi; ret 0_2_00462465
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041F05B push esi; ret 1_2_0041F05E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041206B push ebx; ret 1_2_00412074
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00402011 push edx; iretd 1_2_00402032
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00407116 push esi; retf 1_2_00407117
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041A9D8 push ebp; retf 1_2_0041A9D9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00403210 push eax; ret 1_2_00403212
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00404334 push ebx; ret 1_2_00404335
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004143D7 pushfd ; ret 1_2_004143D8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00401BBB pushad ; retf 1_2_00401BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041A45F push esp; ret 1_2_0041A502
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041A463 push esp; ret 1_2_0041A502
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041640E push edi; iretd 1_2_00416429
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041A503 push esp; ret 1_2_0041A502
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00401DE7 push ds; ret 1_2_00401DF3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00411594 push es; ret 1_2_00411596
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00404E13 push edx; ret 1_2_00404E14
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00406690 push esp; iretd 1_2_00406691
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040A69A push ss; retf 1_2_0040A6A1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00411739 push edx; ret 1_2_0041173A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00401FC2 push eax; retf 1_2_00401FC5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00404FC3 push esp; iretd 1_2_00404FC4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0340225F pushad ; ret 1_2_034027F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034027FA pushad ; ret 1_2_034027F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034309AD push ecx; mov dword ptr [esp], ecx1_2_034309B6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0340283D push eax; iretd 1_2_03402858
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0340135E push eax; iretd 1_2_03401369
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeAPI/Special instruction interceptor: Address: 3F5C254
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0347096E rdtsc 1_2_0347096E
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-85717
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeAPI coverage: 3.7 %
          Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.6 %
          Source: C:\Windows\SysWOW64\svchost.exe TID: 6380Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeAPI call chain: ExitProcess graph end nodegraph_0-84843
          Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0347096E rdtsc 1_2_0347096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004175D3 LdrLoadDll,1_2_004175D3
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_03F5C520 mov eax, dword ptr fs:[00000030h]0_2_03F5C520
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_03F5C4C0 mov eax, dword ptr fs:[00000030h]0_2_03F5C4C0
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_03F5AE80 mov eax, dword ptr fs:[00000030h]0_2_03F5AE80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B2349 mov eax, dword ptr fs:[00000030h]1_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B2349 mov eax, dword ptr fs:[00000030h]1_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B2349 mov eax, dword ptr fs:[00000030h]1_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B2349 mov eax, dword ptr fs:[00000030h]1_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B2349 mov eax, dword ptr fs:[00000030h]1_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B2349 mov eax, dword ptr fs:[00000030h]1_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B2349 mov eax, dword ptr fs:[00000030h]1_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B2349 mov eax, dword ptr fs:[00000030h]1_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B2349 mov eax, dword ptr fs:[00000030h]1_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B2349 mov eax, dword ptr fs:[00000030h]1_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B2349 mov eax, dword ptr fs:[00000030h]1_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B2349 mov eax, dword ptr fs:[00000030h]1_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B2349 mov eax, dword ptr fs:[00000030h]1_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B2349 mov eax, dword ptr fs:[00000030h]1_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B2349 mov eax, dword ptr fs:[00000030h]1_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B035C mov eax, dword ptr fs:[00000030h]1_2_034B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B035C mov eax, dword ptr fs:[00000030h]1_2_034B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B035C mov eax, dword ptr fs:[00000030h]1_2_034B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B035C mov ecx, dword ptr fs:[00000030h]1_2_034B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B035C mov eax, dword ptr fs:[00000030h]1_2_034B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B035C mov eax, dword ptr fs:[00000030h]1_2_034B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034FA352 mov eax, dword ptr fs:[00000030h]1_2_034FA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034D8350 mov ecx, dword ptr fs:[00000030h]1_2_034D8350
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0350634F mov eax, dword ptr fs:[00000030h]1_2_0350634F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034D437C mov eax, dword ptr fs:[00000030h]1_2_034D437C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346A30B mov eax, dword ptr fs:[00000030h]1_2_0346A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346A30B mov eax, dword ptr fs:[00000030h]1_2_0346A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346A30B mov eax, dword ptr fs:[00000030h]1_2_0346A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0342C310 mov ecx, dword ptr fs:[00000030h]1_2_0342C310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03450310 mov ecx, dword ptr fs:[00000030h]1_2_03450310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03508324 mov eax, dword ptr fs:[00000030h]1_2_03508324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03508324 mov ecx, dword ptr fs:[00000030h]1_2_03508324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03508324 mov eax, dword ptr fs:[00000030h]1_2_03508324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03508324 mov eax, dword ptr fs:[00000030h]1_2_03508324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034EC3CD mov eax, dword ptr fs:[00000030h]1_2_034EC3CD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343A3C0 mov eax, dword ptr fs:[00000030h]1_2_0343A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343A3C0 mov eax, dword ptr fs:[00000030h]1_2_0343A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343A3C0 mov eax, dword ptr fs:[00000030h]1_2_0343A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343A3C0 mov eax, dword ptr fs:[00000030h]1_2_0343A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343A3C0 mov eax, dword ptr fs:[00000030h]1_2_0343A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343A3C0 mov eax, dword ptr fs:[00000030h]1_2_0343A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B63C0 mov eax, dword ptr fs:[00000030h]1_2_034B63C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034DE3DB mov eax, dword ptr fs:[00000030h]1_2_034DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034DE3DB mov eax, dword ptr fs:[00000030h]1_2_034DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034DE3DB mov ecx, dword ptr fs:[00000030h]1_2_034DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034DE3DB mov eax, dword ptr fs:[00000030h]1_2_034DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034D43D4 mov eax, dword ptr fs:[00000030h]1_2_034D43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034D43D4 mov eax, dword ptr fs:[00000030h]1_2_034D43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034403E9 mov eax, dword ptr fs:[00000030h]1_2_034403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034403E9 mov eax, dword ptr fs:[00000030h]1_2_034403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034403E9 mov eax, dword ptr fs:[00000030h]1_2_034403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034403E9 mov eax, dword ptr fs:[00000030h]1_2_034403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034403E9 mov eax, dword ptr fs:[00000030h]1_2_034403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034403E9 mov eax, dword ptr fs:[00000030h]1_2_034403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034403E9 mov eax, dword ptr fs:[00000030h]1_2_034403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034403E9 mov eax, dword ptr fs:[00000030h]1_2_034403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0344E3F0 mov eax, dword ptr fs:[00000030h]1_2_0344E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0344E3F0 mov eax, dword ptr fs:[00000030h]1_2_0344E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0344E3F0 mov eax, dword ptr fs:[00000030h]1_2_0344E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034663FF mov eax, dword ptr fs:[00000030h]1_2_034663FF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0342E388 mov eax, dword ptr fs:[00000030h]1_2_0342E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0342E388 mov eax, dword ptr fs:[00000030h]1_2_0342E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0342E388 mov eax, dword ptr fs:[00000030h]1_2_0342E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345438F mov eax, dword ptr fs:[00000030h]1_2_0345438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345438F mov eax, dword ptr fs:[00000030h]1_2_0345438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03428397 mov eax, dword ptr fs:[00000030h]1_2_03428397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03428397 mov eax, dword ptr fs:[00000030h]1_2_03428397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03428397 mov eax, dword ptr fs:[00000030h]1_2_03428397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B8243 mov eax, dword ptr fs:[00000030h]1_2_034B8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B8243 mov ecx, dword ptr fs:[00000030h]1_2_034B8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0350625D mov eax, dword ptr fs:[00000030h]1_2_0350625D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0342A250 mov eax, dword ptr fs:[00000030h]1_2_0342A250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03436259 mov eax, dword ptr fs:[00000030h]1_2_03436259
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034EA250 mov eax, dword ptr fs:[00000030h]1_2_034EA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034EA250 mov eax, dword ptr fs:[00000030h]1_2_034EA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03434260 mov eax, dword ptr fs:[00000030h]1_2_03434260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03434260 mov eax, dword ptr fs:[00000030h]1_2_03434260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03434260 mov eax, dword ptr fs:[00000030h]1_2_03434260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0342826B mov eax, dword ptr fs:[00000030h]1_2_0342826B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034E0274 mov eax, dword ptr fs:[00000030h]1_2_034E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034E0274 mov eax, dword ptr fs:[00000030h]1_2_034E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034E0274 mov eax, dword ptr fs:[00000030h]1_2_034E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034E0274 mov eax, dword ptr fs:[00000030h]1_2_034E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034E0274 mov eax, dword ptr fs:[00000030h]1_2_034E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034E0274 mov eax, dword ptr fs:[00000030h]1_2_034E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034E0274 mov eax, dword ptr fs:[00000030h]1_2_034E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034E0274 mov eax, dword ptr fs:[00000030h]1_2_034E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034E0274 mov eax, dword ptr fs:[00000030h]1_2_034E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034E0274 mov eax, dword ptr fs:[00000030h]1_2_034E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034E0274 mov eax, dword ptr fs:[00000030h]1_2_034E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034E0274 mov eax, dword ptr fs:[00000030h]1_2_034E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0342823B mov eax, dword ptr fs:[00000030h]1_2_0342823B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343A2C3 mov eax, dword ptr fs:[00000030h]1_2_0343A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343A2C3 mov eax, dword ptr fs:[00000030h]1_2_0343A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343A2C3 mov eax, dword ptr fs:[00000030h]1_2_0343A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343A2C3 mov eax, dword ptr fs:[00000030h]1_2_0343A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343A2C3 mov eax, dword ptr fs:[00000030h]1_2_0343A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_035062D6 mov eax, dword ptr fs:[00000030h]1_2_035062D6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034402E1 mov eax, dword ptr fs:[00000030h]1_2_034402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034402E1 mov eax, dword ptr fs:[00000030h]1_2_034402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034402E1 mov eax, dword ptr fs:[00000030h]1_2_034402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346E284 mov eax, dword ptr fs:[00000030h]1_2_0346E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346E284 mov eax, dword ptr fs:[00000030h]1_2_0346E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B0283 mov eax, dword ptr fs:[00000030h]1_2_034B0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B0283 mov eax, dword ptr fs:[00000030h]1_2_034B0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B0283 mov eax, dword ptr fs:[00000030h]1_2_034B0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034402A0 mov eax, dword ptr fs:[00000030h]1_2_034402A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034402A0 mov eax, dword ptr fs:[00000030h]1_2_034402A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034C62A0 mov eax, dword ptr fs:[00000030h]1_2_034C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034C62A0 mov ecx, dword ptr fs:[00000030h]1_2_034C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034C62A0 mov eax, dword ptr fs:[00000030h]1_2_034C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034C62A0 mov eax, dword ptr fs:[00000030h]1_2_034C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034C62A0 mov eax, dword ptr fs:[00000030h]1_2_034C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034C62A0 mov eax, dword ptr fs:[00000030h]1_2_034C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034C4144 mov eax, dword ptr fs:[00000030h]1_2_034C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034C4144 mov eax, dword ptr fs:[00000030h]1_2_034C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034C4144 mov ecx, dword ptr fs:[00000030h]1_2_034C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034C4144 mov eax, dword ptr fs:[00000030h]1_2_034C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034C4144 mov eax, dword ptr fs:[00000030h]1_2_034C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0342C156 mov eax, dword ptr fs:[00000030h]1_2_0342C156
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034C8158 mov eax, dword ptr fs:[00000030h]1_2_034C8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03436154 mov eax, dword ptr fs:[00000030h]1_2_03436154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03436154 mov eax, dword ptr fs:[00000030h]1_2_03436154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03504164 mov eax, dword ptr fs:[00000030h]1_2_03504164
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03504164 mov eax, dword ptr fs:[00000030h]1_2_03504164
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034DE10E mov eax, dword ptr fs:[00000030h]1_2_034DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034DE10E mov ecx, dword ptr fs:[00000030h]1_2_034DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034DE10E mov eax, dword ptr fs:[00000030h]1_2_034DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034DE10E mov eax, dword ptr fs:[00000030h]1_2_034DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034DE10E mov ecx, dword ptr fs:[00000030h]1_2_034DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034DE10E mov eax, dword ptr fs:[00000030h]1_2_034DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034DE10E mov eax, dword ptr fs:[00000030h]1_2_034DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034DE10E mov ecx, dword ptr fs:[00000030h]1_2_034DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034DE10E mov eax, dword ptr fs:[00000030h]1_2_034DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034DE10E mov ecx, dword ptr fs:[00000030h]1_2_034DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034DA118 mov ecx, dword ptr fs:[00000030h]1_2_034DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034DA118 mov eax, dword ptr fs:[00000030h]1_2_034DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034DA118 mov eax, dword ptr fs:[00000030h]1_2_034DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034DA118 mov eax, dword ptr fs:[00000030h]1_2_034DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034F0115 mov eax, dword ptr fs:[00000030h]1_2_034F0115
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03460124 mov eax, dword ptr fs:[00000030h]1_2_03460124
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034F61C3 mov eax, dword ptr fs:[00000030h]1_2_034F61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034F61C3 mov eax, dword ptr fs:[00000030h]1_2_034F61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034AE1D0 mov eax, dword ptr fs:[00000030h]1_2_034AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034AE1D0 mov eax, dword ptr fs:[00000030h]1_2_034AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034AE1D0 mov ecx, dword ptr fs:[00000030h]1_2_034AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034AE1D0 mov eax, dword ptr fs:[00000030h]1_2_034AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034AE1D0 mov eax, dword ptr fs:[00000030h]1_2_034AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_035061E5 mov eax, dword ptr fs:[00000030h]1_2_035061E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034601F8 mov eax, dword ptr fs:[00000030h]1_2_034601F8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03470185 mov eax, dword ptr fs:[00000030h]1_2_03470185
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034EC188 mov eax, dword ptr fs:[00000030h]1_2_034EC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034EC188 mov eax, dword ptr fs:[00000030h]1_2_034EC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034D4180 mov eax, dword ptr fs:[00000030h]1_2_034D4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034D4180 mov eax, dword ptr fs:[00000030h]1_2_034D4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B019F mov eax, dword ptr fs:[00000030h]1_2_034B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B019F mov eax, dword ptr fs:[00000030h]1_2_034B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B019F mov eax, dword ptr fs:[00000030h]1_2_034B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B019F mov eax, dword ptr fs:[00000030h]1_2_034B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0342A197 mov eax, dword ptr fs:[00000030h]1_2_0342A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0342A197 mov eax, dword ptr fs:[00000030h]1_2_0342A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0342A197 mov eax, dword ptr fs:[00000030h]1_2_0342A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03432050 mov eax, dword ptr fs:[00000030h]1_2_03432050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B6050 mov eax, dword ptr fs:[00000030h]1_2_034B6050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345C073 mov eax, dword ptr fs:[00000030h]1_2_0345C073
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B4000 mov ecx, dword ptr fs:[00000030h]1_2_034B4000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034D2000 mov eax, dword ptr fs:[00000030h]1_2_034D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034D2000 mov eax, dword ptr fs:[00000030h]1_2_034D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034D2000 mov eax, dword ptr fs:[00000030h]1_2_034D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034D2000 mov eax, dword ptr fs:[00000030h]1_2_034D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034D2000 mov eax, dword ptr fs:[00000030h]1_2_034D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034D2000 mov eax, dword ptr fs:[00000030h]1_2_034D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034D2000 mov eax, dword ptr fs:[00000030h]1_2_034D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034D2000 mov eax, dword ptr fs:[00000030h]1_2_034D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0344E016 mov eax, dword ptr fs:[00000030h]1_2_0344E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0344E016 mov eax, dword ptr fs:[00000030h]1_2_0344E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0344E016 mov eax, dword ptr fs:[00000030h]1_2_0344E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0344E016 mov eax, dword ptr fs:[00000030h]1_2_0344E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0342A020 mov eax, dword ptr fs:[00000030h]1_2_0342A020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0342C020 mov eax, dword ptr fs:[00000030h]1_2_0342C020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034C6030 mov eax, dword ptr fs:[00000030h]1_2_034C6030
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B20DE mov eax, dword ptr fs:[00000030h]1_2_034B20DE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0342A0E3 mov ecx, dword ptr fs:[00000030h]1_2_0342A0E3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034380E9 mov eax, dword ptr fs:[00000030h]1_2_034380E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B60E0 mov eax, dword ptr fs:[00000030h]1_2_034B60E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0342C0F0 mov eax, dword ptr fs:[00000030h]1_2_0342C0F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034720F0 mov ecx, dword ptr fs:[00000030h]1_2_034720F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343208A mov eax, dword ptr fs:[00000030h]1_2_0343208A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034280A0 mov eax, dword ptr fs:[00000030h]1_2_034280A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034C80A8 mov eax, dword ptr fs:[00000030h]1_2_034C80A8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034F60B8 mov eax, dword ptr fs:[00000030h]1_2_034F60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034F60B8 mov ecx, dword ptr fs:[00000030h]1_2_034F60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346674D mov esi, dword ptr fs:[00000030h]1_2_0346674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346674D mov eax, dword ptr fs:[00000030h]1_2_0346674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346674D mov eax, dword ptr fs:[00000030h]1_2_0346674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03430750 mov eax, dword ptr fs:[00000030h]1_2_03430750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034BE75D mov eax, dword ptr fs:[00000030h]1_2_034BE75D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472750 mov eax, dword ptr fs:[00000030h]1_2_03472750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472750 mov eax, dword ptr fs:[00000030h]1_2_03472750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B4755 mov eax, dword ptr fs:[00000030h]1_2_034B4755
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03438770 mov eax, dword ptr fs:[00000030h]1_2_03438770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03440770 mov eax, dword ptr fs:[00000030h]1_2_03440770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03440770 mov eax, dword ptr fs:[00000030h]1_2_03440770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03440770 mov eax, dword ptr fs:[00000030h]1_2_03440770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03440770 mov eax, dword ptr fs:[00000030h]1_2_03440770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03440770 mov eax, dword ptr fs:[00000030h]1_2_03440770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03440770 mov eax, dword ptr fs:[00000030h]1_2_03440770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03440770 mov eax, dword ptr fs:[00000030h]1_2_03440770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03440770 mov eax, dword ptr fs:[00000030h]1_2_03440770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03440770 mov eax, dword ptr fs:[00000030h]1_2_03440770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03440770 mov eax, dword ptr fs:[00000030h]1_2_03440770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03440770 mov eax, dword ptr fs:[00000030h]1_2_03440770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03440770 mov eax, dword ptr fs:[00000030h]1_2_03440770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346C700 mov eax, dword ptr fs:[00000030h]1_2_0346C700
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03430710 mov eax, dword ptr fs:[00000030h]1_2_03430710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03460710 mov eax, dword ptr fs:[00000030h]1_2_03460710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346C720 mov eax, dword ptr fs:[00000030h]1_2_0346C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346C720 mov eax, dword ptr fs:[00000030h]1_2_0346C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346273C mov eax, dword ptr fs:[00000030h]1_2_0346273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346273C mov ecx, dword ptr fs:[00000030h]1_2_0346273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346273C mov eax, dword ptr fs:[00000030h]1_2_0346273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034AC730 mov eax, dword ptr fs:[00000030h]1_2_034AC730
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343C7C0 mov eax, dword ptr fs:[00000030h]1_2_0343C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B07C3 mov eax, dword ptr fs:[00000030h]1_2_034B07C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034527ED mov eax, dword ptr fs:[00000030h]1_2_034527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034527ED mov eax, dword ptr fs:[00000030h]1_2_034527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034527ED mov eax, dword ptr fs:[00000030h]1_2_034527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034BE7E1 mov eax, dword ptr fs:[00000030h]1_2_034BE7E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034347FB mov eax, dword ptr fs:[00000030h]1_2_034347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034347FB mov eax, dword ptr fs:[00000030h]1_2_034347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034D678E mov eax, dword ptr fs:[00000030h]1_2_034D678E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034307AF mov eax, dword ptr fs:[00000030h]1_2_034307AF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034E47A0 mov eax, dword ptr fs:[00000030h]1_2_034E47A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0344C640 mov eax, dword ptr fs:[00000030h]1_2_0344C640
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034F866E mov eax, dword ptr fs:[00000030h]1_2_034F866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034F866E mov eax, dword ptr fs:[00000030h]1_2_034F866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346A660 mov eax, dword ptr fs:[00000030h]1_2_0346A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346A660 mov eax, dword ptr fs:[00000030h]1_2_0346A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03462674 mov eax, dword ptr fs:[00000030h]1_2_03462674
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034AE609 mov eax, dword ptr fs:[00000030h]1_2_034AE609
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0344260B mov eax, dword ptr fs:[00000030h]1_2_0344260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0344260B mov eax, dword ptr fs:[00000030h]1_2_0344260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0344260B mov eax, dword ptr fs:[00000030h]1_2_0344260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0344260B mov eax, dword ptr fs:[00000030h]1_2_0344260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0344260B mov eax, dword ptr fs:[00000030h]1_2_0344260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0344260B mov eax, dword ptr fs:[00000030h]1_2_0344260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0344260B mov eax, dword ptr fs:[00000030h]1_2_0344260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03472619 mov eax, dword ptr fs:[00000030h]1_2_03472619
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0344E627 mov eax, dword ptr fs:[00000030h]1_2_0344E627
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03466620 mov eax, dword ptr fs:[00000030h]1_2_03466620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03468620 mov eax, dword ptr fs:[00000030h]1_2_03468620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343262C mov eax, dword ptr fs:[00000030h]1_2_0343262C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346A6C7 mov ebx, dword ptr fs:[00000030h]1_2_0346A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346A6C7 mov eax, dword ptr fs:[00000030h]1_2_0346A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034AE6F2 mov eax, dword ptr fs:[00000030h]1_2_034AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034AE6F2 mov eax, dword ptr fs:[00000030h]1_2_034AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034AE6F2 mov eax, dword ptr fs:[00000030h]1_2_034AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034AE6F2 mov eax, dword ptr fs:[00000030h]1_2_034AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B06F1 mov eax, dword ptr fs:[00000030h]1_2_034B06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B06F1 mov eax, dword ptr fs:[00000030h]1_2_034B06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03434690 mov eax, dword ptr fs:[00000030h]1_2_03434690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03434690 mov eax, dword ptr fs:[00000030h]1_2_03434690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346C6A6 mov eax, dword ptr fs:[00000030h]1_2_0346C6A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034666B0 mov eax, dword ptr fs:[00000030h]1_2_034666B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03438550 mov eax, dword ptr fs:[00000030h]1_2_03438550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03438550 mov eax, dword ptr fs:[00000030h]1_2_03438550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346656A mov eax, dword ptr fs:[00000030h]1_2_0346656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346656A mov eax, dword ptr fs:[00000030h]1_2_0346656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346656A mov eax, dword ptr fs:[00000030h]1_2_0346656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034C6500 mov eax, dword ptr fs:[00000030h]1_2_034C6500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03504500 mov eax, dword ptr fs:[00000030h]1_2_03504500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03504500 mov eax, dword ptr fs:[00000030h]1_2_03504500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03504500 mov eax, dword ptr fs:[00000030h]1_2_03504500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03504500 mov eax, dword ptr fs:[00000030h]1_2_03504500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03504500 mov eax, dword ptr fs:[00000030h]1_2_03504500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03504500 mov eax, dword ptr fs:[00000030h]1_2_03504500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03504500 mov eax, dword ptr fs:[00000030h]1_2_03504500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03440535 mov eax, dword ptr fs:[00000030h]1_2_03440535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03440535 mov eax, dword ptr fs:[00000030h]1_2_03440535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03440535 mov eax, dword ptr fs:[00000030h]1_2_03440535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03440535 mov eax, dword ptr fs:[00000030h]1_2_03440535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03440535 mov eax, dword ptr fs:[00000030h]1_2_03440535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03440535 mov eax, dword ptr fs:[00000030h]1_2_03440535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345E53E mov eax, dword ptr fs:[00000030h]1_2_0345E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345E53E mov eax, dword ptr fs:[00000030h]1_2_0345E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345E53E mov eax, dword ptr fs:[00000030h]1_2_0345E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345E53E mov eax, dword ptr fs:[00000030h]1_2_0345E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345E53E mov eax, dword ptr fs:[00000030h]1_2_0345E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346E5CF mov eax, dword ptr fs:[00000030h]1_2_0346E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346E5CF mov eax, dword ptr fs:[00000030h]1_2_0346E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034365D0 mov eax, dword ptr fs:[00000030h]1_2_034365D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346A5D0 mov eax, dword ptr fs:[00000030h]1_2_0346A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346A5D0 mov eax, dword ptr fs:[00000030h]1_2_0346A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345E5E7 mov eax, dword ptr fs:[00000030h]1_2_0345E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345E5E7 mov eax, dword ptr fs:[00000030h]1_2_0345E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345E5E7 mov eax, dword ptr fs:[00000030h]1_2_0345E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345E5E7 mov eax, dword ptr fs:[00000030h]1_2_0345E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345E5E7 mov eax, dword ptr fs:[00000030h]1_2_0345E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345E5E7 mov eax, dword ptr fs:[00000030h]1_2_0345E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345E5E7 mov eax, dword ptr fs:[00000030h]1_2_0345E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345E5E7 mov eax, dword ptr fs:[00000030h]1_2_0345E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034325E0 mov eax, dword ptr fs:[00000030h]1_2_034325E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346C5ED mov eax, dword ptr fs:[00000030h]1_2_0346C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346C5ED mov eax, dword ptr fs:[00000030h]1_2_0346C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03432582 mov eax, dword ptr fs:[00000030h]1_2_03432582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03432582 mov ecx, dword ptr fs:[00000030h]1_2_03432582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03464588 mov eax, dword ptr fs:[00000030h]1_2_03464588
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346E59C mov eax, dword ptr fs:[00000030h]1_2_0346E59C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B05A7 mov eax, dword ptr fs:[00000030h]1_2_034B05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B05A7 mov eax, dword ptr fs:[00000030h]1_2_034B05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B05A7 mov eax, dword ptr fs:[00000030h]1_2_034B05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034545B1 mov eax, dword ptr fs:[00000030h]1_2_034545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034545B1 mov eax, dword ptr fs:[00000030h]1_2_034545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346E443 mov eax, dword ptr fs:[00000030h]1_2_0346E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346E443 mov eax, dword ptr fs:[00000030h]1_2_0346E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346E443 mov eax, dword ptr fs:[00000030h]1_2_0346E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346E443 mov eax, dword ptr fs:[00000030h]1_2_0346E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346E443 mov eax, dword ptr fs:[00000030h]1_2_0346E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346E443 mov eax, dword ptr fs:[00000030h]1_2_0346E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346E443 mov eax, dword ptr fs:[00000030h]1_2_0346E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346E443 mov eax, dword ptr fs:[00000030h]1_2_0346E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034EA456 mov eax, dword ptr fs:[00000030h]1_2_034EA456
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0342645D mov eax, dword ptr fs:[00000030h]1_2_0342645D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345245A mov eax, dword ptr fs:[00000030h]1_2_0345245A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034BC460 mov ecx, dword ptr fs:[00000030h]1_2_034BC460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345A470 mov eax, dword ptr fs:[00000030h]1_2_0345A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345A470 mov eax, dword ptr fs:[00000030h]1_2_0345A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345A470 mov eax, dword ptr fs:[00000030h]1_2_0345A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0342E420 mov eax, dword ptr fs:[00000030h]1_2_0342E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0342E420 mov eax, dword ptr fs:[00000030h]1_2_0342E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0342E420 mov eax, dword ptr fs:[00000030h]1_2_0342E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0342C427 mov eax, dword ptr fs:[00000030h]1_2_0342C427
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B6420 mov eax, dword ptr fs:[00000030h]1_2_034B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B6420 mov eax, dword ptr fs:[00000030h]1_2_034B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B6420 mov eax, dword ptr fs:[00000030h]1_2_034B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B6420 mov eax, dword ptr fs:[00000030h]1_2_034B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B6420 mov eax, dword ptr fs:[00000030h]1_2_034B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B6420 mov eax, dword ptr fs:[00000030h]1_2_034B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B6420 mov eax, dword ptr fs:[00000030h]1_2_034B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346A430 mov eax, dword ptr fs:[00000030h]1_2_0346A430
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034304E5 mov ecx, dword ptr fs:[00000030h]1_2_034304E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034EA49A mov eax, dword ptr fs:[00000030h]1_2_034EA49A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034364AB mov eax, dword ptr fs:[00000030h]1_2_034364AB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034644B0 mov ecx, dword ptr fs:[00000030h]1_2_034644B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034BA4B0 mov eax, dword ptr fs:[00000030h]1_2_034BA4B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034E4B4B mov eax, dword ptr fs:[00000030h]1_2_034E4B4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034E4B4B mov eax, dword ptr fs:[00000030h]1_2_034E4B4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03502B57 mov eax, dword ptr fs:[00000030h]1_2_03502B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03502B57 mov eax, dword ptr fs:[00000030h]1_2_03502B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03502B57 mov eax, dword ptr fs:[00000030h]1_2_03502B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03502B57 mov eax, dword ptr fs:[00000030h]1_2_03502B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034C6B40 mov eax, dword ptr fs:[00000030h]1_2_034C6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034C6B40 mov eax, dword ptr fs:[00000030h]1_2_034C6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034FAB40 mov eax, dword ptr fs:[00000030h]1_2_034FAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034D8B42 mov eax, dword ptr fs:[00000030h]1_2_034D8B42
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03428B50 mov eax, dword ptr fs:[00000030h]1_2_03428B50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034DEB50 mov eax, dword ptr fs:[00000030h]1_2_034DEB50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0342CB7E mov eax, dword ptr fs:[00000030h]1_2_0342CB7E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03504B00 mov eax, dword ptr fs:[00000030h]1_2_03504B00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034AEB1D mov eax, dword ptr fs:[00000030h]1_2_034AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034AEB1D mov eax, dword ptr fs:[00000030h]1_2_034AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034AEB1D mov eax, dword ptr fs:[00000030h]1_2_034AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034AEB1D mov eax, dword ptr fs:[00000030h]1_2_034AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034AEB1D mov eax, dword ptr fs:[00000030h]1_2_034AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034AEB1D mov eax, dword ptr fs:[00000030h]1_2_034AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034AEB1D mov eax, dword ptr fs:[00000030h]1_2_034AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034AEB1D mov eax, dword ptr fs:[00000030h]1_2_034AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034AEB1D mov eax, dword ptr fs:[00000030h]1_2_034AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345EB20 mov eax, dword ptr fs:[00000030h]1_2_0345EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345EB20 mov eax, dword ptr fs:[00000030h]1_2_0345EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034F8B28 mov eax, dword ptr fs:[00000030h]1_2_034F8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034F8B28 mov eax, dword ptr fs:[00000030h]1_2_034F8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03450BCB mov eax, dword ptr fs:[00000030h]1_2_03450BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03450BCB mov eax, dword ptr fs:[00000030h]1_2_03450BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03450BCB mov eax, dword ptr fs:[00000030h]1_2_03450BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03430BCD mov eax, dword ptr fs:[00000030h]1_2_03430BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03430BCD mov eax, dword ptr fs:[00000030h]1_2_03430BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03430BCD mov eax, dword ptr fs:[00000030h]1_2_03430BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034DEBD0 mov eax, dword ptr fs:[00000030h]1_2_034DEBD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03438BF0 mov eax, dword ptr fs:[00000030h]1_2_03438BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03438BF0 mov eax, dword ptr fs:[00000030h]1_2_03438BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03438BF0 mov eax, dword ptr fs:[00000030h]1_2_03438BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345EBFC mov eax, dword ptr fs:[00000030h]1_2_0345EBFC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034BCBF0 mov eax, dword ptr fs:[00000030h]1_2_034BCBF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03440BBE mov eax, dword ptr fs:[00000030h]1_2_03440BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03440BBE mov eax, dword ptr fs:[00000030h]1_2_03440BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034E4BB0 mov eax, dword ptr fs:[00000030h]1_2_034E4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034E4BB0 mov eax, dword ptr fs:[00000030h]1_2_034E4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03436A50 mov eax, dword ptr fs:[00000030h]1_2_03436A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03436A50 mov eax, dword ptr fs:[00000030h]1_2_03436A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03436A50 mov eax, dword ptr fs:[00000030h]1_2_03436A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03436A50 mov eax, dword ptr fs:[00000030h]1_2_03436A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03436A50 mov eax, dword ptr fs:[00000030h]1_2_03436A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03436A50 mov eax, dword ptr fs:[00000030h]1_2_03436A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03436A50 mov eax, dword ptr fs:[00000030h]1_2_03436A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03440A5B mov eax, dword ptr fs:[00000030h]1_2_03440A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03440A5B mov eax, dword ptr fs:[00000030h]1_2_03440A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346CA6F mov eax, dword ptr fs:[00000030h]1_2_0346CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346CA6F mov eax, dword ptr fs:[00000030h]1_2_0346CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346CA6F mov eax, dword ptr fs:[00000030h]1_2_0346CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034DEA60 mov eax, dword ptr fs:[00000030h]1_2_034DEA60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034ACA72 mov eax, dword ptr fs:[00000030h]1_2_034ACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034ACA72 mov eax, dword ptr fs:[00000030h]1_2_034ACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034BCA11 mov eax, dword ptr fs:[00000030h]1_2_034BCA11
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346CA24 mov eax, dword ptr fs:[00000030h]1_2_0346CA24
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0345EA2E mov eax, dword ptr fs:[00000030h]1_2_0345EA2E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03454A35 mov eax, dword ptr fs:[00000030h]1_2_03454A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03454A35 mov eax, dword ptr fs:[00000030h]1_2_03454A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346CA38 mov eax, dword ptr fs:[00000030h]1_2_0346CA38
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03486ACC mov eax, dword ptr fs:[00000030h]1_2_03486ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03486ACC mov eax, dword ptr fs:[00000030h]1_2_03486ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03486ACC mov eax, dword ptr fs:[00000030h]1_2_03486ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03430AD0 mov eax, dword ptr fs:[00000030h]1_2_03430AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03464AD0 mov eax, dword ptr fs:[00000030h]1_2_03464AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03464AD0 mov eax, dword ptr fs:[00000030h]1_2_03464AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346AAEE mov eax, dword ptr fs:[00000030h]1_2_0346AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346AAEE mov eax, dword ptr fs:[00000030h]1_2_0346AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343EA80 mov eax, dword ptr fs:[00000030h]1_2_0343EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343EA80 mov eax, dword ptr fs:[00000030h]1_2_0343EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343EA80 mov eax, dword ptr fs:[00000030h]1_2_0343EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343EA80 mov eax, dword ptr fs:[00000030h]1_2_0343EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343EA80 mov eax, dword ptr fs:[00000030h]1_2_0343EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343EA80 mov eax, dword ptr fs:[00000030h]1_2_0343EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343EA80 mov eax, dword ptr fs:[00000030h]1_2_0343EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343EA80 mov eax, dword ptr fs:[00000030h]1_2_0343EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343EA80 mov eax, dword ptr fs:[00000030h]1_2_0343EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03504A80 mov eax, dword ptr fs:[00000030h]1_2_03504A80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03468A90 mov edx, dword ptr fs:[00000030h]1_2_03468A90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03438AA0 mov eax, dword ptr fs:[00000030h]1_2_03438AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03438AA0 mov eax, dword ptr fs:[00000030h]1_2_03438AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03486AA4 mov eax, dword ptr fs:[00000030h]1_2_03486AA4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B0946 mov eax, dword ptr fs:[00000030h]1_2_034B0946
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03504940 mov eax, dword ptr fs:[00000030h]1_2_03504940
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03456962 mov eax, dword ptr fs:[00000030h]1_2_03456962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03456962 mov eax, dword ptr fs:[00000030h]1_2_03456962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03456962 mov eax, dword ptr fs:[00000030h]1_2_03456962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0347096E mov eax, dword ptr fs:[00000030h]1_2_0347096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0347096E mov edx, dword ptr fs:[00000030h]1_2_0347096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0347096E mov eax, dword ptr fs:[00000030h]1_2_0347096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034D4978 mov eax, dword ptr fs:[00000030h]1_2_034D4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034D4978 mov eax, dword ptr fs:[00000030h]1_2_034D4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034BC97C mov eax, dword ptr fs:[00000030h]1_2_034BC97C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034AE908 mov eax, dword ptr fs:[00000030h]1_2_034AE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034AE908 mov eax, dword ptr fs:[00000030h]1_2_034AE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034BC912 mov eax, dword ptr fs:[00000030h]1_2_034BC912
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03428918 mov eax, dword ptr fs:[00000030h]1_2_03428918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03428918 mov eax, dword ptr fs:[00000030h]1_2_03428918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B892A mov eax, dword ptr fs:[00000030h]1_2_034B892A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034C892B mov eax, dword ptr fs:[00000030h]1_2_034C892B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034C69C0 mov eax, dword ptr fs:[00000030h]1_2_034C69C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343A9D0 mov eax, dword ptr fs:[00000030h]1_2_0343A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343A9D0 mov eax, dword ptr fs:[00000030h]1_2_0343A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343A9D0 mov eax, dword ptr fs:[00000030h]1_2_0343A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343A9D0 mov eax, dword ptr fs:[00000030h]1_2_0343A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343A9D0 mov eax, dword ptr fs:[00000030h]1_2_0343A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0343A9D0 mov eax, dword ptr fs:[00000030h]1_2_0343A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034649D0 mov eax, dword ptr fs:[00000030h]1_2_034649D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034FA9D3 mov eax, dword ptr fs:[00000030h]1_2_034FA9D3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034BE9E0 mov eax, dword ptr fs:[00000030h]1_2_034BE9E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034629F9 mov eax, dword ptr fs:[00000030h]1_2_034629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034629F9 mov eax, dword ptr fs:[00000030h]1_2_034629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034429A0 mov eax, dword ptr fs:[00000030h]1_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034429A0 mov eax, dword ptr fs:[00000030h]1_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034429A0 mov eax, dword ptr fs:[00000030h]1_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034429A0 mov eax, dword ptr fs:[00000030h]1_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034429A0 mov eax, dword ptr fs:[00000030h]1_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034429A0 mov eax, dword ptr fs:[00000030h]1_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034429A0 mov eax, dword ptr fs:[00000030h]1_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034429A0 mov eax, dword ptr fs:[00000030h]1_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034429A0 mov eax, dword ptr fs:[00000030h]1_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034429A0 mov eax, dword ptr fs:[00000030h]1_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034429A0 mov eax, dword ptr fs:[00000030h]1_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034429A0 mov eax, dword ptr fs:[00000030h]1_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034429A0 mov eax, dword ptr fs:[00000030h]1_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034309AD mov eax, dword ptr fs:[00000030h]1_2_034309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034309AD mov eax, dword ptr fs:[00000030h]1_2_034309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B89B3 mov esi, dword ptr fs:[00000030h]1_2_034B89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B89B3 mov eax, dword ptr fs:[00000030h]1_2_034B89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034B89B3 mov eax, dword ptr fs:[00000030h]1_2_034B89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03442840 mov ecx, dword ptr fs:[00000030h]1_2_03442840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03460854 mov eax, dword ptr fs:[00000030h]1_2_03460854
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03434859 mov eax, dword ptr fs:[00000030h]1_2_03434859
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03434859 mov eax, dword ptr fs:[00000030h]1_2_03434859
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034BE872 mov eax, dword ptr fs:[00000030h]1_2_034BE872
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034BE872 mov eax, dword ptr fs:[00000030h]1_2_034BE872
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034C6870 mov eax, dword ptr fs:[00000030h]1_2_034C6870
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034C6870 mov eax, dword ptr fs:[00000030h]1_2_034C6870
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034BC810 mov eax, dword ptr fs:[00000030h]1_2_034BC810
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03452835 mov eax, dword ptr fs:[00000030h]1_2_03452835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03452835 mov eax, dword ptr fs:[00000030h]1_2_03452835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03452835 mov eax, dword ptr fs:[00000030h]1_2_03452835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03452835 mov ecx, dword ptr fs:[00000030h]1_2_03452835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03452835 mov eax, dword ptr fs:[00000030h]1_2_03452835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03452835 mov eax, dword ptr fs:[00000030h]1_2_03452835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0346A830 mov eax, dword ptr fs:[00000030h]1_2_0346A830
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034D483A mov eax, dword ptr fs:[00000030h]1_2_034D483A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_034D483A mov eax, dword ptr fs:[00000030h]1_2_034D483A
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 29DA008Jump to behavior
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\gV3dy8Pfcp.exe"Jump to behavior
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
          Source: gV3dy8Pfcp.exeBinary or memory string: Shell_TrayWnd
          Source: gV3dy8Pfcp.exeBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0041E364
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000001.00000002.1846791335.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.1848117584.0000000003190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: gV3dy8Pfcp.exeBinary or memory string: WIN_XP
          Source: gV3dy8Pfcp.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
          Source: gV3dy8Pfcp.exeBinary or memory string: WIN_XPe
          Source: gV3dy8Pfcp.exeBinary or memory string: WIN_VISTA
          Source: gV3dy8Pfcp.exeBinary or memory string: WIN_7
          Source: gV3dy8Pfcp.exeBinary or memory string: WIN_8

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000001.00000002.1846791335.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.1848117584.0000000003190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
          Source: C:\Users\user\Desktop\gV3dy8Pfcp.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure2
          Valid Accounts
          2
          Native API
          2
          Valid Accounts
          2
          Valid Accounts
          2
          Valid Accounts
          21
          Input Capture
          2
          System Time Discovery
          Remote Services21
          Input Capture
          1
          Encrypted Channel
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          DLL Side-Loading
          1
          Exploitation for Privilege Escalation
          1
          Disable or Modify Tools
          LSASS Memory14
          Security Software Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          1
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)21
          Access Token Manipulation
          2
          Virtualization/Sandbox Evasion
          Security Account Manager2
          Virtualization/Sandbox Evasion
          SMB/Windows Admin Shares3
          Clipboard Data
          SteganographyAutomated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook212
          Process Injection
          21
          Access Token Manipulation
          NTDS3
          Process Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
          DLL Side-Loading
          212
          Process Injection
          LSA Secrets1
          Application Window Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Deobfuscate/Decode Files or Information
          Cached Domain Credentials1
          Account Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
          Obfuscated Files or Information
          DCSync1
          System Owner/User Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          DLL Side-Loading
          Proc Filesystem2
          File and Directory Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow15
          System Information Discovery
          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          gV3dy8Pfcp.exe71%ReversingLabsWin32.Trojan.AutoitInject
          gV3dy8Pfcp.exe54%VirustotalBrowse
          gV3dy8Pfcp.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No contacted domains info
          No contacted IP infos
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1530704
          Start date and time:2024-10-10 12:48:07 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 5m 19s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:5
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:gV3dy8Pfcp.exe
          renamed because original name is a hash value
          Original Sample Name:448d275dcea44de50f35e0cdec70f15757fbf37daeaae4715d188dcbcaa4d9fc.exe
          Detection:MAL
          Classification:mal84.troj.evad.winEXE@3/1@0/0
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 98%
          • Number of executed functions: 52
          • Number of non-executed functions: 302
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Stop behavior analysis, all processes terminated
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size exceeded maximum capacity and may have missing disassembly code.
          TimeTypeDescription
          06:49:13API Interceptor3x Sleep call for process: svchost.exe modified
          No context
          No context
          No context
          No context
          No context
          Process:C:\Users\user\Desktop\gV3dy8Pfcp.exe
          File Type:data
          Category:dropped
          Size (bytes):288256
          Entropy (8bit):7.9954104481731605
          Encrypted:true
          SSDEEP:6144:ypzw1Fi029Lo6RRM/b3EcBimkkqybQDQE+zxHXOjJU:Gzpc6g/bEubQDQpXOjO
          MD5:FCA4E36AEBF42C101FADC15C2920C153
          SHA1:1C92C31C0C50B4EFC34522AE8B5DBFC2C31431DC
          SHA-256:BE31FBC08A99D19B1A737EE2EE9BB0BFCA83E7A63AED41013E67D14422ADF9F6
          SHA-512:72FF533BB79A00B0AF8A8952DA8051A6352E962142B76D263D25232665FA4884C52BCAB730A531E0ACE81DEEE02A194DFDF7CEF48C298D4F99286218D4E496CC
          Malicious:false
          Reputation:low
          Preview:.b...VCPUh..Y.....S0....M0...VCPU01XPED1E4AS3F890N8MPJVCPU0.XPEJ..:A.:...1..l."?0p%B^?"$).&U/=\2.[UnJ8>j?-p..bx=* Tk9LY.F890N8M)K_.m5W.e0"..%S.I....P).W...02.+...xQ"..:P..YW.8MPJVCPU`tXP.E0EH..mF890N8MP.VAQ^1:XP.@1E4AS3F89@Z8MPZVCP%41XP.D1U4AS1F8?0N8MPJVEPU01XPEDAA4AQ3F890N:M..VC@U0!XPED!E4QS3F890^8MPJVCPU01XPED1E4AS3F890N8MPJVCPU01XPED1E4AS3F890N8MPJVCPU01XPED1E4AS3F890N8MPJVCPU01XPED1E4AS3F890N8MPJVCPU01XPED1E4AS3F890N8MPJVC~!UI,PED%.0AS#F89dJ8M@JVCPU01XPED1E4aS3&890N8MPJVCPU01XPED1E4AS3F890N8MPJVCPU01XPED1E4AS3F890N8MPJVCPU01XPED1E4AS3F890N8MPJVCPU01XPED1E4AS3F890N8MPJVCPU01XPED1E4AS3F890N8MPJVCPU01XPED1E4AS3F890N8MPJVCPU01XPED1E4AS3F890N8MPJVCPU01XPED1E4AS3F890N8MPJVCPU01XPED1E4AS3F890N8MPJVCPU01XPED1E4AS3F890N8MPJVCPU01XPED1E4AS3F890N8MPJVCPU01XPED1E4AS3F890N8MPJVCPU01XPED1E4AS3F890N8MPJVCPU01XPED1E4AS3F890N8MPJVCPU01XPED1E4AS3F890N8MPJVCPU01XPED1E4AS3F890N8MPJVCPU01XPED1E4AS3F890N8MPJVCPU01XPED1E4AS3F890N8MPJVCPU01XPED1E4AS3F890N8MPJVCPU01XPED1E4AS3F890N8MPJVCPU01XPED1E4AS3F890
          File type:PE32 executable (GUI) Intel 80386, for MS Windows
          Entropy (8bit):7.537439959592509
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.96%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:gV3dy8Pfcp.exe
          File size:1'324'321 bytes
          MD5:731f2c97a78525c4cffb48caa7ac9e73
          SHA1:baa940d933b184a6f8001616e006cbbbc23c81e0
          SHA256:448d275dcea44de50f35e0cdec70f15757fbf37daeaae4715d188dcbcaa4d9fc
          SHA512:711239cee8acb84c726769fc6df84445e52c7a686ec388cd6fb94400d97d2823e38be8ec3cc5a3858d83408648f058386998ad30c2a910fde5927d6ef86e9930
          SSDEEP:24576:8RmJkcoQricOIQxiZY1iaAt2ApJQIUyg4pRIaIe3Y1Fc7/k3U9Om5yFmST4fE:pJZoQrbTFZY1iaAtvoI1RINe3IcL9V5S
          TLSH:2355E122B5C68036C2F323B19E7EF76A9A3D69361336D19737C82D315EA05416B39723
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
          Icon Hash:566c39314c96ab45
          Entrypoint:0x4165c1
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          DLL Characteristics:TERMINAL_SERVER_AWARE
          Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:5
          OS Version Minor:0
          File Version Major:5
          File Version Minor:0
          Subsystem Version Major:5
          Subsystem Version Minor:0
          Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
          Instruction
          call 00007F978C7DCA0Bh
          jmp 00007F978C7D387Eh
          int3
          int3
          int3
          int3
          int3
          push ebp
          mov ebp, esp
          push edi
          push esi
          mov esi, dword ptr [ebp+0Ch]
          mov ecx, dword ptr [ebp+10h]
          mov edi, dword ptr [ebp+08h]
          mov eax, ecx
          mov edx, ecx
          add eax, esi
          cmp edi, esi
          jbe 00007F978C7D39FAh
          cmp edi, eax
          jc 00007F978C7D3B96h
          cmp ecx, 00000080h
          jc 00007F978C7D3A0Eh
          cmp dword ptr [004A9724h], 00000000h
          je 00007F978C7D3A05h
          push edi
          push esi
          and edi, 0Fh
          and esi, 0Fh
          cmp edi, esi
          pop esi
          pop edi
          jne 00007F978C7D39F7h
          jmp 00007F978C7D3DD2h
          test edi, 00000003h
          jne 00007F978C7D3A06h
          shr ecx, 02h
          and edx, 03h
          cmp ecx, 08h
          jc 00007F978C7D3A1Bh
          rep movsd
          jmp dword ptr [00416740h+edx*4]
          mov eax, edi
          mov edx, 00000003h
          sub ecx, 04h
          jc 00007F978C7D39FEh
          and eax, 03h
          add ecx, eax
          jmp dword ptr [00416654h+eax*4]
          jmp dword ptr [00416750h+ecx*4]
          nop
          jmp dword ptr [004166D4h+ecx*4]
          nop
          inc cx
          add byte ptr [eax-4BFFBE9Ah], dl
          inc cx
          add byte ptr [ebx], ah
          ror dword ptr [edx-75F877FAh], 1
          inc esi
          add dword ptr [eax+468A0147h], ecx
          add al, cl
          jmp 00007F978EC4C1F7h
          add esi, 03h
          add edi, 03h
          cmp ecx, 08h
          jc 00007F978C7D39BEh
          rep movsd
          jmp dword ptr [00000000h+edx*4]
          Programming Language:
          • [ C ] VS2010 SP1 build 40219
          • [C++] VS2010 SP1 build 40219
          • [ C ] VS2008 SP1 build 30729
          • [IMP] VS2008 SP1 build 30729
          • [ASM] VS2010 SP1 build 40219
          • [RES] VS2010 SP1 build 40219
          • [LNK] VS2010 SP1 build 40219
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x54f8.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0xab0000x54f80x560038d65eb9c9554a7f8dbad7f7b066221aFalse0.2285610465116279data4.143084940351676IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_ICON0xab4480x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
          RT_ICON0xab5700x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
          RT_ICON0xab6980x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
          RT_ICON0xab7c00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2834 x 2834 px/mEnglishGreat Britain0.1754149377593361
          RT_MENU0xadd680x50dataEnglishGreat Britain0.9
          RT_DIALOG0xaddb80xfcdataEnglishGreat Britain0.6507936507936508
          RT_STRING0xadeb80x530dataEnglishGreat Britain0.33960843373493976
          RT_STRING0xae3e80x690dataEnglishGreat Britain0.26964285714285713
          RT_STRING0xaea780x4d0dataEnglishGreat Britain0.36363636363636365
          RT_STRING0xaef480x5fcdataEnglishGreat Britain0.3087467362924282
          RT_STRING0xaf5480x65cdataEnglishGreat Britain0.34336609336609336
          RT_STRING0xafba80x388dataEnglishGreat Britain0.377212389380531
          RT_STRING0xaff300x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
          RT_GROUP_ICON0xb00880x14dataEnglishGreat Britain1.25
          RT_GROUP_ICON0xb00a00x14dataEnglishGreat Britain1.15
          RT_GROUP_ICON0xb00b80x14dataEnglishGreat Britain1.25
          RT_GROUP_ICON0xb00d00x14dataEnglishGreat Britain1.25
          RT_VERSION0xb00e80x19cdataEnglishGreat Britain0.5339805825242718
          RT_MANIFEST0xb02880x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
          DLLImport
          WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
          VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
          COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
          MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
          WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
          PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
          USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
          KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
          USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
          GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
          COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
          ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
          SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
          ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
          OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
          Language of compilation systemCountry where language is spokenMap
          EnglishGreat Britain
          EnglishUnited States
          No network behavior found

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:06:48:58
          Start date:10/10/2024
          Path:C:\Users\user\Desktop\gV3dy8Pfcp.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\gV3dy8Pfcp.exe"
          Imagebase:0x400000
          File size:1'324'321 bytes
          MD5 hash:731F2C97A78525C4CFFB48CAA7AC9E73
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:1
          Start time:06:49:02
          Start date:10/10/2024
          Path:C:\Windows\SysWOW64\svchost.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\gV3dy8Pfcp.exe"
          Imagebase:0x760000
          File size:46'504 bytes
          MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.1846791335.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000001.00000002.1846791335.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.1848117584.0000000003190000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000001.00000002.1848117584.0000000003190000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
          Reputation:high
          Has exited:true

          Reset < >

            Execution Graph

            Execution Coverage:3.6%
            Dynamic/Decrypted Code Coverage:0.5%
            Signature Coverage:8.9%
            Total number of Nodes:2000
            Total number of Limit Nodes:36
            execution_graph 84249 4010e0 84252 401100 84249->84252 84251 4010f8 84253 401113 84252->84253 84254 401182 84253->84254 84256 401120 84253->84256 84257 401184 84253->84257 84258 40114c 84253->84258 84255 40112c DefWindowProcW 84254->84255 84255->84251 84256->84255 84311 401000 Shell_NotifyIconW __localtime64_s 84256->84311 84290 401250 84257->84290 84260 401151 84258->84260 84261 40119d 84258->84261 84265 401219 84260->84265 84266 40115d 84260->84266 84263 4011a3 84261->84263 84264 42afb4 84261->84264 84262 401193 84262->84251 84263->84256 84275 4011b6 KillTimer 84263->84275 84276 4011db SetTimer RegisterWindowMessageW 84263->84276 84306 40f190 10 API calls 84264->84306 84265->84256 84269 401225 84265->84269 84267 401163 84266->84267 84268 42b01d 84266->84268 84272 42afe9 84267->84272 84273 40116c 84267->84273 84268->84255 84310 4370f4 52 API calls 84268->84310 84322 468b0e 74 API calls __localtime64_s 84269->84322 84308 40f190 10 API calls 84272->84308 84273->84256 84278 401174 84273->84278 84274 42b04f 84312 40e0c0 84274->84312 84305 401000 Shell_NotifyIconW __localtime64_s 84275->84305 84276->84262 84283 401204 CreatePopupMenu 84276->84283 84307 45fd57 65 API calls __localtime64_s 84278->84307 84283->84251 84284 42afe4 84284->84262 84285 42b00e 84309 401a50 331 API calls 84285->84309 84286 4011c9 PostQuitMessage 84286->84251 84289 42afdc 84289->84255 84289->84284 84291 401262 __localtime64_s 84290->84291 84292 4012e8 84290->84292 84323 401b80 84291->84323 84292->84262 84294 40128c 84295 4012d1 KillTimer SetTimer 84294->84295 84296 4012bb 84294->84296 84297 4272ec 84294->84297 84295->84292 84300 4012c5 84296->84300 84301 42733f 84296->84301 84298 4272f4 Shell_NotifyIconW 84297->84298 84299 42731a Shell_NotifyIconW 84297->84299 84298->84295 84299->84295 84300->84295 84302 427393 Shell_NotifyIconW 84300->84302 84303 427348 Shell_NotifyIconW 84301->84303 84304 42736e Shell_NotifyIconW 84301->84304 84302->84295 84303->84295 84304->84295 84305->84286 84306->84262 84307->84289 84308->84285 84309->84254 84310->84254 84311->84274 84314 40e0e7 __localtime64_s 84312->84314 84313 40e142 84316 40e184 84313->84316 84421 4341e6 63 API calls __wcsicoll 84313->84421 84314->84313 84315 42729f DestroyIcon 84314->84315 84315->84313 84318 40e1a0 Shell_NotifyIconW 84316->84318 84319 4272db Shell_NotifyIconW 84316->84319 84320 401b80 54 API calls 84318->84320 84321 40e1ba 84320->84321 84321->84254 84322->84284 84324 401b9c 84323->84324 84325 401c7e 84323->84325 84345 4013c0 84324->84345 84325->84294 84328 42722b LoadStringW 84331 427246 84328->84331 84329 401bb9 84350 402160 84329->84350 84364 40e0a0 84331->84364 84332 401bcd 84334 427258 84332->84334 84335 401bda 84332->84335 84368 40d200 52 API calls 2 library calls 84334->84368 84335->84331 84336 401be4 84335->84336 84363 40d200 52 API calls 2 library calls 84336->84363 84339 427267 84340 42727b 84339->84340 84342 401bf3 __localtime64_s _wcscpy _wcsncpy 84339->84342 84369 40d200 52 API calls 2 library calls 84340->84369 84344 401c62 Shell_NotifyIconW 84342->84344 84343 427289 84344->84325 84370 4115d7 84345->84370 84351 426daa 84350->84351 84352 40216b _wcslen 84350->84352 84408 40c600 84351->84408 84355 402180 84352->84355 84356 40219e 84352->84356 84354 426db5 84354->84332 84407 403bd0 52 API calls ctype 84355->84407 84358 4013a0 52 API calls 84356->84358 84360 4021a5 84358->84360 84359 402187 _memmove 84359->84332 84361 426db7 84360->84361 84362 4115d7 52 API calls 84360->84362 84362->84359 84363->84342 84365 40e0b2 84364->84365 84366 40e0a8 84364->84366 84365->84342 84420 403c30 52 API calls _memmove 84366->84420 84368->84339 84369->84343 84372 4115e1 _malloc 84370->84372 84373 4013e4 84372->84373 84376 4115fd std::exception::exception 84372->84376 84384 4135bb 84372->84384 84381 4013a0 84373->84381 84375 411645 84400 418105 RaiseException 84375->84400 84380 41163b 84376->84380 84398 41130a 51 API calls __cinit 84376->84398 84379 411656 84399 4180af 46 API calls std::exception::operator= 84380->84399 84382 4115d7 52 API calls 84381->84382 84383 4013a7 84382->84383 84383->84328 84383->84329 84385 413638 _malloc 84384->84385 84392 4135c9 _malloc 84384->84392 84406 417f77 46 API calls __getptd_noexit 84385->84406 84388 4135f7 RtlAllocateHeap 84389 413630 84388->84389 84388->84392 84389->84372 84391 413624 84404 417f77 46 API calls __getptd_noexit 84391->84404 84392->84388 84392->84391 84393 4135d4 84392->84393 84396 413622 84392->84396 84393->84392 84401 418901 46 API calls __NMSG_WRITE 84393->84401 84402 418752 46 API calls 5 library calls 84393->84402 84403 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 84393->84403 84405 417f77 46 API calls __getptd_noexit 84396->84405 84398->84380 84399->84375 84400->84379 84401->84393 84402->84393 84404->84396 84405->84389 84406->84389 84407->84359 84409 40c619 84408->84409 84410 40c60a 84408->84410 84409->84354 84410->84409 84413 4026f0 84410->84413 84412 426d7a _memmove 84412->84354 84414 426873 84413->84414 84415 4026ff 84413->84415 84416 4013a0 52 API calls 84414->84416 84415->84412 84417 42687b 84416->84417 84418 4115d7 52 API calls 84417->84418 84419 42689e _memmove 84418->84419 84419->84412 84420->84365 84421->84316 84422 40bd20 84423 428194 84422->84423 84431 40bd2d 84422->84431 84424 40bd43 84423->84424 84425 4281bc 84423->84425 84427 4281b2 84423->84427 84444 45e987 86 API calls ctype 84425->84444 84443 40b510 VariantClear 84427->84443 84432 40bd37 84431->84432 84445 4531b1 85 API calls 5 library calls 84431->84445 84434 40bd50 84432->84434 84433 4281ba 84435 426cf1 84434->84435 84436 40bd63 84434->84436 84455 44cde9 52 API calls _memmove 84435->84455 84446 40bd80 84436->84446 84439 426cfc 84441 40e0a0 52 API calls 84439->84441 84440 40bd73 84440->84424 84442 426d02 84441->84442 84443->84433 84444->84431 84445->84432 84447 40bd8e 84446->84447 84452 40bdb7 _memmove 84446->84452 84448 40bded 84447->84448 84449 40bdad 84447->84449 84447->84452 84450 4115d7 52 API calls 84448->84450 84456 402f00 84449->84456 84453 40bdf6 84450->84453 84452->84440 84453->84452 84454 4115d7 52 API calls 84453->84454 84454->84452 84455->84439 84457 402f10 84456->84457 84458 402f0c 84456->84458 84459 4115d7 52 API calls 84457->84459 84460 4268c3 84457->84460 84458->84452 84461 402f51 ctype _memmove 84459->84461 84461->84452 84462 425ba2 84467 40e360 84462->84467 84464 425bb4 84483 41130a 51 API calls __cinit 84464->84483 84466 425bbe 84468 4115d7 52 API calls 84467->84468 84469 40e3ec GetModuleFileNameW 84468->84469 84484 413a0e 84469->84484 84471 40e421 _wcsncat 84487 413a9e 84471->84487 84474 4115d7 52 API calls 84475 40e45e _wcscpy 84474->84475 84490 40bc70 84475->84490 84479 40e4a9 84479->84464 84480 401c90 52 API calls 84482 40e4a1 _wcscat _wcslen _wcsncpy 84480->84482 84481 4115d7 52 API calls 84481->84482 84482->84479 84482->84480 84482->84481 84483->84466 84509 413801 84484->84509 84539 419efd 84487->84539 84491 4115d7 52 API calls 84490->84491 84492 40bc98 84491->84492 84493 4115d7 52 API calls 84492->84493 84494 40bca6 84493->84494 84495 40e4c0 84494->84495 84551 403350 84495->84551 84497 40e4cb RegOpenKeyExW 84498 427190 RegQueryValueExW 84497->84498 84499 40e4eb 84497->84499 84500 4271b0 84498->84500 84501 42721a RegCloseKey 84498->84501 84499->84482 84502 4115d7 52 API calls 84500->84502 84501->84482 84503 4271cb 84502->84503 84558 43652f 52 API calls 84503->84558 84505 4271d8 RegQueryValueExW 84506 42720e 84505->84506 84507 4271f7 84505->84507 84506->84501 84508 402160 52 API calls 84507->84508 84508->84506 84510 41381a 84509->84510 84511 41389e 84509->84511 84510->84511 84522 41388a 84510->84522 84531 419e30 46 API calls __mbsnbicoll_l 84510->84531 84512 4139e8 84511->84512 84514 413a00 84511->84514 84536 417f77 46 API calls __getptd_noexit 84512->84536 84538 417f77 46 API calls __getptd_noexit 84514->84538 84515 4139ed 84537 417f25 10 API calls __mbsnbicoll_l 84515->84537 84519 41396c 84519->84511 84520 413967 84519->84520 84523 41397a 84519->84523 84520->84471 84521 413929 84521->84511 84524 413945 84521->84524 84533 419e30 46 API calls __mbsnbicoll_l 84521->84533 84522->84511 84530 413909 84522->84530 84532 419e30 46 API calls __mbsnbicoll_l 84522->84532 84535 419e30 46 API calls __mbsnbicoll_l 84523->84535 84524->84511 84524->84520 84527 41395b 84524->84527 84534 419e30 46 API calls __mbsnbicoll_l 84527->84534 84530->84519 84530->84521 84531->84522 84532->84530 84533->84524 84534->84520 84535->84520 84536->84515 84537->84520 84538->84520 84540 419f13 84539->84540 84541 419f0e 84539->84541 84548 417f77 46 API calls __getptd_noexit 84540->84548 84541->84540 84547 419f2b 84541->84547 84543 419f18 84549 417f25 10 API calls __mbsnbicoll_l 84543->84549 84546 40e454 84546->84474 84547->84546 84550 417f77 46 API calls __getptd_noexit 84547->84550 84548->84543 84549->84546 84550->84543 84552 403367 84551->84552 84553 403358 84551->84553 84554 4115d7 52 API calls 84552->84554 84553->84497 84555 403370 84554->84555 84556 4115d7 52 API calls 84555->84556 84557 40339e 84556->84557 84557->84497 84558->84505 84559 416454 84596 416c70 84559->84596 84561 416460 GetStartupInfoW 84562 416474 84561->84562 84597 419d5a HeapCreate 84562->84597 84564 4164cd 84565 4164d8 84564->84565 84681 41642b 46 API calls 3 library calls 84564->84681 84598 417c20 GetModuleHandleW 84565->84598 84568 4164de 84569 4164e9 __RTC_Initialize 84568->84569 84682 41642b 46 API calls 3 library calls 84568->84682 84617 41aaa1 GetStartupInfoW 84569->84617 84573 416503 GetCommandLineW 84630 41f584 GetEnvironmentStringsW 84573->84630 84577 416513 84636 41f4d6 GetModuleFileNameW 84577->84636 84579 41651d 84580 416528 84579->84580 84684 411924 46 API calls 3 library calls 84579->84684 84640 41f2a4 84580->84640 84583 41652e 84584 416539 84583->84584 84685 411924 46 API calls 3 library calls 84583->84685 84654 411703 84584->84654 84587 416541 84589 41654c __wwincmdln 84587->84589 84686 411924 46 API calls 3 library calls 84587->84686 84658 40d6b0 84589->84658 84592 41657c 84688 411906 46 API calls _doexit 84592->84688 84595 416581 __tsopen_nolock 84596->84561 84597->84564 84599 417c34 84598->84599 84600 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 84598->84600 84689 4178ff 49 API calls _free 84599->84689 84602 417c87 TlsAlloc 84600->84602 84605 417cd5 TlsSetValue 84602->84605 84606 417d96 84602->84606 84604 417c39 84604->84568 84605->84606 84607 417ce6 __init_pointers 84605->84607 84606->84568 84690 418151 InitializeCriticalSectionAndSpinCount 84607->84690 84609 417d91 84698 4178ff 49 API calls _free 84609->84698 84611 417d2a 84611->84609 84691 416b49 84611->84691 84614 417d76 84697 41793c 46 API calls 4 library calls 84614->84697 84616 417d7e GetCurrentThreadId 84616->84606 84618 416b49 __calloc_crt 46 API calls 84617->84618 84627 41aabf 84618->84627 84619 41ac34 84620 41ac6a GetStdHandle 84619->84620 84622 41acce SetHandleCount 84619->84622 84623 41ac7c GetFileType 84619->84623 84628 41aca2 InitializeCriticalSectionAndSpinCount 84619->84628 84620->84619 84621 416b49 __calloc_crt 46 API calls 84621->84627 84629 4164f7 84622->84629 84623->84619 84624 41abb4 84624->84619 84625 41abe0 GetFileType 84624->84625 84626 41abeb InitializeCriticalSectionAndSpinCount 84624->84626 84625->84624 84625->84626 84626->84624 84626->84629 84627->84619 84627->84621 84627->84624 84627->84629 84628->84619 84628->84629 84629->84573 84683 411924 46 API calls 3 library calls 84629->84683 84631 41f595 84630->84631 84632 41f599 84630->84632 84631->84577 84708 416b04 84632->84708 84634 41f5bb _memmove 84635 41f5c2 FreeEnvironmentStringsW 84634->84635 84635->84577 84637 41f50b _wparse_cmdline 84636->84637 84638 416b04 __malloc_crt 46 API calls 84637->84638 84639 41f54e _wparse_cmdline 84637->84639 84638->84639 84639->84579 84641 41f2bc _wcslen 84640->84641 84643 41f2b4 84640->84643 84642 416b49 __calloc_crt 46 API calls 84641->84642 84645 41f2e0 _wcslen 84642->84645 84643->84583 84644 41f336 84715 413748 84644->84715 84645->84643 84645->84644 84647 416b49 __calloc_crt 46 API calls 84645->84647 84648 41f35c 84645->84648 84651 41f373 84645->84651 84714 41ef12 46 API calls __mbsnbicoll_l 84645->84714 84647->84645 84649 413748 _free 46 API calls 84648->84649 84649->84643 84721 417ed3 84651->84721 84653 41f37f 84653->84583 84655 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 84654->84655 84657 411750 __IsNonwritableInCurrentImage 84655->84657 84740 41130a 51 API calls __cinit 84655->84740 84657->84587 84659 42e2f3 84658->84659 84660 40d6cc 84658->84660 84741 408f40 84660->84741 84662 40d707 84745 40ebb0 84662->84745 84665 40d737 84748 411951 84665->84748 84670 40d751 84760 40f4e0 SystemParametersInfoW SystemParametersInfoW 84670->84760 84672 40d75f 84761 40d590 GetCurrentDirectoryW 84672->84761 84674 40d767 SystemParametersInfoW 84675 40d794 84674->84675 84676 40d78d FreeLibrary 84674->84676 84677 408f40 VariantClear 84675->84677 84676->84675 84678 40d79d 84677->84678 84679 408f40 VariantClear 84678->84679 84680 40d7a6 84679->84680 84680->84592 84687 4118da 46 API calls _doexit 84680->84687 84681->84565 84682->84569 84687->84592 84688->84595 84689->84604 84690->84611 84693 416b52 84691->84693 84694 416b8f 84693->84694 84695 416b70 Sleep 84693->84695 84699 41f677 84693->84699 84694->84609 84694->84614 84696 416b85 84695->84696 84696->84693 84696->84694 84697->84616 84698->84606 84700 41f683 84699->84700 84704 41f69e _malloc 84699->84704 84701 41f68f 84700->84701 84700->84704 84707 417f77 46 API calls __getptd_noexit 84701->84707 84703 41f6b1 HeapAlloc 84703->84704 84706 41f6d8 84703->84706 84704->84703 84704->84706 84705 41f694 84705->84693 84706->84693 84707->84705 84711 416b0d 84708->84711 84709 4135bb _malloc 45 API calls 84709->84711 84710 416b43 84710->84634 84711->84709 84711->84710 84712 416b24 Sleep 84711->84712 84713 416b39 84712->84713 84713->84710 84713->84711 84714->84645 84716 41377c __dosmaperr 84715->84716 84717 413753 RtlFreeHeap 84715->84717 84716->84643 84717->84716 84718 413768 84717->84718 84724 417f77 46 API calls __getptd_noexit 84718->84724 84720 41376e GetLastError 84720->84716 84725 417daa 84721->84725 84724->84720 84726 417dc9 __localtime64_s __call_reportfault 84725->84726 84727 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 84726->84727 84730 417eb5 __call_reportfault 84727->84730 84729 417ed1 GetCurrentProcess TerminateProcess 84729->84653 84731 41a208 84730->84731 84732 41a210 84731->84732 84733 41a212 IsDebuggerPresent 84731->84733 84732->84729 84739 41fe19 84733->84739 84736 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 84737 421ff0 __call_reportfault 84736->84737 84738 421ff8 GetCurrentProcess TerminateProcess 84736->84738 84737->84738 84738->84729 84739->84736 84740->84657 84742 408f48 ctype 84741->84742 84743 4265c7 VariantClear 84742->84743 84744 408f55 ctype 84742->84744 84743->84744 84744->84662 84801 40ebd0 84745->84801 84805 4182cb 84748->84805 84750 41195e 84812 4181f2 LeaveCriticalSection 84750->84812 84752 40d748 84753 4119b0 84752->84753 84754 4119d6 84753->84754 84755 4119bc 84753->84755 84754->84670 84755->84754 84847 417f77 46 API calls __getptd_noexit 84755->84847 84757 4119c6 84848 417f25 10 API calls __mbsnbicoll_l 84757->84848 84759 4119d1 84759->84670 84760->84672 84849 401f20 84761->84849 84763 40d5b6 IsDebuggerPresent 84764 40d5c4 84763->84764 84765 42e1bb MessageBoxA 84763->84765 84766 42e1d4 84764->84766 84767 40d5e3 84764->84767 84765->84766 85021 403a50 52 API calls 3 library calls 84766->85021 84919 40f520 84767->84919 84771 40d5fd GetFullPathNameW 84931 401460 84771->84931 84773 40d63b 84774 40d643 84773->84774 84775 42e231 SetCurrentDirectoryW 84773->84775 84776 40d64c 84774->84776 85022 432fee 6 API calls 84774->85022 84775->84774 84946 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 84776->84946 84779 42e252 84779->84776 84781 42e25a GetModuleFileNameW 84779->84781 84783 42e274 84781->84783 84784 42e2cb GetForegroundWindow ShellExecuteW 84781->84784 85023 401b10 84783->85023 84787 40d688 84784->84787 84785 40d656 84786 40d669 84785->84786 84789 40e0c0 74 API calls 84785->84789 84954 4091e0 84786->84954 84793 40d692 SetCurrentDirectoryW 84787->84793 84789->84786 84793->84674 84795 42e28d 85030 40d200 52 API calls 2 library calls 84795->85030 84798 42e299 GetForegroundWindow ShellExecuteW 84799 42e2c6 84798->84799 84799->84787 84800 40ec00 LoadLibraryA GetProcAddress 84800->84665 84802 40d72e 84801->84802 84803 40ebd6 LoadLibraryA 84801->84803 84802->84665 84802->84800 84803->84802 84804 40ebe7 GetProcAddress 84803->84804 84804->84802 84806 4182e0 84805->84806 84807 4182f3 EnterCriticalSection 84805->84807 84813 418209 84806->84813 84807->84750 84809 4182e6 84809->84807 84840 411924 46 API calls 3 library calls 84809->84840 84812->84752 84814 418215 __tsopen_nolock 84813->84814 84815 418225 84814->84815 84816 41823d 84814->84816 84841 418901 46 API calls __NMSG_WRITE 84815->84841 84818 41824b __tsopen_nolock 84816->84818 84819 416b04 __malloc_crt 45 API calls 84816->84819 84818->84809 84821 418256 84819->84821 84820 41822a 84842 418752 46 API calls 5 library calls 84820->84842 84823 41825d 84821->84823 84824 41826c 84821->84824 84844 417f77 46 API calls __getptd_noexit 84823->84844 84827 4182cb __lock 45 API calls 84824->84827 84825 418231 84843 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 84825->84843 84829 418273 84827->84829 84831 4182a6 84829->84831 84832 41827b InitializeCriticalSectionAndSpinCount 84829->84832 84833 413748 _free 45 API calls 84831->84833 84834 418297 84832->84834 84835 41828b 84832->84835 84833->84834 84846 4182c2 LeaveCriticalSection _doexit 84834->84846 84836 413748 _free 45 API calls 84835->84836 84838 418291 84836->84838 84845 417f77 46 API calls __getptd_noexit 84838->84845 84841->84820 84842->84825 84844->84818 84845->84834 84846->84818 84847->84757 84848->84759 85031 40e6e0 84849->85031 84853 401f41 GetModuleFileNameW 85049 410100 84853->85049 84855 401f5c 85061 410960 84855->85061 84858 401b10 52 API calls 84859 401f81 84858->84859 85064 401980 84859->85064 84861 401f8e 84862 408f40 VariantClear 84861->84862 84863 401f9d 84862->84863 84864 401b10 52 API calls 84863->84864 84865 401fb4 84864->84865 84866 401980 53 API calls 84865->84866 84867 401fc3 84866->84867 84868 401b10 52 API calls 84867->84868 84869 401fd2 84868->84869 85072 40c2c0 84869->85072 84871 401fe1 84872 40bc70 52 API calls 84871->84872 84873 401ff3 84872->84873 85090 401a10 84873->85090 84875 401ffe 85097 4114ab 84875->85097 84878 428b05 84880 401a10 52 API calls 84878->84880 84879 402017 84881 4114ab __wcsicoll 58 API calls 84879->84881 84882 428b18 84880->84882 84883 402022 84881->84883 84885 401a10 52 API calls 84882->84885 84883->84882 84884 40202d 84883->84884 84886 4114ab __wcsicoll 58 API calls 84884->84886 84887 428b33 84885->84887 84888 402038 84886->84888 84890 428b3b GetModuleFileNameW 84887->84890 84889 402043 84888->84889 84888->84890 84891 4114ab __wcsicoll 58 API calls 84889->84891 84892 401a10 52 API calls 84890->84892 84893 40204e 84891->84893 84894 428b6c 84892->84894 84895 402092 84893->84895 84899 401a10 52 API calls 84893->84899 84904 428b90 _wcscpy 84893->84904 84896 40e0a0 52 API calls 84894->84896 84898 4020a3 84895->84898 84895->84904 84897 428b7a 84896->84897 84900 401a10 52 API calls 84897->84900 84901 428bc6 84898->84901 85105 40e830 53 API calls 84898->85105 84902 402073 _wcscpy 84899->84902 84903 428b88 84900->84903 84910 401a10 52 API calls 84902->84910 84903->84904 84907 401a10 52 API calls 84904->84907 84906 4020bb 85106 40cf00 53 API calls 84906->85106 84914 4020d0 84907->84914 84909 4020c6 84911 408f40 VariantClear 84909->84911 84910->84895 84911->84914 84912 402110 84916 408f40 VariantClear 84912->84916 84914->84912 84917 401a10 52 API calls 84914->84917 85107 40cf00 53 API calls 84914->85107 85108 40e6a0 53 API calls 84914->85108 84918 402120 ctype 84916->84918 84917->84914 84918->84763 84920 4295c9 __localtime64_s 84919->84920 84921 40f53c 84919->84921 84924 4295d9 GetOpenFileNameW 84920->84924 85784 410120 84921->85784 84923 40f545 85788 4102b0 SHGetMalloc 84923->85788 84924->84921 84926 40d5f5 84924->84926 84926->84771 84926->84773 84927 40f54c 85793 410190 GetFullPathNameW 84927->85793 84929 40f559 85804 40f570 84929->85804 85866 402400 84931->85866 84933 40146f 84936 428c29 _wcscat 84933->84936 85875 401500 84933->85875 84935 40147c 84935->84936 85883 40d440 84935->85883 84938 401489 84938->84936 84939 401491 GetFullPathNameW 84938->84939 84940 402160 52 API calls 84939->84940 84941 4014bb 84940->84941 84942 402160 52 API calls 84941->84942 84943 4014c8 84942->84943 84943->84936 84944 402160 52 API calls 84943->84944 84945 4014ee 84944->84945 84945->84773 84947 428361 84946->84947 84948 4103fc LoadImageW RegisterClassExW 84946->84948 85903 44395e EnumResourceNamesW LoadImageW 84947->85903 85902 410490 7 API calls 84948->85902 84951 40d651 84953 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 84951->84953 84952 428368 84953->84785 84955 42d7ad 84954->84955 84957 409202 84954->84957 86178 45e737 90 API calls 3 library calls 84955->86178 85015 409216 ctype 84957->85015 86175 410940 331 API calls 84957->86175 84959 409386 84960 40939c 84959->84960 86176 40f190 10 API calls 84959->86176 84960->84787 85020 401000 Shell_NotifyIconW __localtime64_s 84960->85020 84962 4095b2 84962->84960 84963 4095bf 84962->84963 86177 401a50 331 API calls 84963->86177 84964 409253 PeekMessageW 84964->85015 84966 42d8cd Sleep 84966->85015 84967 4095c6 LockWindowUpdate DestroyWindow GetMessageW 84967->84960 84970 4095f9 84967->84970 84969 42e13b 86196 40d410 VariantClear 84969->86196 84972 42e158 TranslateMessage DispatchMessageW GetMessageW 84970->84972 84972->84972 84975 42e188 84972->84975 84974 409567 PeekMessageW 84974->85015 84975->84960 84978 46fdbf 108 API calls 85019 4094e0 84978->85019 84979 46f3c1 107 API calls 84979->85015 84980 40e0a0 52 API calls 84980->85015 84981 409551 TranslateMessage DispatchMessageW 84981->84974 84983 42dcd2 WaitForSingleObject 84984 42dcf0 GetExitCodeProcess CloseHandle 84983->84984 84983->85015 86185 40d410 VariantClear 84984->86185 84986 44c29d 52 API calls 84986->85019 84987 42dd3d Sleep 84987->85019 84988 47d33e 309 API calls 84988->85015 84991 4094cf Sleep 84991->85019 84993 42d94d timeGetTime 86181 465124 53 API calls 84993->86181 84995 40d410 VariantClear 84995->85015 84996 40c620 timeGetTime 84996->85019 84999 42dd89 CloseHandle 84999->85019 85000 408f40 VariantClear 85000->85019 85002 465124 53 API calls 85002->85019 85003 42de19 GetExitCodeProcess CloseHandle 85003->85019 85005 401b10 52 API calls 85005->85019 85008 42de88 Sleep 85008->85015 85010 401980 53 API calls 85010->85019 85011 45e737 90 API calls 85011->85015 85014 42e0cc VariantClear 85014->85015 85015->84959 85015->84964 85015->84966 85015->84969 85015->84974 85015->84979 85015->84980 85015->84981 85015->84983 85015->84987 85015->84988 85015->84991 85015->84993 85015->84995 85015->85011 85015->85014 85016 408f40 VariantClear 85015->85016 85015->85019 85904 4091b0 85015->85904 85962 40afa0 85015->85962 85988 408fc0 85015->85988 86023 408cc0 85015->86023 86037 40d150 85015->86037 86042 40d170 85015->86042 86048 4096a0 85015->86048 86179 465124 53 API calls 85015->86179 86180 40c620 timeGetTime 85015->86180 86195 40e270 VariantClear ctype 85015->86195 85016->85015 85019->84978 85019->84986 85019->84996 85019->84999 85019->85000 85019->85002 85019->85003 85019->85005 85019->85008 85019->85010 85019->85015 86182 45178a 54 API calls 85019->86182 86183 47d33e 331 API calls 85019->86183 86184 453bc6 54 API calls 85019->86184 86186 40d410 VariantClear 85019->86186 86187 443d19 67 API calls _wcslen 85019->86187 86188 4574b4 VariantClear 85019->86188 86189 403cd0 85019->86189 86193 4731e1 VariantClear 85019->86193 86194 4331a2 6 API calls 85019->86194 85020->84787 85021->84773 85022->84779 85024 401b16 _wcslen 85023->85024 85025 4115d7 52 API calls 85024->85025 85028 401b63 85024->85028 85026 401b4b _memmove 85025->85026 85027 4115d7 52 API calls 85026->85027 85027->85028 85029 40d200 52 API calls 2 library calls 85028->85029 85029->84795 85030->84798 85032 40bc70 52 API calls 85031->85032 85033 401f31 85032->85033 85034 402560 85033->85034 85035 40256d __write_nolock 85034->85035 85036 402160 52 API calls 85035->85036 85037 402593 85036->85037 85047 4025bd 85037->85047 85109 401c90 85037->85109 85039 4026f0 52 API calls 85039->85047 85040 4026a7 85041 401b10 52 API calls 85040->85041 85046 4026db 85040->85046 85043 4026d1 85041->85043 85042 401b10 52 API calls 85042->85047 85113 40d7c0 52 API calls 2 library calls 85043->85113 85046->84853 85047->85039 85047->85040 85047->85042 85048 401c90 52 API calls 85047->85048 85112 40d7c0 52 API calls 2 library calls 85047->85112 85048->85047 85114 40f760 85049->85114 85052 410118 85052->84855 85054 42805d 85055 42806a 85054->85055 85170 431e58 85054->85170 85056 413748 _free 46 API calls 85055->85056 85058 428078 85056->85058 85059 431e58 82 API calls 85058->85059 85060 428084 85059->85060 85060->84855 85062 4115d7 52 API calls 85061->85062 85063 401f74 85062->85063 85063->84858 85065 4019a3 85064->85065 85066 401985 85064->85066 85065->85066 85067 4019b8 85065->85067 85068 40199f 85066->85068 85772 403e10 53 API calls 85066->85772 85773 403e10 53 API calls 85067->85773 85068->84861 85071 4019c4 85071->84861 85073 40c2c7 85072->85073 85074 40c30e 85072->85074 85077 40c2d3 85073->85077 85078 426c79 85073->85078 85075 40c315 85074->85075 85076 426c2b 85074->85076 85079 40c321 85075->85079 85080 426c5a 85075->85080 85082 426c4b 85076->85082 85083 426c2e 85076->85083 85774 403ea0 52 API calls __cinit 85077->85774 85779 4534e3 52 API calls 85078->85779 85775 403ea0 52 API calls __cinit 85079->85775 85778 4534e3 52 API calls 85080->85778 85777 4534e3 52 API calls 85082->85777 85089 40c2de 85083->85089 85776 4534e3 52 API calls 85083->85776 85089->84871 85091 401a30 85090->85091 85092 401a17 85090->85092 85094 402160 52 API calls 85091->85094 85093 401a2d 85092->85093 85780 403c30 52 API calls _memmove 85092->85780 85093->84875 85096 401a3d 85094->85096 85096->84875 85098 411523 85097->85098 85099 4114ba 85097->85099 85783 4113a8 58 API calls 3 library calls 85098->85783 85104 40200c 85099->85104 85781 417f77 46 API calls __getptd_noexit 85099->85781 85102 4114c6 85782 417f25 10 API calls __mbsnbicoll_l 85102->85782 85104->84878 85104->84879 85105->84906 85106->84909 85107->84914 85108->84914 85110 4026f0 52 API calls 85109->85110 85111 401c97 85110->85111 85111->85037 85112->85047 85113->85046 85174 40f6f0 85114->85174 85116 40f77b _strcat ctype 85182 40f850 85116->85182 85122 40f7fc 85123 427c2a 85122->85123 85124 40f804 85122->85124 85211 414d04 85123->85211 85198 414a46 85124->85198 85128 40f80e 85128->85052 85133 4528bd 85128->85133 85130 427c59 85217 414fe2 85130->85217 85132 427c79 85134 4150d1 _fseek 81 API calls 85133->85134 85135 452930 85134->85135 85714 452719 85135->85714 85138 452948 85138->85054 85139 414d04 __fread_nolock 61 API calls 85140 452966 85139->85140 85141 414d04 __fread_nolock 61 API calls 85140->85141 85142 452976 85141->85142 85143 414d04 __fread_nolock 61 API calls 85142->85143 85144 45298f 85143->85144 85145 414d04 __fread_nolock 61 API calls 85144->85145 85146 4529aa 85145->85146 85147 4150d1 _fseek 81 API calls 85146->85147 85148 4529c4 85147->85148 85149 4135bb _malloc 46 API calls 85148->85149 85150 4529cf 85149->85150 85151 4135bb _malloc 46 API calls 85150->85151 85152 4529db 85151->85152 85153 414d04 __fread_nolock 61 API calls 85152->85153 85154 4529ec 85153->85154 85155 44afef GetSystemTimeAsFileTime 85154->85155 85156 452a00 85155->85156 85157 452a36 85156->85157 85158 452a13 85156->85158 85160 452aa5 85157->85160 85161 452a3c 85157->85161 85159 413748 _free 46 API calls 85158->85159 85162 452a1c 85159->85162 85164 413748 _free 46 API calls 85160->85164 85720 44b1a9 85161->85720 85165 413748 _free 46 API calls 85162->85165 85167 452aa3 85164->85167 85168 452a25 85165->85168 85166 452a9d 85169 413748 _free 46 API calls 85166->85169 85167->85054 85168->85054 85169->85167 85171 431e64 85170->85171 85173 431e6a 85170->85173 85172 414a46 __fcloseall 82 API calls 85171->85172 85172->85173 85173->85055 85175 425de2 85174->85175 85177 40f6fc _wcslen 85174->85177 85175->85116 85176 40f710 WideCharToMultiByte 85178 40f756 85176->85178 85179 40f728 85176->85179 85177->85176 85178->85116 85180 4115d7 52 API calls 85179->85180 85181 40f735 WideCharToMultiByte 85180->85181 85181->85116 85183 40f85d __localtime64_s _strlen 85182->85183 85185 40f7ab 85183->85185 85230 414db8 85183->85230 85186 4149c2 85185->85186 85242 414904 85186->85242 85188 40f7e9 85188->85123 85189 40f5c0 85188->85189 85193 40f5cd _strcat __write_nolock _memmove 85189->85193 85190 414d04 __fread_nolock 61 API calls 85190->85193 85191 40f691 __tzset_nolock 85191->85122 85193->85190 85193->85191 85194 425d11 85193->85194 85330 4150d1 85193->85330 85195 4150d1 _fseek 81 API calls 85194->85195 85196 425d33 85195->85196 85197 414d04 __fread_nolock 61 API calls 85196->85197 85197->85191 85199 414a52 __tsopen_nolock 85198->85199 85200 414a64 85199->85200 85201 414a79 85199->85201 85470 417f77 46 API calls __getptd_noexit 85200->85470 85204 415471 __lock_file 47 API calls 85201->85204 85209 414a74 __tsopen_nolock 85201->85209 85203 414a69 85471 417f25 10 API calls __mbsnbicoll_l 85203->85471 85206 414a92 85204->85206 85454 4149d9 85206->85454 85209->85128 85539 414c76 85211->85539 85213 414d1c 85214 44afef 85213->85214 85707 442c5a 85214->85707 85216 44b00d 85216->85130 85218 414fee __tsopen_nolock 85217->85218 85219 414ffa 85218->85219 85220 41500f 85218->85220 85711 417f77 46 API calls __getptd_noexit 85219->85711 85222 415471 __lock_file 47 API calls 85220->85222 85224 415017 85222->85224 85223 414fff 85712 417f25 10 API calls __mbsnbicoll_l 85223->85712 85226 414e4e __ftell_nolock 51 API calls 85224->85226 85227 415024 85226->85227 85713 41503d LeaveCriticalSection LeaveCriticalSection __wfsopen 85227->85713 85228 41500a __tsopen_nolock 85228->85132 85231 414dd6 85230->85231 85232 414deb 85230->85232 85239 417f77 46 API calls __getptd_noexit 85231->85239 85232->85231 85234 414df2 85232->85234 85238 414de6 85234->85238 85241 418f98 77 API calls 5 library calls 85234->85241 85235 414ddb 85240 417f25 10 API calls __mbsnbicoll_l 85235->85240 85238->85183 85239->85235 85240->85238 85241->85238 85245 414910 __tsopen_nolock 85242->85245 85243 414923 85298 417f77 46 API calls __getptd_noexit 85243->85298 85245->85243 85247 414951 85245->85247 85246 414928 85299 417f25 10 API calls __mbsnbicoll_l 85246->85299 85261 41d4d1 85247->85261 85250 414956 85251 41496a 85250->85251 85252 41495d 85250->85252 85254 414992 85251->85254 85255 414972 85251->85255 85300 417f77 46 API calls __getptd_noexit 85252->85300 85278 41d218 85254->85278 85301 417f77 46 API calls __getptd_noexit 85255->85301 85258 414933 __tsopen_nolock @_EH4_CallFilterFunc@8 85258->85188 85262 41d4dd __tsopen_nolock 85261->85262 85263 4182cb __lock 46 API calls 85262->85263 85271 41d4eb 85263->85271 85264 41d560 85303 41d5fb 85264->85303 85265 41d567 85267 416b04 __malloc_crt 46 API calls 85265->85267 85269 41d56e 85267->85269 85268 41d5f0 __tsopen_nolock 85268->85250 85269->85264 85270 41d57c InitializeCriticalSectionAndSpinCount 85269->85270 85272 41d59c 85270->85272 85273 41d5af EnterCriticalSection 85270->85273 85271->85264 85271->85265 85274 418209 __mtinitlocknum 46 API calls 85271->85274 85306 4154b2 47 API calls __lock 85271->85306 85307 415520 LeaveCriticalSection LeaveCriticalSection _doexit 85271->85307 85276 413748 _free 46 API calls 85272->85276 85273->85264 85274->85271 85276->85264 85279 41d23a 85278->85279 85280 41d255 85279->85280 85292 41d26c __wopenfile 85279->85292 85312 417f77 46 API calls __getptd_noexit 85280->85312 85282 41d421 85285 41d47a 85282->85285 85286 41d48c 85282->85286 85283 41d25a 85313 417f25 10 API calls __mbsnbicoll_l 85283->85313 85317 417f77 46 API calls __getptd_noexit 85285->85317 85309 422bf9 85286->85309 85289 41499d 85302 4149b8 LeaveCriticalSection LeaveCriticalSection __wfsopen 85289->85302 85290 41d47f 85318 417f25 10 API calls __mbsnbicoll_l 85290->85318 85292->85282 85292->85285 85292->85292 85314 41341f 58 API calls 2 library calls 85292->85314 85294 41d41a 85294->85282 85315 41341f 58 API calls 2 library calls 85294->85315 85296 41d439 85296->85282 85316 41341f 58 API calls 2 library calls 85296->85316 85298->85246 85299->85258 85300->85258 85301->85258 85302->85258 85308 4181f2 LeaveCriticalSection 85303->85308 85305 41d602 85305->85268 85306->85271 85307->85271 85308->85305 85319 422b35 85309->85319 85311 422c14 85311->85289 85312->85283 85313->85289 85314->85294 85315->85296 85316->85282 85317->85290 85318->85289 85321 422b41 __tsopen_nolock 85319->85321 85320 422b54 85322 417f77 __mbsnbicoll_l 46 API calls 85320->85322 85321->85320 85323 422b8a 85321->85323 85324 422b59 85322->85324 85325 422400 __tsopen_nolock 109 API calls 85323->85325 85326 417f25 __mbsnbicoll_l 10 API calls 85324->85326 85327 422ba4 85325->85327 85329 422b63 __tsopen_nolock 85326->85329 85328 422bcb __wsopen_helper LeaveCriticalSection 85327->85328 85328->85329 85329->85311 85332 4150dd __tsopen_nolock 85330->85332 85331 4150e9 85361 417f77 46 API calls __getptd_noexit 85331->85361 85332->85331 85333 41510f 85332->85333 85343 415471 85333->85343 85336 4150ee 85362 417f25 10 API calls __mbsnbicoll_l 85336->85362 85342 4150f9 __tsopen_nolock 85342->85193 85344 415483 85343->85344 85345 4154a5 EnterCriticalSection 85343->85345 85344->85345 85346 41548b 85344->85346 85347 415117 85345->85347 85348 4182cb __lock 46 API calls 85346->85348 85349 415047 85347->85349 85348->85347 85350 415067 85349->85350 85351 415057 85349->85351 85356 415079 85350->85356 85364 414e4e 85350->85364 85419 417f77 46 API calls __getptd_noexit 85351->85419 85355 41505c 85363 415143 LeaveCriticalSection LeaveCriticalSection __wfsopen 85355->85363 85381 41443c 85356->85381 85359 4150b9 85394 41e1f4 85359->85394 85361->85336 85362->85342 85363->85342 85365 414e61 85364->85365 85366 414e79 85364->85366 85420 417f77 46 API calls __getptd_noexit 85365->85420 85368 414139 __flsbuf 46 API calls 85366->85368 85370 414e80 85368->85370 85369 414e66 85421 417f25 10 API calls __mbsnbicoll_l 85369->85421 85372 41e1f4 __write 51 API calls 85370->85372 85373 414e97 85372->85373 85374 414f09 85373->85374 85376 414ec9 85373->85376 85380 414e71 85373->85380 85422 417f77 46 API calls __getptd_noexit 85374->85422 85377 41e1f4 __write 51 API calls 85376->85377 85376->85380 85378 414f64 85377->85378 85379 41e1f4 __write 51 API calls 85378->85379 85378->85380 85379->85380 85380->85356 85382 414477 85381->85382 85383 414455 85381->85383 85387 414139 85382->85387 85383->85382 85384 414139 __flsbuf 46 API calls 85383->85384 85385 414470 85384->85385 85423 41b7b2 77 API calls 5 library calls 85385->85423 85388 414145 85387->85388 85389 41415a 85387->85389 85424 417f77 46 API calls __getptd_noexit 85388->85424 85389->85359 85391 41414a 85425 417f25 10 API calls __mbsnbicoll_l 85391->85425 85393 414155 85393->85359 85395 41e200 __tsopen_nolock 85394->85395 85396 41e223 85395->85396 85397 41e208 85395->85397 85399 41e22f 85396->85399 85402 41e269 85396->85402 85446 417f8a 46 API calls __getptd_noexit 85397->85446 85448 417f8a 46 API calls __getptd_noexit 85399->85448 85400 41e20d 85447 417f77 46 API calls __getptd_noexit 85400->85447 85426 41ae56 85402->85426 85404 41e234 85449 417f77 46 API calls __getptd_noexit 85404->85449 85407 41e26f 85409 41e291 85407->85409 85410 41e27d 85407->85410 85408 41e23c 85450 417f25 10 API calls __mbsnbicoll_l 85408->85450 85451 417f77 46 API calls __getptd_noexit 85409->85451 85436 41e17f 85410->85436 85412 41e215 __tsopen_nolock 85412->85355 85415 41e289 85453 41e2c0 LeaveCriticalSection __unlock_fhandle 85415->85453 85416 41e296 85452 417f8a 46 API calls __getptd_noexit 85416->85452 85419->85355 85420->85369 85421->85380 85422->85380 85423->85382 85424->85391 85425->85393 85427 41ae62 __tsopen_nolock 85426->85427 85428 41aebc 85427->85428 85430 4182cb __lock 46 API calls 85427->85430 85429 41aec1 EnterCriticalSection 85428->85429 85431 41aede __tsopen_nolock 85428->85431 85429->85431 85432 41ae8e 85430->85432 85431->85407 85433 41aeaa 85432->85433 85434 41ae97 InitializeCriticalSectionAndSpinCount 85432->85434 85435 41aeec ___lock_fhandle LeaveCriticalSection 85433->85435 85434->85433 85435->85428 85437 41aded __lseek_nolock 46 API calls 85436->85437 85438 41e18e 85437->85438 85439 41e1a4 SetFilePointer 85438->85439 85440 41e194 85438->85440 85442 41e1c3 85439->85442 85443 41e1bb GetLastError 85439->85443 85441 417f77 __mbsnbicoll_l 46 API calls 85440->85441 85445 41e199 85441->85445 85444 417f9d __dosmaperr 46 API calls 85442->85444 85442->85445 85443->85442 85444->85445 85445->85415 85446->85400 85447->85412 85448->85404 85449->85408 85450->85412 85451->85416 85452->85415 85453->85412 85455 4149ea 85454->85455 85456 4149fe 85454->85456 85500 417f77 46 API calls __getptd_noexit 85455->85500 85457 4149fa 85456->85457 85459 41443c __flush 77 API calls 85456->85459 85472 414ab2 LeaveCriticalSection LeaveCriticalSection __wfsopen 85457->85472 85461 414a0a 85459->85461 85460 4149ef 85501 417f25 10 API calls __mbsnbicoll_l 85460->85501 85473 41d8c2 85461->85473 85465 414139 __flsbuf 46 API calls 85466 414a18 85465->85466 85477 41d7fe 85466->85477 85468 414a1e 85468->85457 85469 413748 _free 46 API calls 85468->85469 85469->85457 85470->85203 85471->85209 85472->85209 85474 414a12 85473->85474 85475 41d8d2 85473->85475 85474->85465 85475->85474 85476 413748 _free 46 API calls 85475->85476 85476->85474 85478 41d80a __tsopen_nolock 85477->85478 85479 41d812 85478->85479 85480 41d82d 85478->85480 85517 417f8a 46 API calls __getptd_noexit 85479->85517 85482 41d839 85480->85482 85486 41d873 85480->85486 85519 417f8a 46 API calls __getptd_noexit 85482->85519 85484 41d817 85518 417f77 46 API calls __getptd_noexit 85484->85518 85485 41d83e 85520 417f77 46 API calls __getptd_noexit 85485->85520 85489 41ae56 ___lock_fhandle 48 API calls 85486->85489 85491 41d879 85489->85491 85490 41d846 85521 417f25 10 API calls __mbsnbicoll_l 85490->85521 85493 41d893 85491->85493 85494 41d887 85491->85494 85522 417f77 46 API calls __getptd_noexit 85493->85522 85502 41d762 85494->85502 85497 41d81f __tsopen_nolock 85497->85468 85498 41d88d 85523 41d8ba LeaveCriticalSection __unlock_fhandle 85498->85523 85500->85460 85501->85457 85524 41aded 85502->85524 85504 41d7c8 85537 41ad67 47 API calls 2 library calls 85504->85537 85506 41d772 85506->85504 85507 41d7a6 85506->85507 85510 41aded __lseek_nolock 46 API calls 85506->85510 85507->85504 85508 41aded __lseek_nolock 46 API calls 85507->85508 85512 41d7b2 CloseHandle 85508->85512 85509 41d7d0 85513 41d7f2 85509->85513 85538 417f9d 46 API calls 3 library calls 85509->85538 85511 41d79d 85510->85511 85514 41aded __lseek_nolock 46 API calls 85511->85514 85512->85504 85515 41d7be GetLastError 85512->85515 85513->85498 85514->85507 85515->85504 85517->85484 85518->85497 85519->85485 85520->85490 85521->85497 85522->85498 85523->85497 85525 41ae12 85524->85525 85526 41adfa 85524->85526 85529 417f8a __tsopen_nolock 46 API calls 85525->85529 85530 41ae51 85525->85530 85527 417f8a __tsopen_nolock 46 API calls 85526->85527 85528 41adff 85527->85528 85531 417f77 __mbsnbicoll_l 46 API calls 85528->85531 85532 41ae23 85529->85532 85530->85506 85536 41ae07 85531->85536 85533 417f77 __mbsnbicoll_l 46 API calls 85532->85533 85534 41ae2b 85533->85534 85535 417f25 __mbsnbicoll_l 10 API calls 85534->85535 85535->85536 85536->85506 85537->85509 85538->85513 85540 414c82 __tsopen_nolock 85539->85540 85541 414cc3 85540->85541 85542 414cbb __tsopen_nolock 85540->85542 85545 414c96 __localtime64_s 85540->85545 85543 415471 __lock_file 47 API calls 85541->85543 85542->85213 85544 414ccb 85543->85544 85552 414aba 85544->85552 85566 417f77 46 API calls __getptd_noexit 85545->85566 85548 414cb0 85567 417f25 10 API calls __mbsnbicoll_l 85548->85567 85553 414af2 85552->85553 85557 414ad8 __localtime64_s 85552->85557 85568 414cfa LeaveCriticalSection LeaveCriticalSection __wfsopen 85553->85568 85554 414ae2 85619 417f77 46 API calls __getptd_noexit 85554->85619 85556 414ae7 85620 417f25 10 API calls __mbsnbicoll_l 85556->85620 85557->85553 85557->85554 85563 414b2d 85557->85563 85560 414c38 __localtime64_s 85622 417f77 46 API calls __getptd_noexit 85560->85622 85561 414139 __flsbuf 46 API calls 85561->85563 85563->85553 85563->85560 85563->85561 85569 41dfcc 85563->85569 85599 41d8f3 85563->85599 85621 41e0c2 46 API calls 3 library calls 85563->85621 85566->85548 85567->85542 85568->85542 85570 41dfd8 __tsopen_nolock 85569->85570 85571 41dfe0 85570->85571 85572 41dffb 85570->85572 85692 417f8a 46 API calls __getptd_noexit 85571->85692 85573 41e007 85572->85573 85578 41e041 85572->85578 85694 417f8a 46 API calls __getptd_noexit 85573->85694 85576 41dfe5 85693 417f77 46 API calls __getptd_noexit 85576->85693 85577 41e00c 85695 417f77 46 API calls __getptd_noexit 85577->85695 85581 41e063 85578->85581 85582 41e04e 85578->85582 85583 41ae56 ___lock_fhandle 48 API calls 85581->85583 85697 417f8a 46 API calls __getptd_noexit 85582->85697 85585 41e069 85583->85585 85587 41e077 85585->85587 85588 41e08b 85585->85588 85586 41e053 85698 417f77 46 API calls __getptd_noexit 85586->85698 85623 41da15 85587->85623 85699 417f77 46 API calls __getptd_noexit 85588->85699 85593 41e014 85696 417f25 10 API calls __mbsnbicoll_l 85593->85696 85594 41e083 85701 41e0ba LeaveCriticalSection __unlock_fhandle 85594->85701 85595 41e090 85700 417f8a 46 API calls __getptd_noexit 85595->85700 85598 41dfed __tsopen_nolock 85598->85563 85600 41d900 85599->85600 85604 41d915 85599->85604 85705 417f77 46 API calls __getptd_noexit 85600->85705 85602 41d905 85706 417f25 10 API calls __mbsnbicoll_l 85602->85706 85605 41d94a 85604->85605 85610 41d910 85604->85610 85702 420603 85604->85702 85607 414139 __flsbuf 46 API calls 85605->85607 85608 41d95e 85607->85608 85609 41dfcc __read 59 API calls 85608->85609 85611 41d965 85609->85611 85610->85563 85611->85610 85612 414139 __flsbuf 46 API calls 85611->85612 85613 41d988 85612->85613 85613->85610 85614 414139 __flsbuf 46 API calls 85613->85614 85615 41d994 85614->85615 85615->85610 85616 414139 __flsbuf 46 API calls 85615->85616 85617 41d9a1 85616->85617 85618 414139 __flsbuf 46 API calls 85617->85618 85618->85610 85619->85556 85620->85553 85621->85563 85622->85556 85624 41da31 85623->85624 85625 41da4c 85623->85625 85626 417f8a __tsopen_nolock 46 API calls 85624->85626 85627 41da5b 85625->85627 85629 41da7a 85625->85629 85628 41da36 85626->85628 85630 417f8a __tsopen_nolock 46 API calls 85627->85630 85631 417f77 __mbsnbicoll_l 46 API calls 85628->85631 85633 41da98 85629->85633 85645 41daac 85629->85645 85632 41da60 85630->85632 85646 41da3e 85631->85646 85635 417f77 __mbsnbicoll_l 46 API calls 85632->85635 85636 417f8a __tsopen_nolock 46 API calls 85633->85636 85634 41db02 85639 417f8a __tsopen_nolock 46 API calls 85634->85639 85638 41da67 85635->85638 85637 41da9d 85636->85637 85640 417f77 __mbsnbicoll_l 46 API calls 85637->85640 85641 417f25 __mbsnbicoll_l 10 API calls 85638->85641 85642 41db07 85639->85642 85644 41daa4 85640->85644 85641->85646 85643 417f77 __mbsnbicoll_l 46 API calls 85642->85643 85643->85644 85648 417f25 __mbsnbicoll_l 10 API calls 85644->85648 85645->85634 85645->85646 85647 41dae1 85645->85647 85649 41db1b 85645->85649 85646->85594 85647->85634 85652 41daec ReadFile 85647->85652 85648->85646 85651 416b04 __malloc_crt 46 API calls 85649->85651 85653 41db31 85651->85653 85654 41dc17 85652->85654 85655 41df8f GetLastError 85652->85655 85658 41db59 85653->85658 85659 41db3b 85653->85659 85654->85655 85660 41dc2b 85654->85660 85656 41de16 85655->85656 85657 41df9c 85655->85657 85667 417f9d __dosmaperr 46 API calls 85656->85667 85689 41dd9b 85656->85689 85662 417f77 __mbsnbicoll_l 46 API calls 85657->85662 85661 420494 __lseeki64_nolock 48 API calls 85658->85661 85663 417f77 __mbsnbicoll_l 46 API calls 85659->85663 85668 41dc47 85660->85668 85669 41de5b 85660->85669 85660->85689 85664 41db67 85661->85664 85665 41dfa1 85662->85665 85666 41db40 85663->85666 85664->85652 85670 417f8a __tsopen_nolock 46 API calls 85665->85670 85671 417f8a __tsopen_nolock 46 API calls 85666->85671 85667->85689 85673 41dcab ReadFile 85668->85673 85679 41dd28 85668->85679 85674 41ded0 ReadFile 85669->85674 85669->85689 85670->85689 85671->85646 85672 413748 _free 46 API calls 85672->85646 85675 41dcc9 GetLastError 85673->85675 85682 41dcd3 85673->85682 85676 41deef GetLastError 85674->85676 85683 41def9 85674->85683 85675->85668 85675->85682 85676->85669 85676->85683 85677 41ddec MultiByteToWideChar 85678 41de10 GetLastError 85677->85678 85677->85689 85678->85656 85680 41dda3 85679->85680 85681 41dd96 85679->85681 85685 41dd60 85679->85685 85679->85689 85680->85685 85686 41ddda 85680->85686 85684 417f77 __mbsnbicoll_l 46 API calls 85681->85684 85682->85668 85687 420494 __lseeki64_nolock 48 API calls 85682->85687 85683->85669 85688 420494 __lseeki64_nolock 48 API calls 85683->85688 85684->85689 85685->85677 85690 420494 __lseeki64_nolock 48 API calls 85686->85690 85687->85682 85688->85683 85689->85646 85689->85672 85691 41dde9 85690->85691 85691->85677 85692->85576 85693->85598 85694->85577 85695->85593 85696->85598 85697->85586 85698->85593 85699->85595 85700->85594 85701->85598 85703 416b04 __malloc_crt 46 API calls 85702->85703 85704 420618 85703->85704 85704->85605 85705->85602 85706->85610 85710 4148b3 GetSystemTimeAsFileTime __aulldiv 85707->85710 85709 442c6b 85709->85216 85710->85709 85711->85223 85712->85228 85713->85228 85718 45272f __tzset_nolock _wcscpy 85714->85718 85715 4528a4 85715->85138 85715->85139 85716 414d04 61 API calls __fread_nolock 85716->85718 85717 44afef GetSystemTimeAsFileTime 85717->85718 85718->85715 85718->85716 85718->85717 85719 4150d1 81 API calls _fseek 85718->85719 85719->85718 85721 44b1bc 85720->85721 85722 44b1ca 85720->85722 85723 4149c2 116 API calls 85721->85723 85724 44b1e1 85722->85724 85725 4149c2 116 API calls 85722->85725 85726 44b1d8 85722->85726 85723->85722 85755 4321a4 85724->85755 85727 44b2db 85725->85727 85726->85166 85727->85724 85729 44b2e9 85727->85729 85731 44b2f6 85729->85731 85734 414a46 __fcloseall 82 API calls 85729->85734 85730 44b224 85732 44b253 85730->85732 85733 44b228 85730->85733 85731->85166 85759 43213d 85732->85759 85736 44b235 85733->85736 85739 414a46 __fcloseall 82 API calls 85733->85739 85734->85731 85737 44b245 85736->85737 85740 414a46 __fcloseall 82 API calls 85736->85740 85737->85166 85738 44b25a 85741 44b260 85738->85741 85742 44b289 85738->85742 85739->85736 85740->85737 85744 44b26d 85741->85744 85746 414a46 __fcloseall 82 API calls 85741->85746 85769 44b0bf 87 API calls 85742->85769 85747 44b27d 85744->85747 85749 414a46 __fcloseall 82 API calls 85744->85749 85745 44b28f 85770 4320f8 46 API calls _free 85745->85770 85746->85744 85747->85166 85749->85747 85750 44b295 85751 44b2a2 85750->85751 85752 414a46 __fcloseall 82 API calls 85750->85752 85753 44b2b2 85751->85753 85754 414a46 __fcloseall 82 API calls 85751->85754 85752->85751 85753->85166 85754->85753 85756 4321cb 85755->85756 85758 4321b4 __tzset_nolock _memmove 85755->85758 85757 414d04 __fread_nolock 61 API calls 85756->85757 85757->85758 85758->85730 85760 4135bb _malloc 46 API calls 85759->85760 85761 432150 85760->85761 85762 4135bb _malloc 46 API calls 85761->85762 85763 432162 85762->85763 85764 4135bb _malloc 46 API calls 85763->85764 85765 432174 85764->85765 85767 432189 85765->85767 85771 4320f8 46 API calls _free 85765->85771 85767->85738 85768 432198 85768->85738 85769->85745 85770->85750 85771->85768 85772->85068 85773->85071 85774->85089 85775->85089 85776->85089 85777->85080 85778->85089 85779->85089 85780->85093 85781->85102 85782->85104 85783->85104 85833 410160 85784->85833 85786 41012f GetFullPathNameW 85787 410147 ctype 85786->85787 85787->84923 85789 4102cb SHGetDesktopFolder 85788->85789 85792 410333 _wcsncpy 85788->85792 85790 4102e0 _wcsncpy 85789->85790 85789->85792 85791 41031c SHGetPathFromIDListW 85790->85791 85790->85792 85791->85792 85792->84927 85794 4101bb 85793->85794 85799 425f4a 85793->85799 85795 410160 52 API calls 85794->85795 85796 4101c7 85795->85796 85837 410200 52 API calls 2 library calls 85796->85837 85797 4114ab __wcsicoll 58 API calls 85797->85799 85799->85797 85801 425f6e 85799->85801 85800 4101d6 85838 410200 52 API calls 2 library calls 85800->85838 85801->84929 85803 4101e9 85803->84929 85805 40f760 126 API calls 85804->85805 85806 40f584 85805->85806 85807 429335 85806->85807 85808 40f58c 85806->85808 85811 4528bd 118 API calls 85807->85811 85809 40f598 85808->85809 85810 429358 85808->85810 85863 4033c0 113 API calls 7 library calls 85809->85863 85864 434034 86 API calls _wprintf 85810->85864 85813 42934b 85811->85813 85816 429373 85813->85816 85817 42934f 85813->85817 85815 40f5b4 85815->84926 85819 4115d7 52 API calls 85816->85819 85820 431e58 82 API calls 85817->85820 85818 429369 85818->85816 85832 4293c5 ctype 85819->85832 85820->85810 85821 42959c 85822 413748 _free 46 API calls 85821->85822 85823 4295a5 85822->85823 85824 431e58 82 API calls 85823->85824 85825 4295b1 85824->85825 85829 401b10 52 API calls 85829->85832 85832->85821 85832->85829 85839 444af8 85832->85839 85842 44b41c 85832->85842 85849 402780 85832->85849 85857 4022d0 85832->85857 85865 44c7dd 64 API calls 3 library calls 85832->85865 85834 410167 _wcslen 85833->85834 85835 4115d7 52 API calls 85834->85835 85836 41017e _wcscpy 85835->85836 85836->85786 85837->85800 85838->85803 85840 4115d7 52 API calls 85839->85840 85841 444b27 _memmove 85840->85841 85841->85832 85843 44b429 85842->85843 85844 4115d7 52 API calls 85843->85844 85845 44b440 85844->85845 85846 44b45e 85845->85846 85847 401b10 52 API calls 85845->85847 85846->85832 85848 44b453 85847->85848 85848->85832 85850 402790 ctype _memmove 85849->85850 85851 402827 85849->85851 85852 4115d7 52 API calls 85850->85852 85853 4115d7 52 API calls 85851->85853 85855 402797 85852->85855 85853->85850 85854 4027bd 85854->85832 85855->85854 85856 4115d7 52 API calls 85855->85856 85856->85854 85858 4022e0 85857->85858 85861 40239d 85857->85861 85859 4115d7 52 API calls 85858->85859 85858->85861 85862 402320 ctype 85858->85862 85859->85862 85860 4115d7 52 API calls 85860->85862 85861->85832 85862->85860 85862->85861 85863->85815 85864->85818 85865->85832 85867 402417 85866->85867 85871 402539 ctype 85866->85871 85868 4115d7 52 API calls 85867->85868 85867->85871 85869 402443 85868->85869 85870 4115d7 52 API calls 85869->85870 85873 4024b4 85870->85873 85871->84933 85873->85871 85874 4022d0 52 API calls 85873->85874 85895 402880 95 API calls 2 library calls 85873->85895 85874->85873 85880 401566 85875->85880 85876 401794 85896 40e9a0 90 API calls 85876->85896 85879 4010a0 52 API calls 85879->85880 85880->85876 85880->85879 85882 40167a 85880->85882 85881 4017c0 85881->84935 85882->85881 85897 45e737 90 API calls 3 library calls 85882->85897 85884 40bc70 52 API calls 85883->85884 85893 40d451 85884->85893 85885 40d50f 85900 410600 52 API calls 85885->85900 85887 427c01 85901 45e737 90 API calls 3 library calls 85887->85901 85888 40e0a0 52 API calls 85888->85893 85890 401b10 52 API calls 85890->85893 85891 40d519 85891->84938 85893->85885 85893->85887 85893->85888 85893->85890 85893->85891 85898 40f310 53 API calls 85893->85898 85899 40d860 91 API calls 85893->85899 85895->85873 85896->85882 85897->85881 85898->85893 85899->85893 85900->85891 85901->85891 85902->84951 85903->84952 85905 42c5fe 85904->85905 85920 4091c6 85904->85920 85906 40bc70 52 API calls 85905->85906 85905->85920 85907 42c64e InterlockedIncrement 85906->85907 85908 42c665 85907->85908 85913 42c697 85907->85913 85910 42c672 InterlockedDecrement Sleep InterlockedIncrement 85908->85910 85908->85913 85909 42c737 InterlockedDecrement 85911 42c74a 85909->85911 85910->85908 85910->85913 85914 408f40 VariantClear 85911->85914 85912 42c731 85912->85909 85913->85909 85913->85912 86197 408e80 85913->86197 85916 42c752 85914->85916 86206 410c60 VariantClear ctype 85916->86206 85920->85015 85921 42c6db 85922 402160 52 API calls 85921->85922 85923 42c6e5 85922->85923 86202 45340c 85 API calls 85923->86202 85925 42c6f1 86203 40d200 52 API calls 2 library calls 85925->86203 85927 42c6fb 86204 465124 53 API calls 85927->86204 85929 42c715 85930 42c76a 85929->85930 85931 42c719 85929->85931 85932 401b10 52 API calls 85930->85932 86205 46fe32 VariantClear 85931->86205 85934 42c77e 85932->85934 85935 401980 53 API calls 85934->85935 85940 42c796 85935->85940 85936 42c812 86213 46fe32 VariantClear 85936->86213 85938 42c82a InterlockedDecrement 86214 46ff07 54 API calls 85938->86214 85940->85936 85942 42c864 85940->85942 86207 40ba10 85940->86207 85941 42c849 85944 42c9ec 85941->85944 85950 408f40 VariantClear 85941->85950 85956 402780 52 API calls 85941->85956 85959 401980 53 API calls 85941->85959 86217 40a780 85941->86217 86215 45e737 90 API calls 3 library calls 85942->86215 86258 47d33e 331 API calls 85944->86258 85947 42c9fe 86259 46feb1 VariantClear VariantClear 85947->86259 85949 42c874 85952 408f40 VariantClear 85949->85952 85961 42ca59 85949->85961 85950->85941 85951 42ca08 85955 42c891 85952->85955 86216 410c60 VariantClear ctype 85955->86216 85956->85941 85959->85941 85961->85961 85963 40afc4 85962->85963 85964 40b156 85962->85964 85965 40afd5 85963->85965 85966 42d1e3 85963->85966 86269 45e737 90 API calls 3 library calls 85964->86269 85970 40a780 194 API calls 85965->85970 85987 40b11a ctype 85965->85987 86270 45e737 90 API calls 3 library calls 85966->86270 85969 40b143 85969->85015 85972 40b00a 85970->85972 85971 42d1f8 85975 408f40 VariantClear 85971->85975 85972->85971 85976 40b012 85972->85976 85974 42d4db 85974->85974 85975->85969 85977 40b04a 85976->85977 85979 42d231 VariantClear 85976->85979 85980 40b094 ctype 85976->85980 85984 40b05c ctype 85977->85984 86271 40e270 VariantClear ctype 85977->86271 85978 40b108 85978->85987 86272 40e270 VariantClear ctype 85978->86272 85979->85984 85980->85978 85982 42d425 ctype 85980->85982 85981 42d45a VariantClear 85981->85987 85982->85981 85982->85987 85984->85980 85986 4115d7 52 API calls 85984->85986 85986->85980 85987->85969 86273 45e737 90 API calls 3 library calls 85987->86273 85989 408fff 85988->85989 86001 40900d 85988->86001 86274 403ea0 52 API calls __cinit 85989->86274 85992 42c3f6 86277 45e737 90 API calls 3 library calls 85992->86277 85994 40a780 194 API calls 85994->86001 85995 42c44a 86279 45e737 90 API calls 3 library calls 85995->86279 85996 42c47b 86280 451b42 61 API calls 85996->86280 85999 42c564 86005 408f40 VariantClear 85999->86005 86001->85992 86001->85994 86001->85995 86001->85996 86001->85999 86002 42c4cb 86001->86002 86004 42c548 86001->86004 86008 409112 86001->86008 86010 4090df 86001->86010 86012 42c528 86001->86012 86014 4090ea 86001->86014 86022 4090f2 ctype 86001->86022 86276 4534e3 52 API calls 86001->86276 86278 40c4e0 194 API calls 86001->86278 86282 47faae 233 API calls 86002->86282 86285 45e737 90 API calls 3 library calls 86004->86285 86005->86022 86006 42c491 86006->86022 86281 45e737 90 API calls 3 library calls 86006->86281 86007 42c4da 86007->86022 86283 45e737 90 API calls 3 library calls 86007->86283 86008->86004 86017 40912b 86008->86017 86010->86014 86015 408e80 VariantClear 86010->86015 86284 45e737 90 API calls 3 library calls 86012->86284 86018 408f40 VariantClear 86014->86018 86015->86014 86017->86022 86275 403e10 53 API calls 86017->86275 86018->86022 86020 40914b 86021 408f40 VariantClear 86020->86021 86021->86022 86022->85015 86286 408d90 86023->86286 86025 429778 86314 410c60 VariantClear ctype 86025->86314 86027 429780 86028 408cf9 86028->86025 86029 42976c 86028->86029 86031 408d2d 86028->86031 86313 45e737 90 API calls 3 library calls 86029->86313 86302 403d10 86031->86302 86034 408d71 ctype 86034->85015 86035 408f40 VariantClear 86036 408d45 ctype 86035->86036 86036->86034 86036->86035 86038 425c87 86037->86038 86039 40d15f 86037->86039 86040 425cc7 86038->86040 86041 425ca1 TranslateAcceleratorW 86038->86041 86039->85015 86041->86039 86043 42602f 86042->86043 86046 40d17f 86042->86046 86043->85015 86044 42608e IsDialogMessageW 86045 40d18c 86044->86045 86044->86046 86045->85015 86046->86044 86046->86045 86653 430c46 GetClassLongW 86046->86653 86049 4096c6 _wcslen 86048->86049 86050 4115d7 52 API calls 86049->86050 86112 40a70c ctype _memmove 86049->86112 86051 4096fa _memmove 86050->86051 86052 4115d7 52 API calls 86051->86052 86054 40971b 86052->86054 86053 4013a0 52 API calls 86055 4297aa 86053->86055 86056 409749 CharUpperBuffW 86054->86056 86059 40976a ctype 86054->86059 86054->86112 86057 4115d7 52 API calls 86055->86057 86056->86059 86098 4297d1 _memmove 86057->86098 86107 4097e5 ctype 86059->86107 86655 47dcbb 196 API calls 86059->86655 86061 408f40 VariantClear 86062 42ae92 86061->86062 86681 410c60 VariantClear ctype 86062->86681 86064 42aea4 86065 409aa2 86067 4115d7 52 API calls 86065->86067 86072 409afe 86065->86072 86065->86098 86066 40a689 86069 4115d7 52 API calls 86066->86069 86067->86072 86068 4115d7 52 API calls 86068->86107 86085 40a6af ctype _memmove 86069->86085 86070 409b2a 86074 429dbe 86070->86074 86140 409b4d ctype _memmove 86070->86140 86662 40b400 VariantClear VariantClear ctype 86070->86662 86071 40c2c0 52 API calls 86071->86107 86072->86070 86073 4115d7 52 API calls 86072->86073 86075 429d31 86073->86075 86080 429dd3 86074->86080 86663 40b400 VariantClear VariantClear ctype 86074->86663 86079 429d42 86075->86079 86659 44a801 52 API calls 86075->86659 86076 429a46 VariantClear 86076->86107 86077 409fd2 86083 40a045 86077->86083 86135 42a3f5 86077->86135 86089 40e0a0 52 API calls 86079->86089 86080->86140 86664 40e1c0 VariantClear ctype 86080->86664 86087 4115d7 52 API calls 86083->86087 86084 408f40 VariantClear 86084->86107 86092 4115d7 52 API calls 86085->86092 86093 40a04c 86087->86093 86094 429d57 86089->86094 86092->86112 86097 40a0a7 86093->86097 86101 4091e0 317 API calls 86093->86101 86660 453443 52 API calls 86094->86660 86095 40ba10 52 API calls 86095->86107 86096 42a42f 86668 45e737 90 API calls 3 library calls 86096->86668 86121 40a0af 86097->86121 86669 40c790 VariantClear ctype 86097->86669 86680 45e737 90 API calls 3 library calls 86098->86680 86099 4299d9 86103 408f40 VariantClear 86099->86103 86101->86097 86102 429abd 86102->85015 86108 4299e2 86103->86108 86104 429d88 86661 453443 52 API calls 86104->86661 86107->86065 86107->86066 86107->86068 86107->86071 86107->86076 86107->86084 86107->86085 86107->86095 86107->86098 86107->86099 86107->86102 86110 42a452 86107->86110 86114 40a780 194 API calls 86107->86114 86656 40c4e0 194 API calls 86107->86656 86658 40e270 VariantClear ctype 86107->86658 86657 410c60 VariantClear ctype 86108->86657 86110->86061 86112->86053 86114->86107 86115 402780 52 API calls 86115->86140 86116 4115d7 52 API calls 86116->86140 86117 44a801 52 API calls 86117->86140 86119 408f40 VariantClear 86148 40a162 ctype _memmove 86119->86148 86120 41130a 51 API calls __cinit 86120->86140 86122 40a11b 86121->86122 86124 42a4b4 VariantClear 86121->86124 86121->86148 86129 40a12d ctype 86122->86129 86670 40e270 VariantClear ctype 86122->86670 86123 40a780 194 API calls 86123->86140 86124->86129 86126 401980 53 API calls 86126->86140 86127 408e80 VariantClear 86127->86140 86128 4115d7 52 API calls 86128->86148 86129->86128 86129->86148 86130 408e80 VariantClear 86130->86148 86132 42a74d VariantClear 86132->86148 86133 40a368 86134 42aad4 86133->86134 86143 40a397 86133->86143 86673 46fe90 VariantClear VariantClear ctype 86134->86673 86667 47390f VariantClear 86135->86667 86136 42a7e4 VariantClear 86136->86148 86137 42a886 VariantClear 86137->86148 86139 409c95 86139->85015 86140->86077 86140->86096 86140->86112 86140->86115 86140->86116 86140->86117 86140->86120 86140->86123 86140->86126 86140->86127 86140->86135 86140->86139 86665 45f508 52 API calls 86140->86665 86666 403e10 53 API calls 86140->86666 86141 40a3ce 86155 40a3d9 ctype 86141->86155 86674 40b400 VariantClear VariantClear ctype 86141->86674 86142 40e270 VariantClear 86142->86148 86143->86141 86168 40a42c ctype 86143->86168 86654 40b400 VariantClear VariantClear ctype 86143->86654 86146 42abaf 86151 42abd4 VariantClear 86146->86151 86162 40a4ee ctype 86146->86162 86147 4115d7 52 API calls 86147->86148 86148->86119 86148->86130 86148->86132 86148->86133 86148->86134 86148->86136 86148->86137 86148->86142 86148->86147 86150 4115d7 52 API calls 86148->86150 86671 470870 52 API calls 86148->86671 86672 44ccf1 VariantClear ctype 86148->86672 86149 40a4dc 86149->86162 86676 40e270 VariantClear ctype 86149->86676 86152 42a5a6 VariantInit VariantCopy 86150->86152 86151->86162 86152->86148 86157 42a5c6 VariantClear 86152->86157 86153 42ac4f 86161 42ac79 VariantClear 86153->86161 86166 40a546 ctype 86153->86166 86156 40a41a 86155->86156 86159 42ab44 VariantClear 86155->86159 86155->86168 86156->86168 86675 40e270 VariantClear ctype 86156->86675 86157->86148 86158 40a534 86158->86166 86677 40e270 VariantClear ctype 86158->86677 86159->86168 86161->86166 86162->86153 86162->86158 86163 42ad28 86169 42ad4e VariantClear 86163->86169 86174 40a583 ctype 86163->86174 86166->86163 86167 40a571 86166->86167 86167->86174 86678 40e270 VariantClear ctype 86167->86678 86168->86146 86168->86149 86169->86174 86171 40a650 ctype 86171->85015 86172 42ae0e VariantClear 86172->86174 86174->86171 86174->86172 86679 40e270 VariantClear ctype 86174->86679 86175->85015 86176->84962 86177->84967 86178->85015 86179->85015 86180->85015 86181->85015 86182->85019 86183->85019 86184->85019 86185->85019 86186->85019 86187->85019 86188->85019 86190 403cdf 86189->86190 86191 408f40 VariantClear 86190->86191 86192 403ce7 86191->86192 86192->85008 86193->85019 86194->85019 86195->85015 86196->84959 86198 408e88 86197->86198 86200 408e94 86197->86200 86199 408f40 VariantClear 86198->86199 86199->86200 86201 45340c 85 API calls 86200->86201 86201->85921 86202->85925 86203->85927 86204->85929 86205->85912 86206->85920 86208 40ba49 86207->86208 86211 40ba1b ctype _memmove 86207->86211 86210 4115d7 52 API calls 86208->86210 86209 4115d7 52 API calls 86212 40ba22 86209->86212 86210->86211 86211->86209 86212->85940 86213->85938 86214->85941 86215->85949 86216->85920 86218 40a7a6 86217->86218 86219 40ae8c 86217->86219 86221 4115d7 52 API calls 86218->86221 86260 41130a 51 API calls __cinit 86219->86260 86239 40a7c6 ctype _memmove 86221->86239 86222 40a86d 86224 40abd1 86222->86224 86243 40a878 ctype 86222->86243 86223 408e80 VariantClear 86223->86239 86265 45e737 90 API calls 3 library calls 86224->86265 86225 40bc10 53 API calls 86225->86239 86226 401b10 52 API calls 86226->86239 86228 42b791 VariantClear 86228->86239 86229 40b5f0 89 API calls 86229->86239 86230 42ba2d VariantClear 86230->86239 86232 42b459 VariantClear 86232->86239 86235 408cc0 187 API calls 86235->86239 86236 42b6f6 VariantClear 86236->86239 86237 4530c9 VariantClear 86237->86239 86239->86222 86239->86223 86239->86224 86239->86225 86239->86226 86239->86228 86239->86229 86239->86230 86239->86232 86239->86235 86239->86236 86239->86237 86240 42bbf5 86239->86240 86241 4115d7 52 API calls 86239->86241 86242 42bb6a 86239->86242 86244 40e270 VariantClear 86239->86244 86245 4115d7 52 API calls 86239->86245 86249 408f40 VariantClear 86239->86249 86253 42bc37 86239->86253 86261 45308a 53 API calls 86239->86261 86262 470870 52 API calls 86239->86262 86263 457f66 87 API calls __write_nolock 86239->86263 86264 472f47 127 API calls 86239->86264 86266 45e737 90 API calls 3 library calls 86240->86266 86241->86239 86268 44b92d VariantClear 86242->86268 86244->86239 86247 42b5b3 VariantInit VariantCopy 86245->86247 86247->86239 86249->86239 86267 45e737 90 API calls 3 library calls 86253->86267 86258->85947 86259->85951 86260->86239 86261->86239 86262->86239 86263->86239 86264->86239 86265->86242 86266->86242 86269->85966 86270->85971 86271->85984 86272->85987 86273->85974 86274->86001 86275->86020 86276->86001 86277->86022 86278->86001 86279->86022 86280->86006 86281->86022 86282->86007 86283->86022 86284->86022 86285->85999 86287 4289d2 86286->86287 86288 408db3 86286->86288 86319 45e737 90 API calls 3 library calls 86287->86319 86315 40bec0 86288->86315 86291 408dc9 86292 4289e5 86291->86292 86294 40ba10 52 API calls 86291->86294 86295 428a05 86291->86295 86297 40a780 194 API calls 86291->86297 86298 408e64 86291->86298 86300 408f40 VariantClear 86291->86300 86301 408e5a 86291->86301 86320 45e737 90 API calls 3 library calls 86292->86320 86294->86291 86296 408f40 VariantClear 86295->86296 86296->86301 86297->86291 86299 408f40 VariantClear 86298->86299 86299->86301 86300->86291 86301->86028 86303 408f40 VariantClear 86302->86303 86304 403d20 86303->86304 86305 403cd0 VariantClear 86304->86305 86306 403d4d 86305->86306 86322 46e91c 86306->86322 86325 474fad 86306->86325 86341 4755ad 86306->86341 86344 467897 86306->86344 86388 45e17d 86306->86388 86307 403d76 86307->86025 86307->86036 86313->86025 86314->86027 86316 40bed0 86315->86316 86317 40bef2 86316->86317 86321 45e737 90 API calls 3 library calls 86316->86321 86317->86291 86319->86292 86320->86295 86321->86317 86398 46e785 86322->86398 86324 46e92f 86324->86307 86326 475005 86325->86326 86327 474fc0 86325->86327 86329 4533eb 85 API calls 86326->86329 86509 44b3ac 57 API calls 86327->86509 86331 475019 86329->86331 86330 474fcc 86333 474fd0 86330->86333 86334 474ff9 86330->86334 86502 473ad9 86331->86502 86336 408f40 VariantClear 86333->86336 86510 44b3ac 57 API calls 86334->86510 86335 475046 86339 474fd8 86336->86339 86339->86307 86547 475077 86341->86547 86343 4755c0 86343->86307 86345 4678bb 86344->86345 86373 467954 86345->86373 86647 45340c 85 API calls 86345->86647 86346 4115d7 52 API calls 86347 467989 86346->86347 86349 467995 86347->86349 86651 40da60 53 API calls 86347->86651 86353 4533eb 85 API calls 86349->86353 86350 4678f6 86352 413a0e __wsplitpath 46 API calls 86350->86352 86354 4678fc 86352->86354 86356 4679b7 86353->86356 86355 401b10 52 API calls 86354->86355 86358 46790c 86355->86358 86357 40de40 60 API calls 86356->86357 86359 4679c3 86357->86359 86648 40d200 52 API calls 2 library calls 86358->86648 86361 4679c7 GetLastError 86359->86361 86362 467a05 86359->86362 86364 403cd0 VariantClear 86361->86364 86367 467a2c 86362->86367 86368 467a4b 86362->86368 86363 467917 86363->86373 86649 4339fa GetFileAttributesW FindFirstFileW FindClose 86363->86649 86365 4679dc 86364->86365 86370 4679e6 86365->86370 86376 44ae3e CloseHandle 86365->86376 86369 4115d7 52 API calls 86367->86369 86371 4115d7 52 API calls 86368->86371 86375 467a31 86369->86375 86379 408f40 VariantClear 86370->86379 86377 467a49 86371->86377 86372 467928 86372->86373 86378 46792f 86372->86378 86373->86346 86374 467964 86373->86374 86374->86307 86652 436299 52 API calls 2 library calls 86375->86652 86376->86370 86383 408f40 VariantClear 86377->86383 86650 4335cd 56 API calls 3 library calls 86378->86650 86382 4679ed 86379->86382 86382->86307 86385 467a88 86383->86385 86384 467939 86384->86373 86386 408f40 VariantClear 86384->86386 86385->86307 86387 467947 86386->86387 86387->86373 86389 45e198 86388->86389 86390 45e19c 86389->86390 86391 45e1b8 86389->86391 86392 408f40 VariantClear 86390->86392 86393 45e1cc 86391->86393 86394 45e1db FindClose 86391->86394 86395 45e1a4 86392->86395 86396 45e1d9 ctype 86393->86396 86397 44ae3e CloseHandle 86393->86397 86394->86396 86395->86307 86396->86307 86397->86396 86399 46e7a2 86398->86399 86400 4115d7 52 API calls 86399->86400 86403 46e802 86399->86403 86401 46e7ad 86400->86401 86402 46e7b9 86401->86402 86446 40da60 53 API calls 86401->86446 86447 4533eb 86402->86447 86404 46e7e5 86403->86404 86411 46e82f 86403->86411 86405 408f40 VariantClear 86404->86405 86407 46e7ea 86405->86407 86407->86324 86410 46e8b5 86439 4680ed 86410->86439 86411->86410 86413 46e845 86411->86413 86416 4533eb 85 API calls 86413->86416 86424 46e84b 86416->86424 86418 46e8bb 86443 443fbe 86418->86443 86419 46e87a 86466 4689f4 59 API calls 86419->86466 86421 46e883 86425 4013c0 52 API calls 86421->86425 86424->86419 86424->86421 86427 46e88f 86425->86427 86428 40e0a0 52 API calls 86427->86428 86430 46e899 86428->86430 86429 408f40 VariantClear 86437 46e881 86429->86437 86467 40d200 52 API calls 2 library calls 86430->86467 86432 46e911 86432->86324 86433 46e8a5 86468 4689f4 59 API calls 86433->86468 86436 46e903 86438 44ae3e CloseHandle 86436->86438 86437->86432 86469 40da20 86437->86469 86438->86432 86440 4680fa 86439->86440 86442 468100 86439->86442 86473 467ac4 55 API calls 2 library calls 86440->86473 86442->86418 86474 443e36 86443->86474 86445 443fd3 86445->86429 86445->86437 86446->86402 86448 453404 86447->86448 86449 4533f8 86447->86449 86451 40de40 86448->86451 86449->86448 86481 4531b1 85 API calls 5 library calls 86449->86481 86452 40da20 CloseHandle 86451->86452 86453 40de4e 86452->86453 86482 40f110 86453->86482 86455 4264fa 86458 40de84 86491 40e080 SetFilePointerEx SetFilePointerEx 86458->86491 86460 40de8b 86466->86437 86467->86433 86468->86437 86470 40da37 86469->86470 86471 40da29 86469->86471 86470->86471 86472 40da3c CloseHandle 86470->86472 86471->86436 86472->86436 86473->86442 86477 443e19 86474->86477 86478 443e26 86477->86478 86479 443e32 WriteFile 86477->86479 86480 443db4 SetFilePointerEx SetFilePointerEx 86478->86480 86479->86445 86480->86479 86481->86448 86483 40f125 CreateFileW 86482->86483 86484 42630c 86482->86484 86486 40de74 86483->86486 86485 426311 CreateFileW 86484->86485 86484->86486 86485->86486 86487 426337 86485->86487 86486->86455 86490 40dea0 55 API calls ctype 86486->86490 86493 40df90 SetFilePointerEx SetFilePointerEx 86487->86493 86489 426342 86489->86486 86490->86458 86491->86460 86493->86489 86503 408f40 VariantClear 86502->86503 86504 473ae7 86503->86504 86505 4115d7 52 API calls 86504->86505 86506 473aee 86505->86506 86511 470cc8 86506->86511 86508 473b09 86508->86335 86509->86330 86510->86326 86528 4536f7 86511->86528 86513 470ceb 86513->86508 86514 401c90 52 API calls 86515 470cd8 86514->86515 86515->86513 86515->86514 86516 470d31 86515->86516 86517 470d43 86516->86517 86519 401c90 52 API calls 86516->86519 86518 4115d7 52 API calls 86517->86518 86519->86517 86529 4026f0 52 API calls 86528->86529 86530 453705 CharLowerBuffW 86529->86530 86530->86515 86548 4533eb 85 API calls 86547->86548 86549 4750b8 86548->86549 86550 4750ee 86549->86550 86551 475129 86549->86551 86553 408f40 VariantClear 86550->86553 86600 4646e0 86551->86600 86558 4750f5 86553->86558 86554 47515e 86555 475162 86554->86555 86593 47518e 86554->86593 86556 408f40 VariantClear 86555->86556 86587 475169 86556->86587 86557 475357 86559 475365 86557->86559 86560 4754ea 86557->86560 86558->86343 86634 44b3ac 57 API calls 86559->86634 86640 464812 92 API calls 86560->86640 86565 475374 86566 4533eb 85 API calls 86566->86593 86575 475480 86577 408f40 VariantClear 86575->86577 86577->86587 86585 4754b5 86586 408f40 VariantClear 86585->86586 86586->86587 86587->86343 86593->86557 86593->86566 86593->86575 86593->86585 86593->86593 86632 436299 52 API calls 2 library calls 86593->86632 86633 463ad5 64 API calls __wcsicoll 86593->86633 86601 4536f7 53 API calls 86600->86601 86602 4646fc 86601->86602 86643 4426cd 59 API calls _wcslen 86602->86643 86604 464711 86606 40bc70 52 API calls 86604->86606 86612 46474b 86604->86612 86607 46472c 86606->86607 86644 461465 52 API calls _memmove 86607->86644 86609 464741 86611 40c600 52 API calls 86609->86611 86610 464793 86610->86554 86611->86612 86612->86610 86645 463ad5 64 API calls __wcsicoll 86612->86645 86632->86593 86633->86593 86634->86565 86643->86604 86644->86609 86645->86610 86647->86350 86648->86363 86649->86372 86650->86384 86651->86349 86652->86377 86653->86046 86654->86141 86655->86059 86656->86107 86657->86171 86658->86107 86659->86079 86660->86104 86661->86070 86662->86074 86663->86080 86664->86140 86665->86140 86666->86140 86667->86096 86668->86110 86669->86097 86670->86129 86671->86148 86672->86148 86673->86141 86674->86155 86675->86168 86676->86162 86677->86166 86678->86174 86679->86174 86680->86110 86681->86064 86682 3f5b3c0 86696 3f59010 86682->86696 86684 3f5b499 86700 3f5b2b0 86684->86700 86697 3f59029 86696->86697 86703 3f5c4c0 GetPEB 86697->86703 86699 3f5969b 86699->86684 86701 3f5b2b9 Sleep 86700->86701 86702 3f5b2c7 86701->86702 86704 3f5c4ea 86703->86704 86704->86699 86705 42d154 86709 480a8d 86705->86709 86707 42d161 86708 480a8d 194 API calls 86707->86708 86708->86707 86710 480ae4 86709->86710 86711 480b26 86709->86711 86713 480aeb 86710->86713 86714 480b15 86710->86714 86712 40bc70 52 API calls 86711->86712 86732 480b2e 86712->86732 86716 480aee 86713->86716 86717 480b04 86713->86717 86742 4805bf 194 API calls 86714->86742 86716->86711 86719 480af3 86716->86719 86741 47fea2 194 API calls __itow_s 86717->86741 86740 47f135 194 API calls 86719->86740 86720 40e0a0 52 API calls 86720->86732 86723 408f40 VariantClear 86725 481156 86723->86725 86724 480aff 86724->86723 86726 408f40 VariantClear 86725->86726 86727 48115e 86726->86727 86727->86707 86728 401980 53 API calls 86728->86732 86730 40c2c0 52 API calls 86730->86732 86731 40e710 53 API calls 86731->86732 86732->86720 86732->86724 86732->86728 86732->86730 86732->86731 86733 40a780 194 API calls 86732->86733 86734 408e80 VariantClear 86732->86734 86738 480ff5 86732->86738 86743 45377f 52 API calls 86732->86743 86744 45e951 53 API calls 86732->86744 86745 40e830 53 API calls 86732->86745 86746 47925f 53 API calls 86732->86746 86747 47fcff 194 API calls 86732->86747 86733->86732 86734->86732 86748 45e737 90 API calls 3 library calls 86738->86748 86740->86724 86741->86724 86742->86724 86743->86732 86744->86732 86745->86732 86746->86732 86747->86732 86748->86724 86749 42b14b 86756 40bc10 86749->86756 86751 42b159 86752 4096a0 331 API calls 86751->86752 86753 42b177 86752->86753 86767 44b92d VariantClear 86753->86767 86755 42bc5b 86757 40bc24 86756->86757 86758 40bc17 86756->86758 86760 40bc2a 86757->86760 86761 40bc3c 86757->86761 86759 408e80 VariantClear 86758->86759 86763 40bc1f 86759->86763 86764 408e80 VariantClear 86760->86764 86762 4115d7 52 API calls 86761->86762 86766 40bc43 86762->86766 86763->86751 86765 40bc33 86764->86765 86765->86751 86766->86751 86767->86755 86768 425b2b 86773 40f000 86768->86773 86772 425b3a 86774 4115d7 52 API calls 86773->86774 86775 40f007 86774->86775 86776 4276ea 86775->86776 86782 40f030 86775->86782 86781 41130a 51 API calls __cinit 86781->86772 86783 40f039 86782->86783 86784 40f01a 86782->86784 86812 41130a 51 API calls __cinit 86783->86812 86786 40e500 86784->86786 86787 40bc70 52 API calls 86786->86787 86788 40e515 GetVersionExW 86787->86788 86789 402160 52 API calls 86788->86789 86790 40e557 86789->86790 86813 40e660 86790->86813 86797 427674 86800 4276c6 GetSystemInfo 86797->86800 86798 40e5e0 86802 4276d5 GetSystemInfo 86798->86802 86827 40efd0 86798->86827 86799 40e5cd GetCurrentProcess 86834 40ef20 LoadLibraryA GetProcAddress 86799->86834 86800->86802 86805 40e629 86831 40ef90 86805->86831 86808 40e641 FreeLibrary 86809 40e644 86808->86809 86810 40e653 FreeLibrary 86809->86810 86811 40e656 86809->86811 86810->86811 86811->86781 86812->86784 86814 40e667 86813->86814 86815 42761d 86814->86815 86816 40c600 52 API calls 86814->86816 86817 40e55c 86816->86817 86818 40e680 86817->86818 86819 40e687 86818->86819 86820 427616 86819->86820 86821 40c600 52 API calls 86819->86821 86822 40e566 86821->86822 86822->86797 86823 40ef60 86822->86823 86824 40e5c8 86823->86824 86825 40ef66 LoadLibraryA 86823->86825 86824->86798 86824->86799 86825->86824 86826 40ef77 GetProcAddress 86825->86826 86826->86824 86828 40e620 86827->86828 86829 40efd6 LoadLibraryA 86827->86829 86828->86800 86828->86805 86829->86828 86830 40efe7 GetProcAddress 86829->86830 86830->86828 86835 40efb0 LoadLibraryA GetProcAddress 86831->86835 86833 40e632 GetNativeSystemInfo 86833->86808 86833->86809 86834->86798 86835->86833 86836 425b5e 86841 40c7f0 86836->86841 86840 425b6d 86876 40db10 52 API calls 86841->86876 86843 40c82a 86877 410ab0 6 API calls 86843->86877 86845 40c86d 86846 40bc70 52 API calls 86845->86846 86847 40c877 86846->86847 86848 40bc70 52 API calls 86847->86848 86849 40c881 86848->86849 86850 40bc70 52 API calls 86849->86850 86851 40c88b 86850->86851 86852 40bc70 52 API calls 86851->86852 86853 40c8d1 86852->86853 86854 40bc70 52 API calls 86853->86854 86855 40c991 86854->86855 86878 40d2c0 52 API calls 86855->86878 86857 40c99b 86879 40d0d0 53 API calls 86857->86879 86859 40c9c1 86860 40bc70 52 API calls 86859->86860 86861 40c9cb 86860->86861 86880 40e310 53 API calls 86861->86880 86863 40ca28 86864 408f40 VariantClear 86863->86864 86865 40ca30 86864->86865 86866 408f40 VariantClear 86865->86866 86867 40ca38 GetStdHandle 86866->86867 86868 429630 86867->86868 86869 40ca87 86867->86869 86868->86869 86870 429639 86868->86870 86875 41130a 51 API calls __cinit 86869->86875 86881 4432c0 57 API calls 86870->86881 86872 429641 86882 44b6ab CreateThread 86872->86882 86874 42964f CloseHandle 86874->86869 86875->86840 86876->86843 86877->86845 86878->86857 86879->86859 86880->86863 86881->86872 86882->86874 86883 44b5cb 58 API calls 86882->86883 86884 425b6f 86889 40dc90 86884->86889 86888 425b7e 86890 40bc70 52 API calls 86889->86890 86891 40dd03 86890->86891 86897 40f210 86891->86897 86894 40dd96 86895 40ddb7 86894->86895 86900 40dc00 52 API calls 2 library calls 86894->86900 86896 41130a 51 API calls __cinit 86895->86896 86896->86888 86901 40f250 RegOpenKeyExW 86897->86901 86899 40f230 86899->86894 86900->86894 86902 425e17 86901->86902 86903 40f275 RegQueryValueExW 86901->86903 86902->86899 86904 40f2c3 RegCloseKey 86903->86904 86905 40f298 86903->86905 86904->86899 86906 40f2a9 RegCloseKey 86905->86906 86907 425e1d 86905->86907 86906->86899
            APIs
            • _wcslen.LIBCMT ref: 004096C1
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • _memmove.LIBCMT ref: 0040970C
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
              • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
            • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
            • _memmove.LIBCMT ref: 00409D96
            • _memmove.LIBCMT ref: 0040A6C4
            • _memmove.LIBCMT ref: 004297E5
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
            • String ID:
            • API String ID: 2383988440-0
            • Opcode ID: a06cd1955fce2694f18b8147bf75f67824b193f3afcae0e29f98764ad8f97a23
            • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
            • Opcode Fuzzy Hash: a06cd1955fce2694f18b8147bf75f67824b193f3afcae0e29f98764ad8f97a23
            • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

            Control-flow Graph

            APIs
            • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
              • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
              • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
              • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
              • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
              • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
              • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
            • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
            • GetFullPathNameW.KERNEL32(004A7F6C,00000104,?,004A7F50,004A7F54), ref: 0040D625
              • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
            • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
            • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
            • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
            • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
            • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
              • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
              • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
              • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
              • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
              • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
              • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
              • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
              • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
              • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
              • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
              • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
              • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
            Strings
            • runas, xrefs: 0042E2AD, 0042E2DC
            • This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support., xrefs: 0042E1C2
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
            • String ID: This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
            • API String ID: 2495805114-3383388033
            • Opcode ID: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
            • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
            • Opcode Fuzzy Hash: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
            • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1904 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 1913 40e582-40e583 1904->1913 1914 427674-427679 1904->1914 1917 40e585-40e596 1913->1917 1918 40e5ba-40e5cb call 40ef60 1913->1918 1915 427683-427686 1914->1915 1916 42767b-427681 1914->1916 1921 427693-427696 1915->1921 1922 427688-427691 1915->1922 1920 4276b4-4276be 1916->1920 1923 427625-427629 1917->1923 1924 40e59c-40e59f 1917->1924 1933 40e5ec-40e60c 1918->1933 1934 40e5cd-40e5e6 GetCurrentProcess call 40ef20 1918->1934 1935 4276c6-4276ca GetSystemInfo 1920->1935 1921->1920 1930 427698-4276a8 1921->1930 1922->1920 1926 427636-427640 1923->1926 1927 42762b-427631 1923->1927 1928 40e5a5-40e5ae 1924->1928 1929 427654-427657 1924->1929 1926->1918 1927->1918 1937 40e5b4 1928->1937 1938 427645-42764f 1928->1938 1929->1918 1936 42765d-42766f 1929->1936 1931 4276b0 1930->1931 1932 4276aa-4276ae 1930->1932 1931->1920 1932->1920 1940 40e612-40e623 call 40efd0 1933->1940 1941 4276d5-4276df GetSystemInfo 1933->1941 1934->1933 1947 40e5e8 1934->1947 1935->1941 1936->1918 1937->1918 1938->1918 1940->1935 1946 40e629-40e63f call 40ef90 GetNativeSystemInfo 1940->1946 1950 40e641-40e642 FreeLibrary 1946->1950 1951 40e644-40e651 1946->1951 1947->1933 1950->1951 1952 40e653-40e654 FreeLibrary 1951->1952 1953 40e656-40e65d 1951->1953 1952->1953
            APIs
            • GetVersionExW.KERNEL32(?), ref: 0040E52A
              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
            • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
            • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
            • FreeLibrary.KERNEL32(?), ref: 0040E642
            • FreeLibrary.KERNEL32(?), ref: 0040E654
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
            • String ID: 0SH
            • API String ID: 3363477735-851180471
            • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
            • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
            • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
            • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
            APIs
            • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
            • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: IsThemeActive$uxtheme.dll
            • API String ID: 2574300362-3542929980
            • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
            • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
            • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
            • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
            APIs
            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
            • Sleep.KERNEL32(0000000A,?), ref: 004094D1
            • TranslateMessage.USER32(?), ref: 00409556
            • DispatchMessageW.USER32(?), ref: 00409561
            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Message$Peek$DispatchSleepTranslate
            • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
            • API String ID: 1762048999-758534266
            • Opcode ID: 23d079a985ba2b1b40b9133d067a4c416b55a71ed9da253c2d941bd9d0d29544
            • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
            • Opcode Fuzzy Hash: 23d079a985ba2b1b40b9133d067a4c416b55a71ed9da253c2d941bd9d0d29544
            • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

            Control-flow Graph

            APIs
            • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • __wcsicoll.LIBCMT ref: 00402007
            • __wcsicoll.LIBCMT ref: 0040201D
            • __wcsicoll.LIBCMT ref: 00402033
              • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
            • __wcsicoll.LIBCMT ref: 00402049
            • _wcscpy.LIBCMT ref: 0040207C
            • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104), ref: 00428B5B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
            • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$CMDLINE$CMDLINERAW
            • API String ID: 3948761352-1609664196
            • Opcode ID: de7630e39462d0d30620e5d386b824db2ab2692deedf796b652438eb031e1025
            • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
            • Opcode Fuzzy Hash: de7630e39462d0d30620e5d386b824db2ab2692deedf796b652438eb031e1025
            • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

            Control-flow Graph

            APIs
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
            • __wsplitpath.LIBCMT ref: 0040E41C
              • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
            • _wcsncat.LIBCMT ref: 0040E433
            • __wmakepath.LIBCMT ref: 0040E44F
              • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
              • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
            • _wcscpy.LIBCMT ref: 0040E487
              • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
            • _wcscat.LIBCMT ref: 00427541
            • _wcslen.LIBCMT ref: 00427551
            • _wcslen.LIBCMT ref: 00427562
            • _wcscat.LIBCMT ref: 0042757C
            • _wcsncpy.LIBCMT ref: 004275BC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
            • String ID: Include$\
            • API String ID: 3173733714-3429789819
            • Opcode ID: f7b2e8dd37dad95b873b636539c9fa9ee4ced90e3c163691215c383b9fb11936
            • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
            • Opcode Fuzzy Hash: f7b2e8dd37dad95b873b636539c9fa9ee4ced90e3c163691215c383b9fb11936
            • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

            Control-flow Graph

            APIs
            • _fseek.LIBCMT ref: 0045292B
              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
              • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
              • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
            • __fread_nolock.LIBCMT ref: 00452961
            • __fread_nolock.LIBCMT ref: 00452971
            • __fread_nolock.LIBCMT ref: 0045298A
            • __fread_nolock.LIBCMT ref: 004529A5
            • _fseek.LIBCMT ref: 004529BF
            • _malloc.LIBCMT ref: 004529CA
            • _malloc.LIBCMT ref: 004529D6
            • __fread_nolock.LIBCMT ref: 004529E7
            • _free.LIBCMT ref: 00452A17
            • _free.LIBCMT ref: 00452A20
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
            • String ID:
            • API String ID: 1255752989-0
            • Opcode ID: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
            • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
            • Opcode Fuzzy Hash: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
            • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: __fread_nolock$_fseek_wcscpy
            • String ID: FILE
            • API String ID: 3888824918-3121273764
            • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
            • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
            • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
            • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

            Control-flow Graph

            APIs
            • GetSysColorBrush.USER32(0000000F), ref: 004104C3
            • RegisterClassExW.USER32(00000030), ref: 004104ED
            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
            • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
            • LoadIconW.USER32(00400000,000000A9), ref: 00410542
            • ImageList_ReplaceIcon.COMCTL32(00C70BB0,000000FF,00000000), ref: 00410552
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
            • API String ID: 2914291525-1005189915
            • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
            • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
            • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
            • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

            Control-flow Graph

            APIs
            • GetSysColorBrush.USER32(0000000F), ref: 0041039B
            • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
            • LoadIconW.USER32(?,00000063), ref: 004103C0
            • LoadIconW.USER32(?,000000A4), ref: 004103D3
            • LoadIconW.USER32(?,000000A2), ref: 004103E6
            • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
            • RegisterClassExW.USER32(?), ref: 0041045D
              • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
              • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
              • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
              • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
              • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
              • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
              • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(00C70BB0,000000FF,00000000), ref: 00410552
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
            • String ID: #$0$AutoIt v3
            • API String ID: 423443420-4155596026
            • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
            • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
            • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
            • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _malloc
            • String ID: Default
            • API String ID: 1579825452-753088835
            • Opcode ID: 9f85b68769bc30241e5c3250a976f4e3498bb03b948f4ec10db418ad02dabea8
            • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
            • Opcode Fuzzy Hash: 9f85b68769bc30241e5c3250a976f4e3498bb03b948f4ec10db418ad02dabea8
            • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1954 40f5c0-40f5cf call 422240 1957 40f5d0-40f5e8 1954->1957 1957->1957 1958 40f5ea-40f613 call 413650 call 410e60 1957->1958 1963 40f614-40f633 call 414d04 1958->1963 1966 40f691 1963->1966 1967 40f635-40f63c 1963->1967 1968 40f696-40f69c 1966->1968 1969 40f660-40f674 call 4150d1 1967->1969 1970 40f63e 1967->1970 1973 40f679-40f67c 1969->1973 1971 40f640 1970->1971 1974 40f642-40f650 1971->1974 1973->1963 1975 40f652-40f655 1974->1975 1976 40f67e-40f68c 1974->1976 1979 40f65b-40f65e 1975->1979 1980 425d1e-425d3e call 4150d1 call 414d04 1975->1980 1977 40f68e-40f68f 1976->1977 1978 40f69f-40f6ad 1976->1978 1977->1975 1982 40f6b4-40f6c2 1978->1982 1983 40f6af-40f6b2 1978->1983 1979->1969 1979->1971 1990 425d43-425d5f call 414d30 1980->1990 1985 425d16 1982->1985 1986 40f6c8-40f6d6 1982->1986 1983->1975 1985->1980 1988 425d05-425d0b 1986->1988 1989 40f6dc-40f6df 1986->1989 1988->1974 1991 425d11 1988->1991 1989->1975 1990->1968 1991->1985
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: __fread_nolock_fseek_memmove_strcat
            • String ID: AU3!$EA06
            • API String ID: 1268643489-2658333250
            • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
            • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
            • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
            • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1994 401100-401111 1995 401113-401119 1994->1995 1996 401179-401180 1994->1996 1998 401144-40114a 1995->1998 1999 40111b-40111e 1995->1999 1996->1995 1997 401182 1996->1997 2000 40112c-401141 DefWindowProcW 1997->2000 2002 401184-40118e call 401250 1998->2002 2003 40114c-40114f 1998->2003 1999->1998 2001 401120-401126 1999->2001 2001->2000 2005 42b038-42b03f 2001->2005 2009 401193-40119a 2002->2009 2006 401151-401157 2003->2006 2007 40119d 2003->2007 2005->2000 2008 42b045-42b059 call 401000 call 40e0c0 2005->2008 2012 401219-40121f 2006->2012 2013 40115d 2006->2013 2010 4011a3-4011a9 2007->2010 2011 42afb4-42afc5 call 40f190 2007->2011 2008->2000 2010->2001 2019 4011af 2010->2019 2011->2009 2012->2001 2016 401225-42b06d call 468b0e 2012->2016 2014 401163-401166 2013->2014 2015 42b01d-42b024 2013->2015 2020 42afe9-42b018 call 40f190 call 401a50 2014->2020 2021 40116c-401172 2014->2021 2015->2000 2027 42b02a-42b033 call 4370f4 2015->2027 2016->2009 2019->2001 2025 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 2019->2025 2026 4011db-401202 SetTimer RegisterWindowMessageW 2019->2026 2020->2000 2021->2001 2029 401174-42afde call 45fd57 2021->2029 2026->2009 2034 401204-401216 CreatePopupMenu 2026->2034 2027->2000 2029->2000 2045 42afe4 2029->2045 2045->2009
            APIs
            • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
            • KillTimer.USER32(?,00000001,?), ref: 004011B9
            • PostQuitMessage.USER32(00000000), ref: 004011CB
            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
            • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
            • CreatePopupMenu.USER32 ref: 00401204
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
            • String ID: TaskbarCreated
            • API String ID: 129472671-2362178303
            • Opcode ID: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
            • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
            • Opcode Fuzzy Hash: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
            • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2046 4115d7-4115df 2047 4115ee-4115f9 call 4135bb 2046->2047 2050 4115e1-4115ec call 411988 2047->2050 2051 4115fb-4115fc 2047->2051 2050->2047 2054 4115fd-41160e 2050->2054 2055 411610-41163b call 417fc0 call 41130a 2054->2055 2056 41163c-411656 call 4180af call 418105 2054->2056 2055->2056
            APIs
            • _malloc.LIBCMT ref: 004115F1
              • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
              • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
              • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
            • std::exception::exception.LIBCMT ref: 00411626
            • std::exception::exception.LIBCMT ref: 00411640
            • __CxxThrowException@8.LIBCMT ref: 00411651
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
            • String ID: ,*H$4*H$@fI
            • API String ID: 615853336-1459471987
            • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
            • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
            • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
            • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2065 3f5b610-3f5b6be call 3f59010 2068 3f5b6c5-3f5b6eb call 3f5c520 CreateFileW 2065->2068 2071 3f5b6f2-3f5b702 2068->2071 2072 3f5b6ed 2068->2072 2079 3f5b704 2071->2079 2080 3f5b709-3f5b723 VirtualAlloc 2071->2080 2073 3f5b83d-3f5b841 2072->2073 2074 3f5b883-3f5b886 2073->2074 2075 3f5b843-3f5b847 2073->2075 2081 3f5b889-3f5b890 2074->2081 2077 3f5b853-3f5b857 2075->2077 2078 3f5b849-3f5b84c 2075->2078 2084 3f5b867-3f5b86b 2077->2084 2085 3f5b859-3f5b863 2077->2085 2078->2077 2079->2073 2086 3f5b725 2080->2086 2087 3f5b72a-3f5b741 ReadFile 2080->2087 2082 3f5b8e5-3f5b8fa 2081->2082 2083 3f5b892-3f5b89d 2081->2083 2090 3f5b8fc-3f5b907 VirtualFree 2082->2090 2091 3f5b90a-3f5b912 2082->2091 2088 3f5b8a1-3f5b8ad 2083->2088 2089 3f5b89f 2083->2089 2092 3f5b86d-3f5b877 2084->2092 2093 3f5b87b 2084->2093 2085->2084 2086->2073 2094 3f5b743 2087->2094 2095 3f5b748-3f5b788 VirtualAlloc 2087->2095 2098 3f5b8c1-3f5b8cd 2088->2098 2099 3f5b8af-3f5b8bf 2088->2099 2089->2082 2090->2091 2092->2093 2093->2074 2094->2073 2096 3f5b78f-3f5b7aa call 3f5c770 2095->2096 2097 3f5b78a 2095->2097 2105 3f5b7b5-3f5b7bf 2096->2105 2097->2073 2102 3f5b8cf-3f5b8d8 2098->2102 2103 3f5b8da-3f5b8e0 2098->2103 2101 3f5b8e3 2099->2101 2101->2081 2102->2101 2103->2101 2106 3f5b7c1-3f5b7f0 call 3f5c770 2105->2106 2107 3f5b7f2-3f5b806 call 3f5c580 2105->2107 2106->2105 2113 3f5b808 2107->2113 2114 3f5b80a-3f5b80e 2107->2114 2113->2073 2115 3f5b810-3f5b814 CloseHandle 2114->2115 2116 3f5b81a-3f5b81e 2114->2116 2115->2116 2117 3f5b820-3f5b82b VirtualFree 2116->2117 2118 3f5b82e-3f5b837 2116->2118 2117->2118 2118->2068 2118->2073
            APIs
            • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 03F5B6E1
            • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 03F5B907
            Memory Dump Source
            • Source File: 00000000.00000002.1717604332.0000000003F59000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F59000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_3f59000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CreateFileFreeVirtual
            • String ID:
            • API String ID: 204039940-0
            • Opcode ID: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
            • Instruction ID: 152f60dc895e40d95a1b92899c5099724f1e09bdc8a53b7d51e148986cae0b8f
            • Opcode Fuzzy Hash: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
            • Instruction Fuzzy Hash: 4BA10475E00209EBDB14CFA4C994BEEBBB5BF48305F248599EA01BB280D7759E41CB94

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2119 401250-40125c 2120 401262-401293 call 412f40 call 401b80 2119->2120 2121 4012e8-4012ed 2119->2121 2126 4012d1-4012e2 KillTimer SetTimer 2120->2126 2127 401295-4012b5 2120->2127 2126->2121 2128 4012bb-4012bf 2127->2128 2129 4272ec-4272f2 2127->2129 2132 4012c5-4012cb 2128->2132 2133 42733f-427346 2128->2133 2130 4272f4-427315 Shell_NotifyIconW 2129->2130 2131 42731a-42733a Shell_NotifyIconW 2129->2131 2130->2126 2131->2126 2132->2126 2134 427393-4273b4 Shell_NotifyIconW 2132->2134 2135 427348-427369 Shell_NotifyIconW 2133->2135 2136 42736e-42738e Shell_NotifyIconW 2133->2136 2134->2126 2135->2126 2136->2126
            APIs
              • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
              • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
              • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
            • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
            • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
            • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
            • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
            • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
            • String ID:
            • API String ID: 3300667738-0
            • Opcode ID: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
            • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
            • Opcode Fuzzy Hash: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
            • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2137 40e4c0-40e4e5 call 403350 RegOpenKeyExW 2140 427190-4271ae RegQueryValueExW 2137->2140 2141 40e4eb-40e4f0 2137->2141 2142 4271b0-4271f5 call 4115d7 call 43652f RegQueryValueExW 2140->2142 2143 42721a-42722a RegCloseKey 2140->2143 2148 427210-427219 call 436508 2142->2148 2149 4271f7-42720e call 402160 2142->2149 2148->2143 2149->2148
            APIs
            • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
            • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: QueryValue$CloseOpen
            • String ID: Include$Software\AutoIt v3\AutoIt
            • API String ID: 1586453840-614718249
            • Opcode ID: 89069ff54290d95ffeb0e4b83fb23c072447fe8f5d078393e68a3dec861a8096
            • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
            • Opcode Fuzzy Hash: 89069ff54290d95ffeb0e4b83fb23c072447fe8f5d078393e68a3dec861a8096
            • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2154 410570-4105f1 CreateWindowExW * 2 ShowWindow * 2
            APIs
            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
            • ShowWindow.USER32(?,00000000), ref: 004105E4
            • ShowWindow.USER32(?,00000000), ref: 004105EE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Window$CreateShow
            • String ID: AutoIt v3$edit
            • API String ID: 1584632944-3779509399
            • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
            • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
            • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
            • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
            APIs
              • Part of subcall function 03F5B2B0: Sleep.KERNELBASE(000001F4), ref: 03F5B2C1
            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 03F5B505
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1717604332.0000000003F59000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F59000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_3f59000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CreateFileSleep
            • String ID: N8MPJVCPU01XPED1E4AS3F890
            • API String ID: 2694422964-1822910448
            • Opcode ID: 1f9280a72de3728eaedfeae2d14cef6fa90fc9c1c1722a3d1255e1661db85ad6
            • Instruction ID: 7dd9891f47fe9adbd5a5e4a749c95c0fef933d7725dd8236062eed540268eb4f
            • Opcode Fuzzy Hash: 1f9280a72de3728eaedfeae2d14cef6fa90fc9c1c1722a3d1255e1661db85ad6
            • Instruction Fuzzy Hash: 4A619231D14288DAEF11DBE4C854BDEBBB89F15300F044199E6487B2C1D7B90B49CBA5
            APIs
            • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
            • _wcsncpy.LIBCMT ref: 00401C41
            • _wcscpy.LIBCMT ref: 00401C5D
            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
            • String ID: Line:
            • API String ID: 1874344091-1585850449
            • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
            • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
            • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
            • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
            APIs
            • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
            • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
            • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
            • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Close$OpenQueryValue
            • String ID: Control Panel\Mouse
            • API String ID: 1607946009-824357125
            • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
            • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
            • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
            • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
            APIs
            • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
            • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
            • _wcsncpy.LIBCMT ref: 004102ED
            • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
            • _wcsncpy.LIBCMT ref: 00410340
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _wcsncpy$DesktopFolderFromListMallocPath
            • String ID:
            • API String ID: 3170942423-0
            • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
            • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
            • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
            • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4
            APIs
            • CreateProcessW.KERNELBASE(?,00000000), ref: 03F5AA6B
            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03F5AB01
            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03F5AB23
            Memory Dump Source
            • Source File: 00000000.00000002.1717604332.0000000003F59000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F59000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_3f59000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Process$ContextCreateMemoryReadThreadWow64
            • String ID:
            • API String ID: 2438371351-0
            • Opcode ID: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
            • Instruction ID: 98d56309285f7fce2bcfff7d453118c6b40b7f8ff46ec22d63ba5373f308a454
            • Opcode Fuzzy Hash: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
            • Instruction Fuzzy Hash: 9362FF30A14258DBEB24DFA4C850BDEB375EF58300F1091A9E60DEB390E7799E91CB59
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _memmove
            • String ID: Error:
            • API String ID: 4104443479-232661952
            • Opcode ID: 0f3a33fb7be69c8e6baf3b23b87111ea2728d16161c2c78c6bada8bccab6f67e
            • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
            • Opcode Fuzzy Hash: 0f3a33fb7be69c8e6baf3b23b87111ea2728d16161c2c78c6bada8bccab6f67e
            • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
            APIs
            • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
              • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
              • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
              • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
              • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
              • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
              • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
              • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
            • String ID: X$pWH
            • API String ID: 85490731-941433119
            • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
            • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
            • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
            • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
            APIs
            • _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • _memmove.LIBCMT ref: 00401B57
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
              • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
            • String ID: @EXITCODE
            • API String ID: 2734553683-3436989551
            • Opcode ID: d09de110ff079f104ffdf991df362542016b83ce61c8771042b9fd4bbac4f926
            • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
            • Opcode Fuzzy Hash: d09de110ff079f104ffdf991df362542016b83ce61c8771042b9fd4bbac4f926
            • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
            • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
            • Opcode Fuzzy Hash: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
            • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: __filbuf__getptd_noexit__read_memcpy_s
            • String ID:
            • API String ID: 1794320848-0
            • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
            • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
            • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
            • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
            APIs
            • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
            • TerminateProcess.KERNEL32(00000000), ref: 004753CE
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Process$CurrentTerminate
            • String ID:
            • API String ID: 2429186680-0
            • Opcode ID: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
            • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
            • Opcode Fuzzy Hash: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
            • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
            APIs
            • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: IconNotifyShell_
            • String ID:
            • API String ID: 1144537725-0
            • Opcode ID: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
            • Instruction ID: eb3a406907b17a2fb372061a5351d340f380801689ea858bebf243c914dbfa85
            • Opcode Fuzzy Hash: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
            • Instruction Fuzzy Hash: 16318F70608701DFD320CF25D855797BBE4BB85314F000C3EE5AA87391E7B8A958CB5A
            APIs
            • _malloc.LIBCMT ref: 0043214B
              • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
              • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
              • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
            • _malloc.LIBCMT ref: 0043215D
            • _malloc.LIBCMT ref: 0043216F
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _malloc$AllocateHeap
            • String ID:
            • API String ID: 680241177-0
            • Opcode ID: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
            • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
            • Opcode Fuzzy Hash: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
            • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
            APIs
            • TranslateMessage.USER32(?), ref: 00409556
            • DispatchMessageW.USER32(?), ref: 00409561
            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Message$DispatchPeekTranslate
            • String ID:
            • API String ID: 4217535847-0
            • Opcode ID: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
            • Instruction ID: 9fbe2eaaa5ffb99098057fa667d4f29c0aa55754a5137076743fac66577e99fa
            • Opcode Fuzzy Hash: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
            • Instruction Fuzzy Hash: D8F05431554300AAE624D7A18D41F9B76A89F98784F40482EB641962E1EB78D444CB5A
            APIs
              • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
            • _free.LIBCMT ref: 004295A0
              • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
              • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
              • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
              • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
              • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
              • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
            • String ID: >>>AUTOIT SCRIPT<<<
            • API String ID: 3938964917-2806939583
            • Opcode ID: 9e552fd7923e986f2723e425eb34f406980c652e500e15cac68f830d5ee71b03
            • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
            • Opcode Fuzzy Hash: 9e552fd7923e986f2723e425eb34f406980c652e500e15cac68f830d5ee71b03
            • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
            Strings
            • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _strcat
            • String ID: >>>AUTOIT NO CMDEXECUTE<<<
            • API String ID: 1765576173-2684727018
            • Opcode ID: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
            • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
            • Opcode Fuzzy Hash: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
            • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ClearVariant
            • String ID:
            • API String ID: 1473721057-0
            • Opcode ID: 11f6b6e535ec7b80c381992ec33a5bd2d356ebd5842892795b93a7d01dafaf0a
            • Instruction ID: 76271617df0236ab3ccd2777984eb13d60b28668e4953fb9a85eec064aa2abc3
            • Opcode Fuzzy Hash: 11f6b6e535ec7b80c381992ec33a5bd2d356ebd5842892795b93a7d01dafaf0a
            • Instruction Fuzzy Hash: F891A370A00204DFDB14DF65D884AAAB3B5EF09304F24C56BE915AB391D739EC41CBAE
            APIs
            • __wsplitpath.LIBCMT ref: 004678F7
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • GetLastError.KERNEL32(00000000,00000000), ref: 004679C7
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ErrorLast__wsplitpath_malloc
            • String ID:
            • API String ID: 4163294574-0
            • Opcode ID: 466b4abea8eb3f9882cf6d05d385968ec72279f5f07066920500c3d4079e3d60
            • Instruction ID: 5ded281afda408fdcd401bf2365ceabb828b89a129c607e264fb1023d06c7d2e
            • Opcode Fuzzy Hash: 466b4abea8eb3f9882cf6d05d385968ec72279f5f07066920500c3d4079e3d60
            • Instruction Fuzzy Hash: FB5126712083018BD710EF75C881A5BB3E5AF84318F044A6EF9559B381EB39ED09CB97
            APIs
              • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
              • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
              • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
            • _strcat.LIBCMT ref: 0040F786
              • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
              • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
            • String ID:
            • API String ID: 3199840319-0
            • Opcode ID: bd3755d61cabc1630a419da0a5008bdf21fb0fae9682b7453e2f960da4ed9882
            • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
            • Opcode Fuzzy Hash: bd3755d61cabc1630a419da0a5008bdf21fb0fae9682b7453e2f960da4ed9882
            • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
            APIs
            • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D779
            • FreeLibrary.KERNEL32(?), ref: 0040D78E
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: FreeInfoLibraryParametersSystem
            • String ID:
            • API String ID: 3403648963-0
            • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
            • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
            • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
            • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
            APIs
            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 0040F13A
            • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 00426326
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CreateFile
            • String ID:
            • API String ID: 823142352-0
            • Opcode ID: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
            • Instruction ID: 8a88c5525f76e0b0fff62cf48ad84dc7055e673dbb4ccc29545257d8619b8f55
            • Opcode Fuzzy Hash: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
            • Instruction Fuzzy Hash: 16011D70784310BAF2305A68DD0BF5266546B45B24F20473ABBE5BE2D1D2F86885870C
            APIs
              • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
            • __lock_file.LIBCMT ref: 00414A8D
              • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
            • __fclose_nolock.LIBCMT ref: 00414A98
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
            • String ID:
            • API String ID: 2800547568-0
            • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
            • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
            • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
            • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
            APIs
            • __lock_file.LIBCMT ref: 00415012
            • __ftell_nolock.LIBCMT ref: 0041501F
              • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: __ftell_nolock__getptd_noexit__lock_file
            • String ID:
            • API String ID: 2999321469-0
            • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
            • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
            • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
            • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
            APIs
            • CreateProcessW.KERNELBASE(?,00000000), ref: 03F5AA6B
            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03F5AB01
            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03F5AB23
            Memory Dump Source
            • Source File: 00000000.00000002.1717604332.0000000003F59000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F59000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_3f59000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Process$ContextCreateMemoryReadThreadWow64
            • String ID:
            • API String ID: 2438371351-0
            • Opcode ID: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
            • Instruction ID: 15b55616229a34e81118a2aa42bf739187e728491179b66d0f27f68a954376f8
            • Opcode Fuzzy Hash: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
            • Instruction Fuzzy Hash: 9912DE24E24658C6EB24DF64D8507DEB232EF68300F1091E9910DEB7A4E77A4F91CF5A
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _memmove
            • String ID:
            • API String ID: 4104443479-0
            • Opcode ID: 64fdff3ae94ab83457d8603152ae0d5fedf77ee6c12e0e45d0860bef15caa14f
            • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
            • Opcode Fuzzy Hash: 64fdff3ae94ab83457d8603152ae0d5fedf77ee6c12e0e45d0860bef15caa14f
            • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ProtectVirtual
            • String ID:
            • API String ID: 544645111-0
            • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
            • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
            • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
            • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b88f9543b806201cae42d4d121fbe4b2eaeb6b479e9688354450343e49ff2077
            • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
            • Opcode Fuzzy Hash: b88f9543b806201cae42d4d121fbe4b2eaeb6b479e9688354450343e49ff2077
            • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 53ac66c0a220e583b8bd8a833cb4d0ab2488ecf71834bb63135a5f6edfec8b4a
            • Instruction ID: fe3c5e01fee558804f1d0cd68762aa03bf47037873853bda5dcd607d85013340
            • Opcode Fuzzy Hash: 53ac66c0a220e583b8bd8a833cb4d0ab2488ecf71834bb63135a5f6edfec8b4a
            • Instruction Fuzzy Hash: 2D118B352046019FDB10DF69D884E96B3E9AF8A314F14856EFD298B362CB35FC41CB95
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: __lock_file
            • String ID:
            • API String ID: 3031932315-0
            • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
            • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
            • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
            • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
            APIs
            • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,004263D0,?,00487ACC,00000003,0040DE90,?,?,00000001), ref: 00443E54
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: FileWrite
            • String ID:
            • API String ID: 3934441357-0
            • Opcode ID: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
            • Instruction ID: f8d6e32d6ecef3e6c51c5ea05c7ff41eb941b2b6d152ec47b845c679c5cedb0e
            • Opcode Fuzzy Hash: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
            • Instruction Fuzzy Hash: 6BE01276100318ABDB10DF98D844FDA77BCEF48765F10891AFA048B200C7B4EA908BE4
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: __wfsopen
            • String ID:
            • API String ID: 197181222-0
            • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
            • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
            • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
            • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
            APIs
            • CloseHandle.KERNELBASE(?,?,00426FBF), ref: 0040DA3D
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CloseHandle
            • String ID:
            • API String ID: 2962429428-0
            • Opcode ID: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
            • Instruction ID: 552ddd844a8bbede063c80161f66c4637379340f91e2bb70a518b226642b2913
            • Opcode Fuzzy Hash: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
            • Instruction Fuzzy Hash: B9E045B4A04B008BC6308F5BE444416FBF8EEE46203108E1FD4A6C2A64C3B4A1498F50
            APIs
            • Sleep.KERNELBASE(000001F4), ref: 03F5B2C1
            Memory Dump Source
            • Source File: 00000000.00000002.1717604332.0000000003F59000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F59000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_3f59000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Sleep
            • String ID:
            • API String ID: 3472027048-0
            • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
            • Instruction ID: 1fda80aa6a8f567bb44b00601ed42def55f9a70863a212a4f4ec4918e20dbcf6
            • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
            • Instruction Fuzzy Hash: CDE0E67494010DDFDB00EFB8D54969E7FB4EF04301F1001A1FD05D2280D6309D508A72
            APIs
            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
            • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
            • GetKeyState.USER32(00000011), ref: 0047C92D
            • GetKeyState.USER32(00000009), ref: 0047C936
            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
            • GetKeyState.USER32(00000010), ref: 0047C953
            • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
            • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
            • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
            • _wcsncpy.LIBCMT ref: 0047CA29
            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
            • SendMessageW.USER32 ref: 0047CA7F
            • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
            • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
            • ImageList_SetDragCursorImage.COMCTL32(00C70BB0,00000000,00000000,00000000), ref: 0047CB9B
            • ImageList_BeginDrag.COMCTL32(00C70BB0,00000000,000000F8,000000F0), ref: 0047CBAC
            • SetCapture.USER32(?), ref: 0047CBB6
            • ClientToScreen.USER32(?,?), ref: 0047CC17
            • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
            • ReleaseCapture.USER32 ref: 0047CC3A
            • GetCursorPos.USER32(?), ref: 0047CC72
            • ScreenToClient.USER32(?,?), ref: 0047CC80
            • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
            • SendMessageW.USER32 ref: 0047CD12
            • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
            • SendMessageW.USER32 ref: 0047CD80
            • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
            • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
            • GetCursorPos.USER32(?), ref: 0047CDC8
            • ScreenToClient.USER32(?,?), ref: 0047CDD6
            • GetParent.USER32(00000000), ref: 0047CDF7
            • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
            • SendMessageW.USER32 ref: 0047CE93
            • ClientToScreen.USER32(?,?), ref: 0047CEEE
            • TrackPopupMenuEx.USER32(?,00000000,?,?,00A51AF0,00000000,?,?,?,?), ref: 0047CF1C
            • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
            • SendMessageW.USER32 ref: 0047CF6B
            • ClientToScreen.USER32(?,?), ref: 0047CFB5
            • TrackPopupMenuEx.USER32(?,00000080,?,?,00A51AF0,00000000,?,?,?,?), ref: 0047CFE6
            • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
            • String ID: @GUI_DRAGID$F
            • API String ID: 3100379633-4164748364
            • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
            • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
            • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
            • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
            APIs
            • GetForegroundWindow.USER32 ref: 00434420
            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
            • IsIconic.USER32(?), ref: 0043444F
            • ShowWindow.USER32(?,00000009), ref: 0043445C
            • SetForegroundWindow.USER32(?), ref: 0043446A
            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
            • GetCurrentThreadId.KERNEL32 ref: 00434485
            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
            • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
            • SetForegroundWindow.USER32(00000000), ref: 004344B7
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
            • keybd_event.USER32(00000012,00000000), ref: 004344CF
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
            • keybd_event.USER32(00000012,00000000), ref: 004344E6
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
            • keybd_event.USER32(00000012,00000000), ref: 004344FD
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
            • keybd_event.USER32(00000012,00000000), ref: 00434514
            • SetForegroundWindow.USER32(00000000), ref: 0043451E
            • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
            • String ID: Shell_TrayWnd
            • API String ID: 2889586943-2988720461
            • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
            • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
            • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
            • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
            APIs
            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
            • CloseHandle.KERNEL32(?), ref: 004463A0
            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
            • GetProcessWindowStation.USER32 ref: 004463D1
            • SetProcessWindowStation.USER32(00000000), ref: 004463DB
            • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
            • _wcslen.LIBCMT ref: 00446498
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • _wcsncpy.LIBCMT ref: 004464C0
            • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
            • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
            • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
            • UnloadUserProfile.USERENV(?,?), ref: 00446555
            • CloseWindowStation.USER32(00000000), ref: 0044656C
            • CloseDesktop.USER32(?), ref: 0044657A
            • SetProcessWindowStation.USER32(?), ref: 00446588
            • CloseHandle.KERNEL32(?), ref: 00446592
            • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
            • String ID: $@OH$default$winsta0
            • API String ID: 3324942560-3791954436
            • Opcode ID: 17ea6258488d9c46c7a00dd8b46b11f65bca9c9d467b249e48c4e72528dedec9
            • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
            • Opcode Fuzzy Hash: 17ea6258488d9c46c7a00dd8b46b11f65bca9c9d467b249e48c4e72528dedec9
            • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
            APIs
              • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
              • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 0043392E
              • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 00433950
              • Part of subcall function 00433908: __wcsicoll.LIBCMT ref: 00433974
              • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
            • _wcscat.LIBCMT ref: 0044BD94
            • _wcscat.LIBCMT ref: 0044BDBD
            • __wsplitpath.LIBCMT ref: 0044BDEA
            • FindFirstFileW.KERNEL32(?,?), ref: 0044BE02
            • _wcscpy.LIBCMT ref: 0044BE71
            • _wcscat.LIBCMT ref: 0044BE83
            • _wcscat.LIBCMT ref: 0044BE95
            • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC1
            • DeleteFileW.KERNEL32(?), ref: 0044BED3
            • MoveFileW.KERNEL32(?,?), ref: 0044BEF3
            • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0A
            • DeleteFileW.KERNEL32(?), ref: 0044BF15
            • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2C
            • FindClose.KERNEL32(00000000), ref: 0044BF33
            • MoveFileW.KERNEL32(?,?), ref: 0044BF4F
            • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF64
            • FindClose.KERNEL32(00000000), ref: 0044BF7C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
            • String ID: \*.*
            • API String ID: 2188072990-1173974218
            • Opcode ID: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
            • Instruction ID: 72a2fd59153234373391f972af8bc7e503bf673df65afccb4f4ecee040a4f935
            • Opcode Fuzzy Hash: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
            • Instruction Fuzzy Hash: E25167B2408384AAD734DB50DC45EDF73E9AFC8304F544E1EF68982141EB75D249CBA6
            APIs
            • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
            • FindClose.KERNEL32(00000000), ref: 00478924
            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
            • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
            • __swprintf.LIBCMT ref: 004789D3
            • __swprintf.LIBCMT ref: 00478A1D
            • __swprintf.LIBCMT ref: 00478A4B
            • __swprintf.LIBCMT ref: 00478A79
              • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
              • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
            • __swprintf.LIBCMT ref: 00478AA7
            • __swprintf.LIBCMT ref: 00478AD5
            • __swprintf.LIBCMT ref: 00478B03
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
            • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
            • API String ID: 999945258-2428617273
            • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
            • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
            • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
            • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
            APIs
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
            • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
            • __wsplitpath.LIBCMT ref: 00403492
              • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
            • _wcscpy.LIBCMT ref: 004034A7
            • _wcscat.LIBCMT ref: 004034BC
            • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
              • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
              • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
              • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
            • _wcscpy.LIBCMT ref: 004035A0
            • _wcslen.LIBCMT ref: 00403623
            • _wcslen.LIBCMT ref: 0040367D
            Strings
            • Error opening the file, xrefs: 00428231
            • _, xrefs: 0040371C
            • Unterminated string, xrefs: 00428348
            • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
            • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
            • API String ID: 3393021363-188983378
            • Opcode ID: d7567003ac82893a05918a50732f98c0da489d2a1a1b1371126f827adaf0f001
            • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
            • Opcode Fuzzy Hash: d7567003ac82893a05918a50732f98c0da489d2a1a1b1371126f827adaf0f001
            • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
            APIs
            • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
            • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
            • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
            • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
            • FindClose.KERNEL32(00000000), ref: 00431B20
            • FindClose.KERNEL32(00000000), ref: 00431B34
            • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
            • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
            • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
            • FindClose.KERNEL32(00000000), ref: 00431BCD
            • FindClose.KERNEL32(00000000), ref: 00431BDB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
            • String ID: *.*
            • API String ID: 1409584000-438819550
            • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
            • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
            • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
            • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
            APIs
            • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
            • __swprintf.LIBCMT ref: 00431C2E
            • _wcslen.LIBCMT ref: 00431C3A
            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
            • String ID: :$\$\??\%s
            • API String ID: 2192556992-3457252023
            • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
            • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
            • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
            • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
            APIs
            • GetLocalTime.KERNEL32(?), ref: 004722A2
            • __swprintf.LIBCMT ref: 004722B9
            • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
            • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
            • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
            • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
            • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
            • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
            • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
            • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
            • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: FolderPath$LocalTime__swprintf
            • String ID: %.3d
            • API String ID: 3337348382-986655627
            • Opcode ID: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
            • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
            • Opcode Fuzzy Hash: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
            • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
            APIs
            • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
            • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
            • FindClose.KERNEL32(00000000), ref: 0044291C
            • FindClose.KERNEL32(00000000), ref: 00442930
            • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
            • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
            • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
            • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
            • FindClose.KERNEL32(00000000), ref: 004429D4
              • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
            • FindClose.KERNEL32(00000000), ref: 004429E2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
            • String ID: *.*
            • API String ID: 2640511053-438819550
            • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
            • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
            • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
            • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
            APIs
            • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
            • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
            • GetLastError.KERNEL32 ref: 00433414
            • ExitWindowsEx.USER32(?,00000000), ref: 00433437
            • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
            • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
            • String ID: SeShutdownPrivilege
            • API String ID: 2938487562-3733053543
            • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
            • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
            • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
            • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
            APIs
              • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
              • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
              • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
              • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
            • GetLengthSid.ADVAPI32(?), ref: 004461D0
            • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
            • GetLengthSid.ADVAPI32(?), ref: 00446241
            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
            • CopySid.ADVAPI32(00000000), ref: 00446271
            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
            • String ID:
            • API String ID: 1255039815-0
            • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
            • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
            • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
            • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
            APIs
            • __swprintf.LIBCMT ref: 00433073
            • __swprintf.LIBCMT ref: 00433085
            • __wcsicoll.LIBCMT ref: 00433092
            • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
            • LoadResource.KERNEL32(?,00000000), ref: 004330BD
            • LockResource.KERNEL32(00000000), ref: 004330CA
            • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
            • LoadResource.KERNEL32(?,00000000), ref: 00433105
            • SizeofResource.KERNEL32(?,00000000), ref: 00433114
            • LockResource.KERNEL32(?), ref: 00433120
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
            • String ID:
            • API String ID: 1158019794-0
            • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
            • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
            • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
            • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Clipboard$AllocCloseEmptyGlobalOpen
            • String ID:
            • API String ID: 1737998785-0
            • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
            • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
            • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
            • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D627
            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
            • GetLastError.KERNEL32 ref: 0045D6BF
            • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Error$Mode$DiskFreeLastSpace
            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
            • API String ID: 4194297153-14809454
            • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
            • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
            • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
            • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _memmove$_strncmp
            • String ID: @oH$\$^$h
            • API String ID: 2175499884-3701065813
            • Opcode ID: f002cf83b61508de9c211a0f0d172e3a132fb63b457bb46fdb7389c8079d7204
            • Instruction ID: d0725f23cfd3ca281eac06f76a82abe5967bc3f30214560d9089fed7748fa16d
            • Opcode Fuzzy Hash: f002cf83b61508de9c211a0f0d172e3a132fb63b457bb46fdb7389c8079d7204
            • Instruction Fuzzy Hash: C642E270E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD855AB351D7399946CF55
            APIs
            • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 0046530D
            • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
            • bind.WSOCK32(00000000,?,00000010), ref: 00465356
            • WSAGetLastError.WSOCK32(00000000), ref: 00465363
            • closesocket.WSOCK32(00000000,00000000), ref: 00465377
            • listen.WSOCK32(00000000,00000005), ref: 00465381
            • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
            • closesocket.WSOCK32(00000000,00000000), ref: 004653BD
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ErrorLast$closesocket$bindlistensocket
            • String ID:
            • API String ID: 540024437-0
            • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
            • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
            • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
            • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID:
            • String ID: ERCP$VUUU$VUUU$VUUU$XjH
            • API String ID: 0-2872873767
            • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
            • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
            • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
            • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
            APIs
            • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
            • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
            • __wsplitpath.LIBCMT ref: 00475644
              • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
            • _wcscat.LIBCMT ref: 00475657
            • __wcsicoll.LIBCMT ref: 0047567B
            • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
            • CloseHandle.KERNEL32(00000000), ref: 004756BA
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
            • String ID:
            • API String ID: 2547909840-0
            • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
            • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
            • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
            • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
            APIs
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
            • Sleep.KERNEL32(0000000A), ref: 0045250B
            • FindNextFileW.KERNEL32(?,?), ref: 004525E9
            • FindClose.KERNEL32(?), ref: 004525FF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
            • String ID: *.*$\VH
            • API String ID: 2786137511-2657498754
            • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
            • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
            • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
            • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
            APIs
            • IsDebuggerPresent.KERNEL32 ref: 00421FC1
            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
            • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
            • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
            • TerminateProcess.KERNEL32(00000000), ref: 00422004
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
            • String ID: pqI
            • API String ID: 2579439406-2459173057
            • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
            • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
            • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
            • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
            APIs
            • __wcsicoll.LIBCMT ref: 00433349
            • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
            • __wcsicoll.LIBCMT ref: 00433375
            • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: __wcsicollmouse_event
            • String ID: DOWN
            • API String ID: 1033544147-711622031
            • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
            • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
            • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
            • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
            APIs
            • GetKeyboardState.USER32(?), ref: 0044C3D2
            • SetKeyboardState.USER32(00000080), ref: 0044C3F6
            • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
            • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
            • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: KeyboardMessagePostState$InputSend
            • String ID:
            • API String ID: 3031425849-0
            • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
            • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
            • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
            • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
            APIs
              • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
            • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 0047666F
            • WSAGetLastError.WSOCK32(00000000), ref: 00476692
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ErrorLastinet_addrsocket
            • String ID:
            • API String ID: 4170576061-0
            • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
            • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
            • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
            • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
            APIs
              • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
            • IsWindowVisible.USER32 ref: 0047A368
            • IsWindowEnabled.USER32 ref: 0047A378
            • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
            • IsIconic.USER32 ref: 0047A393
            • IsZoomed.USER32 ref: 0047A3A1
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Window$EnabledForegroundIconicVisibleZoomed
            • String ID:
            • API String ID: 292994002-0
            • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
            • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
            • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
            • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
            APIs
              • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
            • CoInitialize.OLE32(00000000), ref: 00478442
            • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
            • CoUninitialize.OLE32 ref: 0047863C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CreateInitializeInstanceUninitialize_wcslen
            • String ID: .lnk
            • API String ID: 886957087-24824748
            • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
            • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
            • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
            • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
            APIs
            • OpenClipboard.USER32(?), ref: 0046DCE7
            • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
            • GetClipboardData.USER32(0000000D), ref: 0046DD01
            • CloseClipboard.USER32 ref: 0046DD0D
            • GlobalLock.KERNEL32(00000000), ref: 0046DD37
            • CloseClipboard.USER32 ref: 0046DD41
            • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
            • GetClipboardData.USER32(00000001), ref: 0046DD8D
            • CloseClipboard.USER32 ref: 0046DD99
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
            • String ID:
            • API String ID: 15083398-0
            • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
            • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
            • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
            • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _memmove
            • String ID: U$\
            • API String ID: 4104443479-100911408
            • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
            • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
            • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
            • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
            APIs
            • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
            • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
            • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Find$File$CloseFirstNext
            • String ID:
            • API String ID: 3541575487-0
            • Opcode ID: f8ec562d354739d1813db85dcf23f13665d7d9b039f732a3c66120ad17a42715
            • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
            • Opcode Fuzzy Hash: f8ec562d354739d1813db85dcf23f13665d7d9b039f732a3c66120ad17a42715
            • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
            APIs
            • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
            • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
            • FindClose.KERNEL32(00000000), ref: 004339EB
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: FileFind$AttributesCloseFirst
            • String ID:
            • API String ID: 48322524-0
            • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
            • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
            • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
            • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
            APIs
            • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
            • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
              • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Internet$AvailableDataErrorFileLastQueryRead
            • String ID:
            • API String ID: 901099227-0
            • Opcode ID: a84f1234d60d0bfd4ae1c18445e4b4f4e353c9d3ff10812a8b0aa1e25e6dfae4
            • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
            • Opcode Fuzzy Hash: a84f1234d60d0bfd4ae1c18445e4b4f4e353c9d3ff10812a8b0aa1e25e6dfae4
            • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
            APIs
            • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Proc
            • String ID:
            • API String ID: 2346855178-0
            • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
            • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
            • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
            • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
            APIs
            • BlockInput.USER32(00000001), ref: 0045A38B
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: BlockInput
            • String ID:
            • API String ID: 3456056419-0
            • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
            • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
            • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
            • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
            APIs
            • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: LogonUser
            • String ID:
            • API String ID: 1244722697-0
            • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
            • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
            • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
            • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
            APIs
            • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: NameUser
            • String ID:
            • API String ID: 2645101109-0
            • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
            • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
            • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
            • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
            APIs
            • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled
            • String ID:
            • API String ID: 3192549508-0
            • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
            • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
            • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
            • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID:
            • String ID: N@
            • API String ID: 0-1509896676
            • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
            • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
            • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
            • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
            • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
            • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
            • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
            • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
            • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
            • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
            • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
            • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
            • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
            • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
            • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
            • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
            APIs
            • DeleteObject.GDI32(?), ref: 0045953B
            • DeleteObject.GDI32(?), ref: 00459551
            • DestroyWindow.USER32(?), ref: 00459563
            • GetDesktopWindow.USER32 ref: 00459581
            • GetWindowRect.USER32(00000000), ref: 00459588
            • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
            • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
            • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
            • GetClientRect.USER32(00000000,?), ref: 004596F8
            • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
            • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
            • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
            • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
            • GlobalLock.KERNEL32(00000000), ref: 0045978F
            • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
            • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
            • CloseHandle.KERNEL32(00000000), ref: 004597AC
            • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
            • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
            • GlobalFree.KERNEL32(00000000), ref: 004597E2
            • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
            • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
            • ShowWindow.USER32(?,00000004), ref: 00459865
            • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
            • GetStockObject.GDI32(00000011), ref: 004598CD
            • SelectObject.GDI32(00000000,00000000), ref: 004598D5
            • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
            • DeleteDC.GDI32(00000000), ref: 004598F8
            • _wcslen.LIBCMT ref: 00459916
            • _wcscpy.LIBCMT ref: 0045993A
            • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
            • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
            • GetDC.USER32(00000000), ref: 004599FC
            • SelectObject.GDI32(00000000,?), ref: 00459A0C
            • SelectObject.GDI32(00000000,00000007), ref: 00459A37
            • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
            • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
            • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
            • String ID: $AutoIt v3$DISPLAY$static
            • API String ID: 4040870279-2373415609
            • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
            • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
            • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
            • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
            APIs
            • GetSysColor.USER32(00000012), ref: 0044181E
            • SetTextColor.GDI32(?,?), ref: 00441826
            • GetSysColorBrush.USER32(0000000F), ref: 0044183D
            • GetSysColor.USER32(0000000F), ref: 00441849
            • SetBkColor.GDI32(?,?), ref: 00441864
            • SelectObject.GDI32(?,?), ref: 00441874
            • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
            • GetSysColor.USER32(00000010), ref: 004418B2
            • CreateSolidBrush.GDI32(00000000), ref: 004418B9
            • FrameRect.USER32(?,?,00000000), ref: 004418CA
            • DeleteObject.GDI32(?), ref: 004418D5
            • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
            • FillRect.USER32(?,?,?), ref: 00441970
              • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
              • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
              • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
              • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
              • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
              • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
              • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
              • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
              • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
              • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
              • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
              • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
              • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
            • String ID:
            • API String ID: 69173610-0
            • Opcode ID: c8a6ac4ae8f443655677bc86ae764d03f57232e15dc5d5dcac45869bbcc4533b
            • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
            • Opcode Fuzzy Hash: c8a6ac4ae8f443655677bc86ae764d03f57232e15dc5d5dcac45869bbcc4533b
            • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
            APIs
            • DestroyWindow.USER32(?), ref: 004590F2
            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
            • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
            • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
            • GetClientRect.USER32(00000000,?), ref: 0045924E
            • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
            • GetStockObject.GDI32(00000011), ref: 004592AC
            • SelectObject.GDI32(00000000,00000000), ref: 004592B4
            • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
            • DeleteDC.GDI32(00000000), ref: 004592D6
            • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
            • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
            • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
            • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
            • GetStockObject.GDI32(00000011), ref: 004593D3
            • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
            • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
            • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
            • API String ID: 2910397461-517079104
            • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
            • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
            • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
            • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: __wcsnicmp
            • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
            • API String ID: 1038674560-3360698832
            • Opcode ID: 60e7c0ccc2de36542d37a783a5f9e034653244a609c45985bfd1ff28648e5169
            • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
            • Opcode Fuzzy Hash: 60e7c0ccc2de36542d37a783a5f9e034653244a609c45985bfd1ff28648e5169
            • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
            APIs
            • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
            • SetCursor.USER32(00000000), ref: 0043075B
            • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
            • SetCursor.USER32(00000000), ref: 00430773
            • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
            • SetCursor.USER32(00000000), ref: 0043078B
            • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
            • SetCursor.USER32(00000000), ref: 004307A3
            • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
            • SetCursor.USER32(00000000), ref: 004307BB
            • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
            • SetCursor.USER32(00000000), ref: 004307D3
            • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
            • SetCursor.USER32(00000000), ref: 004307EB
            • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
            • SetCursor.USER32(00000000), ref: 00430803
            • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
            • SetCursor.USER32(00000000), ref: 0043081B
            • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
            • SetCursor.USER32(00000000), ref: 00430833
            • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
            • SetCursor.USER32(00000000), ref: 0043084B
            • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
            • SetCursor.USER32(00000000), ref: 00430863
            • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
            • SetCursor.USER32(00000000), ref: 0043087B
            • SetCursor.USER32(00000000), ref: 00430887
            • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
            • SetCursor.USER32(00000000), ref: 0043089F
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Cursor$Load
            • String ID:
            • API String ID: 1675784387-0
            • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
            • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
            • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
            • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
            APIs
            • GetSysColor.USER32(0000000E), ref: 00430913
            • SetTextColor.GDI32(?,00000000), ref: 0043091B
            • GetSysColor.USER32(00000012), ref: 00430933
            • SetTextColor.GDI32(?,?), ref: 0043093B
            • GetSysColorBrush.USER32(0000000F), ref: 0043094E
            • GetSysColor.USER32(0000000F), ref: 00430959
            • CreateSolidBrush.GDI32(?), ref: 00430962
            • GetSysColor.USER32(00000011), ref: 00430979
            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
            • SelectObject.GDI32(?,00000000), ref: 0043099C
            • SetBkColor.GDI32(?,?), ref: 004309A6
            • SelectObject.GDI32(?,?), ref: 004309B4
            • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
            • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
            • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
            • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
            • DrawFocusRect.USER32(?,?), ref: 00430A91
            • GetSysColor.USER32(00000011), ref: 00430A9F
            • SetTextColor.GDI32(?,00000000), ref: 00430AA7
            • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
            • SelectObject.GDI32(?,?), ref: 00430AD0
            • DeleteObject.GDI32(00000105), ref: 00430ADC
            • SelectObject.GDI32(?,?), ref: 00430AE3
            • DeleteObject.GDI32(?), ref: 00430AE9
            • SetTextColor.GDI32(?,?), ref: 00430AF0
            • SetBkColor.GDI32(?,?), ref: 00430AFB
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
            • String ID:
            • API String ID: 1582027408-0
            • Opcode ID: 0fc54ca7880b8250f5455aad5081468a4898125874aa09f0f002b05b6088d479
            • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
            • Opcode Fuzzy Hash: 0fc54ca7880b8250f5455aad5081468a4898125874aa09f0f002b05b6088d479
            • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
            APIs
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
            • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
            • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CloseConnectCreateRegistry
            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
            • API String ID: 3217815495-966354055
            • Opcode ID: cc51306d31ed6c8e05796ddcf504f705dab8229ec76f85ad91dfb98ceec273a0
            • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
            • Opcode Fuzzy Hash: cc51306d31ed6c8e05796ddcf504f705dab8229ec76f85ad91dfb98ceec273a0
            • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
            APIs
            • GetCursorPos.USER32(?), ref: 004566AE
            • GetDesktopWindow.USER32 ref: 004566C3
            • GetWindowRect.USER32(00000000), ref: 004566CA
            • GetWindowLongW.USER32(?,000000F0), ref: 00456722
            • GetWindowLongW.USER32(?,000000F0), ref: 00456735
            • DestroyWindow.USER32(?), ref: 00456746
            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
            • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
            • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
            • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
            • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
            • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
            • IsWindowVisible.USER32(?), ref: 0045682C
            • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
            • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
            • GetWindowRect.USER32(?,?), ref: 00456873
            • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
            • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
            • CopyRect.USER32(?,?), ref: 004568BE
            • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
            • String ID: ($,$tooltips_class32
            • API String ID: 225202481-3320066284
            • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
            • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
            • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
            • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
            APIs
            • OpenClipboard.USER32(?), ref: 0046DCE7
            • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
            • GetClipboardData.USER32(0000000D), ref: 0046DD01
            • CloseClipboard.USER32 ref: 0046DD0D
            • GlobalLock.KERNEL32(00000000), ref: 0046DD37
            • CloseClipboard.USER32 ref: 0046DD41
            • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
            • GetClipboardData.USER32(00000001), ref: 0046DD8D
            • CloseClipboard.USER32 ref: 0046DD99
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
            • String ID:
            • API String ID: 15083398-0
            • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
            • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
            • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
            • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
            APIs
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • GetWindowRect.USER32(?,?), ref: 00471CF7
            • GetClientRect.USER32(?,?), ref: 00471D05
            • GetSystemMetrics.USER32(00000007), ref: 00471D0D
            • GetSystemMetrics.USER32(00000008), ref: 00471D20
            • GetSystemMetrics.USER32(00000004), ref: 00471D42
            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
            • GetSystemMetrics.USER32(00000007), ref: 00471D79
            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
            • GetSystemMetrics.USER32(00000008), ref: 00471DAB
            • GetSystemMetrics.USER32(00000004), ref: 00471DCF
            • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
            • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
            • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
            • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
            • GetClientRect.USER32(?,?), ref: 00471E8A
            • GetStockObject.GDI32(00000011), ref: 00471EA6
            • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
            • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
            • String ID: @$AutoIt v3 GUI
            • API String ID: 867697134-3359773793
            • Opcode ID: a77764dc97b758b9f138980a30eafcd252b45b083a0cf55b9ff7e92d3de70106
            • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
            • Opcode Fuzzy Hash: a77764dc97b758b9f138980a30eafcd252b45b083a0cf55b9ff7e92d3de70106
            • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: __wcsicoll$__wcsnicmp
            • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
            • API String ID: 790654849-32604322
            • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
            • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
            • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
            • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e5b051fd50d99fa90b2629cec502b0b5abd27188c27a482d59dc70fd2e6235d1
            • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
            • Opcode Fuzzy Hash: e5b051fd50d99fa90b2629cec502b0b5abd27188c27a482d59dc70fd2e6235d1
            • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
            APIs
              • Part of subcall function 00442C5A: __time64.LIBCMT ref: 00442C66
            • _fseek.LIBCMT ref: 00452B3B
            • __wsplitpath.LIBCMT ref: 00452B9B
            • _wcscpy.LIBCMT ref: 00452BB0
            • _wcscat.LIBCMT ref: 00452BC5
            • __wsplitpath.LIBCMT ref: 00452BEF
            • _wcscat.LIBCMT ref: 00452C07
            • _wcscat.LIBCMT ref: 00452C1C
            • __fread_nolock.LIBCMT ref: 00452C53
            • __fread_nolock.LIBCMT ref: 00452C64
            • __fread_nolock.LIBCMT ref: 00452C83
            • __fread_nolock.LIBCMT ref: 00452C94
            • __fread_nolock.LIBCMT ref: 00452CB5
            • __fread_nolock.LIBCMT ref: 00452CC6
            • __fread_nolock.LIBCMT ref: 00452CD7
            • __fread_nolock.LIBCMT ref: 00452CE8
              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
              • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
              • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
            • __fread_nolock.LIBCMT ref: 00452D78
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
            • String ID:
            • API String ID: 2054058615-0
            • Opcode ID: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
            • Instruction ID: 04d0e47ed4a2b248740d2851a73093f1b496c65d3ae4d984919b8c0089c9d159
            • Opcode Fuzzy Hash: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
            • Instruction Fuzzy Hash: 6FC14EB2508340ABD720DF65D881EEFB7E8EFC9704F40492FF68987241E6759548CB66
            APIs
            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Window
            • String ID: 0
            • API String ID: 2353593579-4108050209
            • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
            • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
            • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
            • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
            APIs
            • GetSysColor.USER32(0000000F), ref: 0044A05E
            • GetClientRect.USER32(?,?), ref: 0044A0D1
            • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
            • GetWindowDC.USER32(?), ref: 0044A0F6
            • GetPixel.GDI32(00000000,?,?), ref: 0044A108
            • ReleaseDC.USER32(?,?), ref: 0044A11B
            • GetSysColor.USER32(0000000F), ref: 0044A131
            • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
            • GetSysColor.USER32(0000000F), ref: 0044A14F
            • GetSysColor.USER32(00000005), ref: 0044A15B
            • GetWindowDC.USER32(?), ref: 0044A1BE
            • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
            • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
            • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
            • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
            • ReleaseDC.USER32(?,00000000), ref: 0044A229
            • SetBkColor.GDI32(?,00000000), ref: 0044A24C
            • GetSysColor.USER32(00000008), ref: 0044A265
            • SetTextColor.GDI32(?,00000000), ref: 0044A270
            • SetBkMode.GDI32(?,00000001), ref: 0044A282
            • GetStockObject.GDI32(00000005), ref: 0044A28A
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
            • String ID:
            • API String ID: 1744303182-0
            • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
            • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
            • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
            • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
            APIs
            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
            • __mtterm.LIBCMT ref: 00417C34
              • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
              • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
              • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
              • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
            • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
            • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
            • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
            • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
            • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
            • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
            • __init_pointers.LIBCMT ref: 00417CE6
            • __calloc_crt.LIBCMT ref: 00417D54
            • GetCurrentThreadId.KERNEL32 ref: 00417D80
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
            • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
            • API String ID: 4163708885-3819984048
            • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
            • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
            • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
            • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: __wcsicoll$IconLoad
            • String ID: blank$info$question$stop$warning
            • API String ID: 2485277191-404129466
            • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
            • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
            • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
            • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
            APIs
            • LoadIconW.USER32(?,00000063), ref: 0045464C
            • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
            • SetWindowTextW.USER32(?,?), ref: 00454678
            • GetDlgItem.USER32(?,000003EA), ref: 00454690
            • SetWindowTextW.USER32(00000000,?), ref: 00454697
            • GetDlgItem.USER32(?,000003E9), ref: 004546A8
            • SetWindowTextW.USER32(00000000,?), ref: 004546AF
            • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
            • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
            • GetWindowRect.USER32(?,?), ref: 004546F5
            • SetWindowTextW.USER32(?,?), ref: 00454765
            • GetDesktopWindow.USER32 ref: 0045476F
            • GetWindowRect.USER32(00000000), ref: 00454776
            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
            • GetClientRect.USER32(?,?), ref: 004547D2
            • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
            • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
            • String ID:
            • API String ID: 3869813825-0
            • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
            • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
            • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
            • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
            APIs
            • _wcslen.LIBCMT ref: 00464B28
            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
            • _wcslen.LIBCMT ref: 00464C28
            • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
            • _wcslen.LIBCMT ref: 00464CBA
            • _wcslen.LIBCMT ref: 00464CD0
            • _wcslen.LIBCMT ref: 00464CEF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _wcslen$Directory$CurrentSystem
            • String ID: D
            • API String ID: 1914653954-2746444292
            • Opcode ID: 5f72559f0a2586b771b9af551f03c1fb97e064fdb306134380bfcbf6c4a29eaa
            • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
            • Opcode Fuzzy Hash: 5f72559f0a2586b771b9af551f03c1fb97e064fdb306134380bfcbf6c4a29eaa
            • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
            APIs
            • _wcsncpy.LIBCMT ref: 0045CE39
            • __wsplitpath.LIBCMT ref: 0045CE78
            • _wcscat.LIBCMT ref: 0045CE8B
            • _wcscat.LIBCMT ref: 0045CE9E
            • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEB2
            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEC5
              • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
            • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF05
            • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF1D
            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF2E
            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF3F
            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF53
            • _wcscpy.LIBCMT ref: 0045CF61
            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CFA4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
            • String ID: *.*
            • API String ID: 1153243558-438819550
            • Opcode ID: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
            • Instruction ID: eacc2f87ca0c49a88fd160cf35c0ab61f7b8ac52d7ffc0430f804bda47b2a69a
            • Opcode Fuzzy Hash: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
            • Instruction Fuzzy Hash: F071D572900208AEDB24DB54CCC5AEEB7B5AB44305F1489ABE805D7242D67C9ECDCB99
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: __wcsicoll
            • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
            • API String ID: 3832890014-4202584635
            • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
            • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
            • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
            • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
            APIs
            • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
            • GetFocus.USER32 ref: 0046A0DD
            • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
            • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessagePost$CtrlFocus
            • String ID: 0
            • API String ID: 1534620443-4108050209
            • Opcode ID: 69f57c1da7d99aaf19a54cb3f0377e1430f34c496c45dabe130679879bb200d9
            • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
            • Opcode Fuzzy Hash: 69f57c1da7d99aaf19a54cb3f0377e1430f34c496c45dabe130679879bb200d9
            • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
            APIs
            • DestroyWindow.USER32(?), ref: 004558E3
            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Window$CreateDestroy
            • String ID: ,$tooltips_class32
            • API String ID: 1109047481-3856767331
            • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
            • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
            • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
            • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
            APIs
            • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
            • GetMenuItemCount.USER32(?), ref: 00468C45
            • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
            • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
            • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
            • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
            • GetMenuItemCount.USER32 ref: 00468CFD
            • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
            • GetCursorPos.USER32(?), ref: 00468D3F
            • SetForegroundWindow.USER32(?), ref: 00468D49
            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
            • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
            • String ID: 0
            • API String ID: 1441871840-4108050209
            • Opcode ID: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
            • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
            • Opcode Fuzzy Hash: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
            • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
            APIs
            • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
            • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
            • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
            • __swprintf.LIBCMT ref: 00460915
            • __swprintf.LIBCMT ref: 0046092D
            • _wprintf.LIBCMT ref: 004609E1
            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
            • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
            • API String ID: 3631882475-2268648507
            • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
            • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
            • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
            • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
            APIs
            • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
            • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
            • SendMessageW.USER32 ref: 00471740
            • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
            • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
            • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
            • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
            • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
            • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
            • SendMessageW.USER32 ref: 0047184F
            • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
            • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
            • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
            • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
            • String ID:
            • API String ID: 4116747274-0
            • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
            • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
            • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
            • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
            APIs
            • GetClassNameW.USER32(?,?,00000100), ref: 00461678
            • _wcslen.LIBCMT ref: 00461683
            • __swprintf.LIBCMT ref: 00461721
            • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00461794
            • GetClassNameW.USER32(?,?,00000400), ref: 00461811
            • GetDlgCtrlID.USER32(?), ref: 00461869
            • GetWindowRect.USER32(?,?), ref: 004618A4
            • GetParent.USER32(?), ref: 004618C3
            • ScreenToClient.USER32(00000000), ref: 004618CA
            • GetClassNameW.USER32(?,?,00000100), ref: 00461941
            • GetWindowTextW.USER32(?,?,00000400), ref: 0046197E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
            • String ID: %s%u
            • API String ID: 1899580136-679674701
            • Opcode ID: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
            • Instruction ID: 362d1c13b2509f288ecdbc272899e32e1bd8f20a7ba75cfa55bfcaf2deda5cb5
            • Opcode Fuzzy Hash: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
            • Instruction Fuzzy Hash: 1DA1B2715043019FDB10DF55C884BAB73A8FF84314F08896EFD899B255E738E94ACBA6
            APIs
            • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
            • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
            • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: InfoItemMenu$Sleep
            • String ID: 0
            • API String ID: 1196289194-4108050209
            • Opcode ID: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
            • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
            • Opcode Fuzzy Hash: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
            • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
            APIs
            • GetDC.USER32(00000000), ref: 0043143E
            • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
            • CreateCompatibleDC.GDI32(00000000), ref: 00431459
            • SelectObject.GDI32(00000000,?), ref: 00431466
            • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
            • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
            • String ID: (
            • API String ID: 3300687185-3887548279
            • Opcode ID: 603e6b3e37746ec9058b96d14af227772b21f97dc715e72dc47e988551ca64b1
            • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
            • Opcode Fuzzy Hash: 603e6b3e37746ec9058b96d14af227772b21f97dc715e72dc47e988551ca64b1
            • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
            APIs
              • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
              • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
            • GetDriveTypeW.KERNEL32 ref: 0045DB32
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
            • API String ID: 1976180769-4113822522
            • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
            • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
            • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
            • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _wcslen$_wcsncpy$LocalTime__fassign
            • String ID:
            • API String ID: 461458858-0
            • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
            • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
            • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
            • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
            APIs
            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
            • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
            • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
            • GlobalLock.KERNEL32(00000000), ref: 004300F6
            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
            • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
            • CloseHandle.KERNEL32(00000000), ref: 00430113
            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
            • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
            • GlobalFree.KERNEL32(00000000), ref: 00430150
            • GetObjectW.GDI32(?,00000018,?), ref: 00430177
            • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
            • DeleteObject.GDI32(?), ref: 004301D0
            • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
            • String ID:
            • API String ID: 3969911579-0
            • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
            • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
            • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
            • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
            • String ID: 0
            • API String ID: 956284711-4108050209
            • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
            • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
            • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
            • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
            • String ID: 0.0.0.0
            • API String ID: 1965227024-3771769585
            • Opcode ID: 076f4e753302d8e1360c69636e2804f45f3b9e513b8bc5fd0a6f442411ef1df6
            • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
            • Opcode Fuzzy Hash: 076f4e753302d8e1360c69636e2804f45f3b9e513b8bc5fd0a6f442411ef1df6
            • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
            APIs
              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: SendString$_memmove_wcslen
            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
            • API String ID: 369157077-1007645807
            • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
            • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
            • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
            • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
            APIs
            • GetParent.USER32 ref: 00445BF8
            • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
            • __wcsicoll.LIBCMT ref: 00445C33
            • __wcsicoll.LIBCMT ref: 00445C4F
            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: __wcsicoll$ClassMessageNameParentSend
            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
            • API String ID: 3125838495-3381328864
            • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
            • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
            • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
            • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
            APIs
            • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
            • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
            • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
            • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
            • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
            • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
            • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
            • SendMessageW.USER32(?,00000402,?), ref: 00449399
            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessageSend$CharNext
            • String ID:
            • API String ID: 1350042424-0
            • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
            • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
            • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
            • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
            APIs
              • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
              • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
            • GetDriveTypeW.KERNEL32(?), ref: 004787B9
            • _wcscpy.LIBCMT ref: 004787E5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: BuffCharDriveLowerType_wcscpy_wcslen
            • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
            • API String ID: 3052893215-2127371420
            • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
            • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
            • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
            • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
            APIs
            • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
            • __swprintf.LIBCMT ref: 0045E7F7
            • _wprintf.LIBCMT ref: 0045E8B3
            • _wprintf.LIBCMT ref: 0045E8D7
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
            • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
            • API String ID: 2295938435-2354261254
            • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
            • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
            • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
            • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: __swprintf_wcscpy$__i64tow__itow
            • String ID: %.15g$0x%p$False$True
            • API String ID: 3038501623-2263619337
            • Opcode ID: c1d1e427df81d364f3e7315beb2c85998febd91a9edec5b390063b37ecf0eef7
            • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
            • Opcode Fuzzy Hash: c1d1e427df81d364f3e7315beb2c85998febd91a9edec5b390063b37ecf0eef7
            • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
            APIs
            • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
            • __swprintf.LIBCMT ref: 0045E5F6
            • _wprintf.LIBCMT ref: 0045E6A3
            • _wprintf.LIBCMT ref: 0045E6C7
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
            • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
            • API String ID: 2295938435-8599901
            • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
            • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
            • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
            • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
            APIs
            • timeGetTime.WINMM ref: 00443B67
              • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
            • Sleep.KERNEL32(0000000A), ref: 00443B9F
            • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00443BC8
            • SetActiveWindow.USER32(?), ref: 00443BEC
            • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
            • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00443C22
            • Sleep.KERNEL32(000000FA), ref: 00443C2D
            • IsWindow.USER32(?), ref: 00443C3A
            • EndDialog.USER32(?,00000000), ref: 00443C4C
              • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
              • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
              • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
            • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
            • String ID: BUTTON
            • API String ID: 1834419854-3405671355
            • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
            • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
            • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
            • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
            APIs
            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
            • LoadStringW.USER32(00000000), ref: 00454040
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • _wprintf.LIBCMT ref: 00454074
            • __swprintf.LIBCMT ref: 004540A3
            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
            • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
            • API String ID: 455036304-4153970271
            • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
            • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
            • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
            • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
            APIs
            • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
            • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
            • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
            • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
            • _memmove.LIBCMT ref: 00467EB8
            • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
            • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
            • _memmove.LIBCMT ref: 00467F6C
            • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
            • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
              • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
            • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
            • String ID:
            • API String ID: 2170234536-0
            • Opcode ID: ee399615404d7bb1bafc861e07f1b5ddd683e7781e6b5cedfe79e56e9046232f
            • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
            • Opcode Fuzzy Hash: ee399615404d7bb1bafc861e07f1b5ddd683e7781e6b5cedfe79e56e9046232f
            • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
            APIs
            • GetKeyboardState.USER32(?), ref: 00453CE0
            • SetKeyboardState.USER32(?), ref: 00453D3B
            • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
            • GetKeyState.USER32(000000A0), ref: 00453D75
            • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
            • GetKeyState.USER32(000000A1), ref: 00453DB5
            • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
            • GetKeyState.USER32(00000011), ref: 00453DEF
            • GetAsyncKeyState.USER32(00000012), ref: 00453E18
            • GetKeyState.USER32(00000012), ref: 00453E26
            • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
            • GetKeyState.USER32(0000005B), ref: 00453E5D
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: State$Async$Keyboard
            • String ID:
            • API String ID: 541375521-0
            • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
            • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
            • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
            • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
            APIs
            • GetDlgItem.USER32(?,00000001), ref: 004357DB
            • GetWindowRect.USER32(00000000,?), ref: 004357ED
            • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
            • GetDlgItem.USER32(?,00000002), ref: 0043586A
            • GetWindowRect.USER32(00000000,?), ref: 0043587C
            • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
            • GetDlgItem.USER32(?,000003E9), ref: 004358DC
            • GetWindowRect.USER32(00000000,?), ref: 004358EE
            • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
            • GetDlgItem.USER32(?,000003EA), ref: 00435941
            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
            • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Window$ItemMoveRect$Invalidate
            • String ID:
            • API String ID: 3096461208-0
            • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
            • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
            • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
            • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
            APIs
            • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
            • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
            • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
            • DeleteObject.GDI32(?), ref: 0047151E
            • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
            • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
            • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
            • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
            • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
            • DeleteObject.GDI32(?), ref: 004715EA
            • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
            • String ID:
            • API String ID: 3218148540-0
            • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
            • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
            • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
            • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
            • String ID:
            • API String ID: 136442275-0
            • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
            • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
            • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
            • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
            APIs
            • _wcsncpy.LIBCMT ref: 00467490
            • _wcsncpy.LIBCMT ref: 004674BC
              • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
              • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
            • _wcstok.LIBCMT ref: 004674FF
              • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
            • _wcstok.LIBCMT ref: 004675B2
            • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
            • _wcslen.LIBCMT ref: 00467793
            • _wcscpy.LIBCMT ref: 00467641
              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
            • _wcslen.LIBCMT ref: 004677BD
            • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
              • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
            • String ID: X
            • API String ID: 3104067586-3081909835
            • Opcode ID: eb9283ffadc70d7ae5f0b14c33a6b36f7734343f68681e5f3ce0481c1d9d9f7d
            • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
            • Opcode Fuzzy Hash: eb9283ffadc70d7ae5f0b14c33a6b36f7734343f68681e5f3ce0481c1d9d9f7d
            • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
            APIs
            • OleInitialize.OLE32(00000000), ref: 0046CBC7
            • CLSIDFromProgID.OLE32(?,?), ref: 0046CBDF
            • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
            • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
            • _wcslen.LIBCMT ref: 0046CDB0
            • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
            • CoTaskMemFree.OLE32(?), ref: 0046CE42
            • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
              • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
              • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
              • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
            Strings
            • NULL Pointer assignment, xrefs: 0046CEA6
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
            • String ID: NULL Pointer assignment
            • API String ID: 440038798-2785691316
            • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
            • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
            • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
            • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95
            APIs
            • GetClassNameW.USER32(?,?,00000400), ref: 00461056
            • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
            • _wcslen.LIBCMT ref: 004610A3
            • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
            • GetClassNameW.USER32(?,?,00000400), ref: 00461124
            • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
            • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
            • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
            • GetWindowRect.USER32(?,?), ref: 00461248
              • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
            • String ID: ThumbnailClass
            • API String ID: 4136854206-1241985126
            • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
            • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
            • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
            • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
            APIs
            • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
            • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
            • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
            • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
            • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
            • GetClientRect.USER32(?,?), ref: 00471A1A
            • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
            • DestroyIcon.USER32(?), ref: 00471AF4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
            • String ID: 2
            • API String ID: 1331449709-450215437
            • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
            • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
            • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
            • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
            APIs
            • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
            • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
            • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
            • __swprintf.LIBCMT ref: 00460915
            • __swprintf.LIBCMT ref: 0046092D
            • _wprintf.LIBCMT ref: 004609E1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
            • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
            • API String ID: 3054410614-2561132961
            • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
            • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
            • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
            • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
            APIs
              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
            • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
            • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
            • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
            • CLSIDFromString.OLE32(?,?), ref: 004587B3
            • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
            • RegCloseKey.ADVAPI32(?), ref: 004587C5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
            • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
            • API String ID: 600699880-22481851
            • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
            • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
            • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
            • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: DestroyWindow
            • String ID: static
            • API String ID: 3375834691-2160076837
            • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
            • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
            • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
            • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D959
            • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ErrorMode$DriveType
            • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
            • API String ID: 2907320926-3566645568
            • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
            • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
            • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
            • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
            APIs
              • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
            • DestroyAcceleratorTable.USER32(?), ref: 0047094A
            • ImageList_Destroy.COMCTL32(?), ref: 004709AD
            • ImageList_Destroy.COMCTL32(?), ref: 004709C5
            • ImageList_Destroy.COMCTL32(?), ref: 004709D5
            • DeleteObject.GDI32(00650000), ref: 00470A04
            • DestroyIcon.USER32(00730072), ref: 00470A1C
            • DeleteObject.GDI32(3204CD18), ref: 00470A34
            • DestroyWindow.USER32(00540000), ref: 00470A4C
            • DestroyIcon.USER32(?), ref: 00470A73
            • DestroyIcon.USER32(?), ref: 00470A81
            • KillTimer.USER32(00000000,00000000), ref: 00470B00
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
            • String ID:
            • API String ID: 1237572874-0
            • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
            • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
            • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
            • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
            APIs
            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
            • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
            • VariantInit.OLEAUT32(?), ref: 004793E1
            • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
            • VariantCopy.OLEAUT32(?,?), ref: 00479461
            • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
            • VariantClear.OLEAUT32(?), ref: 00479489
            • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
            • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
            • VariantClear.OLEAUT32(?), ref: 004794CA
            • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
            • String ID:
            • API String ID: 2706829360-0
            • Opcode ID: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
            • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
            • Opcode Fuzzy Hash: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
            • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
            APIs
            • GetKeyboardState.USER32(?), ref: 0044480E
            • GetAsyncKeyState.USER32(000000A0), ref: 00444899
            • GetKeyState.USER32(000000A0), ref: 004448AA
            • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
            • GetKeyState.USER32(000000A1), ref: 004448D9
            • GetAsyncKeyState.USER32(00000011), ref: 004448F5
            • GetKeyState.USER32(00000011), ref: 00444903
            • GetAsyncKeyState.USER32(00000012), ref: 0044491F
            • GetKeyState.USER32(00000012), ref: 0044492D
            • GetAsyncKeyState.USER32(0000005B), ref: 00444949
            • GetKeyState.USER32(0000005B), ref: 00444958
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: State$Async$Keyboard
            • String ID:
            • API String ID: 541375521-0
            • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
            • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
            • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
            • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: InitVariant$_malloc_wcscpy_wcslen
            • String ID:
            • API String ID: 3413494760-0
            • Opcode ID: 6d788ec2be1997d9cec64eaa256864158e09ad3f6105efb05e468561ef8a9f6c
            • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
            • Opcode Fuzzy Hash: 6d788ec2be1997d9cec64eaa256864158e09ad3f6105efb05e468561ef8a9f6c
            • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: AddressProc_free_malloc$_strcat_strlen
            • String ID: AU3_FreeVar
            • API String ID: 2634073740-771828931
            • Opcode ID: 8752c60cbf461b2b1ad9d0d2e6ce46fc02185390cfde25c6fd7db8b8bd3e9615
            • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
            • Opcode Fuzzy Hash: 8752c60cbf461b2b1ad9d0d2e6ce46fc02185390cfde25c6fd7db8b8bd3e9615
            • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
            APIs
            • CoInitialize.OLE32 ref: 0046C63A
            • CoUninitialize.OLE32 ref: 0046C645
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
              • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
              • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
            • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
            • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
            • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
            • IIDFromString.OLE32(?,?), ref: 0046C705
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
            • API String ID: 2294789929-1287834457
            • Opcode ID: 8665205133a3f3d83065b0d9f42e266eef00d51d9f24292ab734099309a65fda
            • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
            • Opcode Fuzzy Hash: 8665205133a3f3d83065b0d9f42e266eef00d51d9f24292ab734099309a65fda
            • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
            APIs
              • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
              • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
              • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
              • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
            • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
            • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
            • ImageList_EndDrag.COMCTL32 ref: 00471169
            • ReleaseCapture.USER32 ref: 0047116F
            • SetWindowTextW.USER32(?,00000000), ref: 00471206
            • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
            • String ID: @GUI_DRAGFILE$@GUI_DROPID
            • API String ID: 2483343779-2107944366
            • Opcode ID: 20a5a3ce7c175183900f948b12cd71fc676271c7bfbce6bb48b8262f94f29e03
            • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
            • Opcode Fuzzy Hash: 20a5a3ce7c175183900f948b12cd71fc676271c7bfbce6bb48b8262f94f29e03
            • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
            APIs
            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
            • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
            • _wcslen.LIBCMT ref: 00450720
            • _wcscat.LIBCMT ref: 00450733
            • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
            • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessageSend$Window_wcscat_wcslen
            • String ID: -----$SysListView32
            • API String ID: 4008455318-3975388722
            • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
            • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
            • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
            • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
            APIs
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
            • GetDlgCtrlID.USER32(00000000), ref: 00469C84
            • GetParent.USER32 ref: 00469C98
            • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
            • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
            • GetParent.USER32 ref: 00469CBC
            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessageSend$CtrlParent$_memmove_wcslen
            • String ID: ComboBox$ListBox
            • API String ID: 2360848162-1403004172
            • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
            • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
            • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
            • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
            • String ID:
            • API String ID: 262282135-0
            • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
            • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
            • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
            • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
            APIs
            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
            • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
            • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
            • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
            • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
            • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
            • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessageSend$LongWindow
            • String ID:
            • API String ID: 312131281-0
            • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
            • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
            • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
            • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
            APIs
              • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
            • SendMessageW.USER32(75C123D0,00001001,00000000,?), ref: 00448E16
            • SendMessageW.USER32(75C123D0,00001026,00000000,?), ref: 00448E25
              • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessageSend$BrushCreateDeleteObjectSolid
            • String ID:
            • API String ID: 3771399671-0
            • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
            • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
            • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
            • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
            APIs
            • GetCurrentThreadId.KERNEL32 ref: 00434643
            • GetForegroundWindow.USER32(00000000), ref: 00434655
            • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
            • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
            • String ID:
            • API String ID: 2156557900-0
            • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
            • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
            • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
            • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID:
            • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
            • API String ID: 0-1603158881
            • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
            • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
            • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
            • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
            APIs
            • CreateMenu.USER32 ref: 00448603
            • SetMenu.USER32(?,00000000), ref: 00448613
            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
            • IsMenu.USER32(?), ref: 004486AB
            • CreatePopupMenu.USER32 ref: 004486B5
            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
            • DrawMenuBar.USER32 ref: 004486F5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Menu$CreateItem$DrawInfoInsertPopup
            • String ID: 0
            • API String ID: 161812096-4108050209
            • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
            • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
            • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
            • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b5b2eb1c0fd75675c26b78e4e5fa3366e30ffffa818d49f3caf60ca944b06ede
            • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
            • Opcode Fuzzy Hash: b5b2eb1c0fd75675c26b78e4e5fa3366e30ffffa818d49f3caf60ca944b06ede
            • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
            APIs
              • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
              • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
            • lstrcmpiW.KERNEL32(?,?), ref: 00453900
            • MoveFileW.KERNEL32(?,?), ref: 00453932
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: File$AttributesFullMoveNamePathlstrcmpi
            • String ID:
            • API String ID: 978794511-0
            • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
            • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
            • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
            • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
            • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
            • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
            • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ClearVariant
            • String ID:
            • API String ID: 1473721057-0
            • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
            • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
            • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
            • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _memmove$_memcmp
            • String ID: '$\$h
            • API String ID: 2205784470-1303700344
            • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
            • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
            • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
            • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
            APIs
            • VariantInit.OLEAUT32(00000000), ref: 0045EA56
            • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
            • VariantClear.OLEAUT32 ref: 0045EA6D
            • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
            • __swprintf.LIBCMT ref: 0045EC33
            • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
            Strings
            • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Variant$InitTime$ClearCopySystem__swprintf
            • String ID: %4d%02d%02d%02d%02d%02d
            • API String ID: 2441338619-1568723262
            • Opcode ID: 88db3983bd4ed7f03cb514a0c18a36c5a2e0261ee80d3730b42f63d3e5698cbf
            • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
            • Opcode Fuzzy Hash: 88db3983bd4ed7f03cb514a0c18a36c5a2e0261ee80d3730b42f63d3e5698cbf
            • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
            APIs
            • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
            • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
            • Sleep.KERNEL32(0000000A), ref: 0042C67F
            • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
            • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Interlocked$DecrementIncrement$Sleep
            • String ID: @COM_EVENTOBJ
            • API String ID: 327565842-2228938565
            • Opcode ID: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
            • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
            • Opcode Fuzzy Hash: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
            • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
            APIs
            • VariantClear.OLEAUT32(?), ref: 0047031B
            • VariantClear.OLEAUT32(?), ref: 0047044F
            • VariantInit.OLEAUT32(?), ref: 004704A3
            • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
            • VariantClear.OLEAUT32(?), ref: 00470516
              • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
            • VariantCopy.OLEAUT32(?,?), ref: 0047057A
              • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
            • VariantClear.OLEAUT32(00000000), ref: 0047060D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Variant$Clear$Copy$CallDispFuncInit
            • String ID: H
            • API String ID: 3613100350-2852464175
            • Opcode ID: 6f8afcb4607c5af54da810b5d10f04910e32cf7df3ff1b1a5cf283966db8269a
            • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
            • Opcode Fuzzy Hash: 6f8afcb4607c5af54da810b5d10f04910e32cf7df3ff1b1a5cf283966db8269a
            • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
            APIs
            • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
            • DestroyWindow.USER32(?), ref: 00426F50
            • UnregisterHotKey.USER32(?), ref: 00426F77
            • FreeLibrary.KERNEL32(?), ref: 0042701F
            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
            • String ID: close all
            • API String ID: 4174999648-3243417748
            • Opcode ID: 2f66c89a40f0e85c5d6dd4ec67defb2116834faec8b505cc193eeea2d12e665d
            • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
            • Opcode Fuzzy Hash: 2f66c89a40f0e85c5d6dd4ec67defb2116834faec8b505cc193eeea2d12e665d
            • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
            APIs
            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
            • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
            • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
            • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
            • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
              • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
            • String ID:
            • API String ID: 1291720006-3916222277
            • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
            • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
            • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
            • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
            APIs
            • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
            • IsMenu.USER32(?), ref: 0045FC5F
            • CreatePopupMenu.USER32 ref: 0045FC97
            • GetMenuItemCount.USER32(?), ref: 0045FCFD
            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Menu$Item$CountCreateInfoInsertPopup
            • String ID: 0$2
            • API String ID: 93392585-3793063076
            • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
            • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
            • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
            • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
            APIs
            • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
            • VariantClear.OLEAUT32(?), ref: 00435320
            • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
            • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
            • VariantClear.OLEAUT32(?), ref: 004353B3
            • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
            • String ID: crts
            • API String ID: 586820018-3724388283
            • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
            • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
            • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
            • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
            APIs
              • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
            • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
            • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
            • _wcscat.LIBCMT ref: 0044BCAF
            • _wcslen.LIBCMT ref: 0044BCBB
            • _wcslen.LIBCMT ref: 0044BCD1
            • SHFileOperationW.SHELL32(?), ref: 0044BD17
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
            • String ID: \*.*
            • API String ID: 2326526234-1173974218
            • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
            • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
            • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
            • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
            APIs
              • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
            • _wcslen.LIBCMT ref: 004335F2
            • GetFileAttributesW.KERNEL32(?), ref: 0043361C
            • GetLastError.KERNEL32 ref: 0043362B
            • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
            • _wcsrchr.LIBCMT ref: 00433666
              • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
            • String ID: \
            • API String ID: 321622961-2967466578
            • Opcode ID: c150a4e9996d72ab87fed94048e5703dbc8ac01b5d1c28e2aacddbc68f85fc9a
            • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
            • Opcode Fuzzy Hash: c150a4e9996d72ab87fed94048e5703dbc8ac01b5d1c28e2aacddbc68f85fc9a
            • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: __wcsnicmp
            • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
            • API String ID: 1038674560-2734436370
            • Opcode ID: 7c13aa0513e4bb2138c96398a5a2566d58b08304d963883aeef11e8644bf4991
            • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
            • Opcode Fuzzy Hash: 7c13aa0513e4bb2138c96398a5a2566d58b08304d963883aeef11e8644bf4991
            • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
            APIs
            • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,004A7F6C), ref: 00434057
            • LoadStringW.USER32(00000000), ref: 00434060
            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
            • LoadStringW.USER32(00000000), ref: 00434078
            • _wprintf.LIBCMT ref: 004340A1
            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
            Strings
            • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: HandleLoadModuleString$Message_wprintf
            • String ID: %s (%d) : ==> %s: %s %s
            • API String ID: 3648134473-3128320259
            • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
            • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
            • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
            • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
            APIs
            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
            • __lock.LIBCMT ref: 00417981
              • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
              • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
              • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
            • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
            • __lock.LIBCMT ref: 004179A2
            • ___addlocaleref.LIBCMT ref: 004179C0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
            • String ID: KERNEL32.DLL$pI
            • API String ID: 637971194-197072765
            • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
            • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
            • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
            • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _memmove$_malloc
            • String ID:
            • API String ID: 1938898002-0
            • Opcode ID: 0b38315dd5595bc9b6cdba2c23ba2101394e99cbfafbb6bdfa5f530b56cc0c70
            • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
            • Opcode Fuzzy Hash: 0b38315dd5595bc9b6cdba2c23ba2101394e99cbfafbb6bdfa5f530b56cc0c70
            • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
            APIs
              • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
            • SendMessageW.USER32(75C123D0,00001001,00000000,?), ref: 00448E16
            • SendMessageW.USER32(75C123D0,00001026,00000000,?), ref: 00448E25
              • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessageSend$BrushCreateDeleteObjectSolid
            • String ID:
            • API String ID: 3771399671-0
            • Opcode ID: 66a9d50f8c9d6af755a83d84fc10a8c9f79f913464eba51571b63e3dd0d935a7
            • Instruction ID: 7a731ed810a83f1ebb4df5e1cc4d29f9b75a103154dfe2ed632c3d1cef216bf4
            • Opcode Fuzzy Hash: 66a9d50f8c9d6af755a83d84fc10a8c9f79f913464eba51571b63e3dd0d935a7
            • Instruction Fuzzy Hash: 72513970204244AFF720DF24CC85FAE7BB9AF15314F10495EFA999B292CB79E549CB18
            APIs
            • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
            • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
            • _memmove.LIBCMT ref: 0044B555
            • _memmove.LIBCMT ref: 0044B578
            • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
            • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
            • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
            • String ID:
            • API String ID: 2737351978-0
            • Opcode ID: acaa13feec575fcc8965567212d79990a10c5ddbc5928143d32797644f5f1a34
            • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
            • Opcode Fuzzy Hash: acaa13feec575fcc8965567212d79990a10c5ddbc5928143d32797644f5f1a34
            • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
            APIs
            • ___set_flsgetvalue.LIBCMT ref: 0041523A
            • __calloc_crt.LIBCMT ref: 00415246
            • __getptd.LIBCMT ref: 00415253
            • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
            • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
            • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
            • _free.LIBCMT ref: 0041529E
            • __dosmaperr.LIBCMT ref: 004152A9
              • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
            • String ID:
            • API String ID: 3638380555-0
            • Opcode ID: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
            • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
            • Opcode Fuzzy Hash: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
            • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
            APIs
            • VariantInit.OLEAUT32(?), ref: 0046C96E
              • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
              • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Variant$Copy$ClearErrorInitLast
            • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
            • API String ID: 3207048006-625585964
            • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
            • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
            • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
            • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
            APIs
            • WSAStartup.WSOCK32(00000101,?), ref: 00465559
              • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
            • inet_addr.WSOCK32(?,00000000,?,?), ref: 0046559B
            • gethostbyname.WSOCK32(?), ref: 004655A6
            • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
            • _memmove.LIBCMT ref: 004656CA
            • GlobalFree.KERNEL32(00000000), ref: 0046575C
            • WSACleanup.WSOCK32 ref: 00465762
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
            • String ID:
            • API String ID: 2945290962-0
            • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
            • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
            • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
            • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
            APIs
            • GetSystemMetrics.USER32(0000000F), ref: 00440527
            • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
            • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
            • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
            • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
            • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
            • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
            • String ID:
            • API String ID: 1457242333-0
            • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
            • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
            • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
            • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
            APIs
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ConnectRegistry_memmove_wcslen
            • String ID:
            • API String ID: 15295421-0
            • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
            • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
            • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
            • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
            APIs
              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
            • _wcstok.LIBCMT ref: 004675B2
              • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
            • _wcscpy.LIBCMT ref: 00467641
            • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
            • _wcslen.LIBCMT ref: 00467793
            • _wcslen.LIBCMT ref: 004677BD
              • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
            • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
            • String ID: X
            • API String ID: 780548581-3081909835
            • Opcode ID: 59d8333ba564867e966a45eb1cae5b5c9aa55f5f2a82546ce07c615cef46a44c
            • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
            • Opcode Fuzzy Hash: 59d8333ba564867e966a45eb1cae5b5c9aa55f5f2a82546ce07c615cef46a44c
            • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
            APIs
              • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
              • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
              • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
            • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
            • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
            • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
            • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
            • CloseFigure.GDI32(?), ref: 0044751F
            • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
            • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
            • String ID:
            • API String ID: 4082120231-0
            • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
            • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
            • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
            • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
            APIs
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
            • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
            • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
            • RegCloseKey.ADVAPI32(?), ref: 0046B49D
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
            • String ID:
            • API String ID: 2027346449-0
            • Opcode ID: f0ceecdc90b01f2c9ddf0369269a16fa16a69f0e3d9f986347dd5438d1ccccc0
            • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
            • Opcode Fuzzy Hash: f0ceecdc90b01f2c9ddf0369269a16fa16a69f0e3d9f986347dd5438d1ccccc0
            • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
            APIs
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
              • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
            • GetMenu.USER32 ref: 0047A703
            • GetMenuItemCount.USER32(00000000), ref: 0047A74F
            • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
            • _wcslen.LIBCMT ref: 0047A79E
            • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
            • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
            • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
            • String ID:
            • API String ID: 3257027151-0
            • Opcode ID: 80d25b5d47cdb8856cfd5c6f23c0a19e515c97fff049208cbae9d6eea43d64d6
            • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
            • Opcode Fuzzy Hash: 80d25b5d47cdb8856cfd5c6f23c0a19e515c97fff049208cbae9d6eea43d64d6
            • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
            APIs
            • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
            • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ErrorLastselect
            • String ID:
            • API String ID: 215497628-0
            • Opcode ID: 7869ea255bd8c826c1db511583610b45135028457a69a3d51942e2ff55a69274
            • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
            • Opcode Fuzzy Hash: 7869ea255bd8c826c1db511583610b45135028457a69a3d51942e2ff55a69274
            • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
            APIs
            • GetParent.USER32(?), ref: 0044443B
            • GetKeyboardState.USER32(?), ref: 00444450
            • SetKeyboardState.USER32(?), ref: 004444A4
            • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
            • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
            • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessagePost$KeyboardState$Parent
            • String ID:
            • API String ID: 87235514-0
            • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
            • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
            • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
            • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
            APIs
            • GetParent.USER32(?), ref: 00444633
            • GetKeyboardState.USER32(?), ref: 00444648
            • SetKeyboardState.USER32(?), ref: 0044469C
            • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
            • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
            • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
            • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessagePost$KeyboardState$Parent
            • String ID:
            • API String ID: 87235514-0
            • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
            • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
            • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
            • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: __snwprintf__wcsicoll_wcscpy
            • String ID: , $$AUTOITCALLVARIABLE%d$CALLARGARRAY
            • API String ID: 1729044348-3025626884
            • Opcode ID: 599cccbd760059ba6f53ae3639d1d80998b6b1e729bf9cd2c9905b8b1e7a15cb
            • Instruction ID: fa375d034fa7217e9d4d929611683fd4ef9c76ca58110cba6d833e9902d6ecd0
            • Opcode Fuzzy Hash: 599cccbd760059ba6f53ae3639d1d80998b6b1e729bf9cd2c9905b8b1e7a15cb
            • Instruction Fuzzy Hash: 5D5184719002099BCB10EF51C982AEFB779EF84308F10856BF905B7281D779AE45CBE9
            APIs
            • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
            • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
            • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
            • DeleteObject.GDI32(?), ref: 00455736
            • DeleteObject.GDI32(?), ref: 00455744
            • DestroyIcon.USER32(?), ref: 00455752
            • DestroyWindow.USER32(?), ref: 00455760
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
            • String ID:
            • API String ID: 2354583917-0
            • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
            • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
            • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
            • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
            • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
            • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
            • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
            APIs
            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
            • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
            • EnableWindow.USER32(?,00000000), ref: 00448B5C
            • EnableWindow.USER32(?,00000001), ref: 00448B72
            • ShowWindow.USER32(?,00000000), ref: 00448BE8
            • ShowWindow.USER32(?,00000004), ref: 00448BF4
            • EnableWindow.USER32(?,00000001), ref: 00448C09
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Window$Enable$Show$MessageMoveSend
            • String ID:
            • API String ID: 896007046-0
            • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
            • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
            • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
            • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
            APIs
            • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
            • GetFocus.USER32 ref: 00448ACF
            • EnableWindow.USER32(?,00000000), ref: 00448B5C
            • EnableWindow.USER32(?,00000001), ref: 00448B72
            • ShowWindow.USER32(?,00000000), ref: 00448BE8
            • ShowWindow.USER32(?,00000004), ref: 00448BF4
            • EnableWindow.USER32(?,00000001), ref: 00448C09
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Window$Enable$Show$FocusMessageSend
            • String ID:
            • API String ID: 3429747543-0
            • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
            • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
            • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
            • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D459
            • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
            • __swprintf.LIBCMT ref: 0045D4E9
            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ErrorMode$InformationVolume__swprintf
            • String ID: %lu$\VH
            • API String ID: 3164766367-2432546070
            • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
            • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
            • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
            • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
            APIs
            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
            • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
            • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: Msctls_Progress32
            • API String ID: 3850602802-3636473452
            • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
            • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
            • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
            • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
            • String ID:
            • API String ID: 3985565216-0
            • Opcode ID: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
            • Instruction ID: 510e71718d61fb01ae158a6e5fa7ad280301b7661e5b3aef53c80a3471921dd4
            • Opcode Fuzzy Hash: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
            • Instruction Fuzzy Hash: 70217E70200A00EFCB20DF25D9D4A2A77AABF48712F10896DE906CB356D739EC45CB69
            APIs
            • _malloc.LIBCMT ref: 0041F707
              • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
              • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
              • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
            • _free.LIBCMT ref: 0041F71A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: AllocateHeap_free_malloc
            • String ID: [B
            • API String ID: 1020059152-632041663
            • Opcode ID: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
            • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
            • Opcode Fuzzy Hash: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
            • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
            APIs
            • ___set_flsgetvalue.LIBCMT ref: 00413DA4
            • __calloc_crt.LIBCMT ref: 00413DB0
            • __getptd.LIBCMT ref: 00413DBD
            • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
            • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
            • _free.LIBCMT ref: 00413E07
            • __dosmaperr.LIBCMT ref: 00413E12
              • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
            • String ID:
            • API String ID: 155776804-0
            • Opcode ID: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
            • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
            • Opcode Fuzzy Hash: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
            • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
            APIs
              • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
              • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
            • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
            • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
            • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
            • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
            • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
            • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
            • String ID:
            • API String ID: 1957940570-0
            • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
            • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
            • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
            • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
            APIs
            • ___set_flsgetvalue.LIBCMT ref: 00413D20
              • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
              • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
            • ___fls_getvalue@4.LIBCMT ref: 00413D2B
              • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
            • ___fls_setvalue@8.LIBCMT ref: 00413D3E
            • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
            • ExitThread.KERNEL32 ref: 00413D4E
            • GetCurrentThreadId.KERNEL32 ref: 00413D54
            • __freefls@4.LIBCMT ref: 00413D74
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
            • String ID:
            • API String ID: 259663610-0
            • Opcode ID: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
            • Instruction ID: 675159a2c5a9d795bd3e19fa90b6febf5cd616b5876767659bafc4934cd781b8
            • Opcode Fuzzy Hash: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
            • Instruction Fuzzy Hash: 0DF0FF75504700AFC704BF72D9498CE7BB9AF48349720846EB80987222DA3DD9C2DBA9
            APIs
            • GetClientRect.USER32(?,?), ref: 004302E6
            • GetWindowRect.USER32(00000000,?), ref: 00430316
            • GetClientRect.USER32(?,?), ref: 00430364
            • GetSystemMetrics.USER32(0000000F), ref: 004303B1
            • GetWindowRect.USER32(?,?), ref: 004303C3
            • ScreenToClient.USER32(?,?), ref: 004303EC
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Rect$Client$Window$MetricsScreenSystem
            • String ID:
            • API String ID: 3220332590-0
            • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
            • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
            • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
            • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _malloc_wcslen$_strcat_wcscpy
            • String ID:
            • API String ID: 1612042205-0
            • Opcode ID: de986be264bc4095e11606319f6bc53bb2fe9b52cfcfc757ffd23d2b2712e847
            • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
            • Opcode Fuzzy Hash: de986be264bc4095e11606319f6bc53bb2fe9b52cfcfc757ffd23d2b2712e847
            • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _memmove_strncmp
            • String ID: >$U$\
            • API String ID: 2666721431-237099441
            • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
            • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
            • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
            • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
            APIs
            • GetKeyboardState.USER32(?), ref: 0044C570
            • SetKeyboardState.USER32(00000080), ref: 0044C594
            • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
            • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
            • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
            • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessagePost$KeyboardState$InputSend
            • String ID:
            • API String ID: 2221674350-0
            • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
            • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
            • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
            • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _wcscpy$_wcscat
            • String ID:
            • API String ID: 2037614760-0
            • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
            • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
            • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
            • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
            APIs
            • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
            • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
            • VariantCopy.OLEAUT32(?,?), ref: 00451C0E
            • VariantCopy.OLEAUT32(?,?), ref: 00451C27
            • VariantClear.OLEAUT32(?), ref: 00451CA1
            • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Variant$Copy$AllocClearErrorLastString
            • String ID:
            • API String ID: 960795272-0
            • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
            • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
            • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
            • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
            APIs
            • BeginPaint.USER32(00000000,?), ref: 00447BDF
            • GetWindowRect.USER32(?,?), ref: 00447C5D
            • ScreenToClient.USER32(?,?), ref: 00447C7B
            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
            • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
            • EndPaint.USER32(?,?), ref: 00447D13
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
            • String ID:
            • API String ID: 4189319755-0
            • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
            • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
            • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
            • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
            APIs
            • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
            • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
            • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
            • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
            • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessageSend$LongWindow$InvalidateRect
            • String ID:
            • API String ID: 1976402638-0
            • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
            • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
            • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
            • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
            APIs
            • ShowWindow.USER32(?,00000000), ref: 00440A8A
            • EnableWindow.USER32(?,00000000), ref: 00440AAF
            • ShowWindow.USER32(?,00000000), ref: 00440B18
            • ShowWindow.USER32(?,00000004), ref: 00440B2B
            • EnableWindow.USER32(?,00000001), ref: 00440B50
            • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Window$Show$Enable$MessageSend
            • String ID:
            • API String ID: 642888154-0
            • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
            • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
            • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
            • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Variant$Copy$ClearErrorLast
            • String ID: NULL Pointer assignment$Not an Object type
            • API String ID: 2487901850-572801152
            • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
            • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
            • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
            • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
            APIs
            • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
            • EnableWindow.USER32(?,00000000), ref: 00448B5C
            • EnableWindow.USER32(?,00000001), ref: 00448B72
            • ShowWindow.USER32(?,00000000), ref: 00448BE8
            • ShowWindow.USER32(?,00000004), ref: 00448BF4
            • EnableWindow.USER32(?,00000001), ref: 00448C09
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Window$Enable$Show$MessageSend
            • String ID:
            • API String ID: 1871949834-0
            • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
            • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
            • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
            • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
            • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
            • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
            • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
            APIs
            • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
            • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
            • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
            • SendMessageW.USER32 ref: 00471AE3
            • DestroyIcon.USER32(?), ref: 00471AF4
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
            • String ID:
            • API String ID: 3611059338-0
            • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
            • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
            • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
            • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: DestroyWindow$DeleteObject$IconMove
            • String ID:
            • API String ID: 1640429340-0
            • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
            • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
            • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
            • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
            APIs
              • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
              • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
            • _wcslen.LIBCMT ref: 004438CD
            • _wcslen.LIBCMT ref: 004438E6
            • _wcstok.LIBCMT ref: 004438F8
            • _wcslen.LIBCMT ref: 0044390C
            • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
            • _wcstok.LIBCMT ref: 00443931
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
            • String ID:
            • API String ID: 3632110297-0
            • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
            • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
            • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
            • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Destroy$DeleteMenuObject$IconWindow
            • String ID:
            • API String ID: 752480666-0
            • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
            • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
            • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
            • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Destroy$DeleteObjectWindow$IconImageList_
            • String ID:
            • API String ID: 3275902921-0
            • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
            • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
            • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
            • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Destroy$DeleteObjectWindow$IconImageList_
            • String ID:
            • API String ID: 3275902921-0
            • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
            • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
            • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
            • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
            APIs
            • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
            • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
            • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: PerformanceQuery$CounterSleep$Frequency
            • String ID:
            • API String ID: 2833360925-0
            • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
            • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
            • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
            • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
            APIs
            • SendMessageW.USER32 ref: 004555C7
            • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
            • DeleteObject.GDI32(?), ref: 00455736
            • DeleteObject.GDI32(?), ref: 00455744
            • DestroyIcon.USER32(?), ref: 00455752
            • DestroyWindow.USER32(?), ref: 00455760
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: DeleteDestroyMessageObjectSend$IconWindow
            • String ID:
            • API String ID: 3691411573-0
            • Opcode ID: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
            • Instruction ID: 7bbaf3a525edecc9c7f674a1bc178dbce74773f27e06def1294b58b6a87c9b54
            • Opcode Fuzzy Hash: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
            • Instruction Fuzzy Hash: 3D116071204601DBC710DF69EDC8A2A77A8FB58322F10466AFD10DB292D779D849CB68
            APIs
              • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
              • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
              • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
            • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
            • LineTo.GDI32(?,?,?), ref: 004472AC
            • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
            • LineTo.GDI32(?,?,?), ref: 004472C6
            • EndPath.GDI32(?), ref: 004472D6
            • StrokePath.GDI32(?), ref: 004472E4
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
            • String ID:
            • API String ID: 372113273-0
            • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
            • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
            • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
            • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
            APIs
            • GetDC.USER32(00000000), ref: 0044CC6D
            • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
            • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
            • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
            • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CapsDevice$Release
            • String ID:
            • API String ID: 1035833867-0
            • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
            • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
            • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
            • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
            APIs
            • __getptd.LIBCMT ref: 0041708E
              • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
              • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
            • __amsg_exit.LIBCMT ref: 004170AE
            • __lock.LIBCMT ref: 004170BE
            • InterlockedDecrement.KERNEL32(?), ref: 004170DB
            • _free.LIBCMT ref: 004170EE
            • InterlockedIncrement.KERNEL32(00A52CE0), ref: 00417106
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
            • String ID:
            • API String ID: 3470314060-0
            • Opcode ID: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
            • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
            • Opcode Fuzzy Hash: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
            • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
            APIs
            • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
            • EnterCriticalSection.KERNEL32(?), ref: 0044B666
            • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
            • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
              • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
            • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
            • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
            • String ID:
            • API String ID: 3495660284-0
            • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
            • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
            • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
            • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
            APIs
            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
            • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
            • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Virtual
            • String ID:
            • API String ID: 4278518827-0
            • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
            • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
            • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
            • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
            APIs
            • ___set_flsgetvalue.LIBCMT ref: 004151C0
              • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
              • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
            • ___fls_getvalue@4.LIBCMT ref: 004151CB
              • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
            • ___fls_setvalue@8.LIBCMT ref: 004151DD
            • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
            • ExitThread.KERNEL32 ref: 004151ED
            • __freefls@4.LIBCMT ref: 00415209
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
            • String ID:
            • API String ID: 442100245-0
            • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
            • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
            • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
            • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
            APIs
              • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
              • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
            • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
            • _wcslen.LIBCMT ref: 0045F94A
            • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
            • String ID: 0
            • API String ID: 621800784-4108050209
            • Opcode ID: a44a9b3346c6bb8aee0ad9873ab8e4bb0a101d6bd4856354047c9bdc96e9273a
            • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
            • Opcode Fuzzy Hash: a44a9b3346c6bb8aee0ad9873ab8e4bb0a101d6bd4856354047c9bdc96e9273a
            • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
            APIs
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • SetErrorMode.KERNEL32 ref: 004781CE
            • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
              • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
            • SetErrorMode.KERNEL32(?), ref: 00478270
            • SetErrorMode.KERNEL32(?), ref: 00478340
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ErrorMode$AttributesFile_memmove_wcslen
            • String ID: \VH
            • API String ID: 3884216118-234962358
            • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
            • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
            • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
            • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
            APIs
            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
            • IsMenu.USER32(?), ref: 0044854D
            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
            • DrawMenuBar.USER32 ref: 004485AF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Menu$Item$DrawInfoInsert
            • String ID: 0
            • API String ID: 3076010158-4108050209
            • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
            • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
            • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
            • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
            APIs
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
            • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessageSend$_memmove_wcslen
            • String ID: ComboBox$ListBox
            • API String ID: 1589278365-1403004172
            • Opcode ID: 0014777097789b8f84f3fe106d7e17ae724925b3d4bce213ca40c56104f0711f
            • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
            • Opcode Fuzzy Hash: 0014777097789b8f84f3fe106d7e17ae724925b3d4bce213ca40c56104f0711f
            • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Handle
            • String ID: nul
            • API String ID: 2519475695-2873401336
            • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
            • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
            • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
            • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
            APIs
            • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Handle
            • String ID: nul
            • API String ID: 2519475695-2873401336
            • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
            • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
            • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
            • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID:
            • String ID: SysAnimate32
            • API String ID: 0-1011021900
            • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
            • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
            • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
            • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
            APIs
              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
              • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
              • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
              • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
              • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
            • GetFocus.USER32 ref: 0046157B
              • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
              • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
            • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
            • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
            • __swprintf.LIBCMT ref: 00461608
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
            • String ID: %s%d
            • API String ID: 2645982514-1110647743
            • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
            • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
            • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
            • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
            • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
            • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
            • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
            APIs
            • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
            • CloseHandle.KERNEL32(00000000), ref: 00475A4D
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Process$CloseCountersCurrentHandleOpen
            • String ID:
            • API String ID: 3488606520-0
            • Opcode ID: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
            • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
            • Opcode Fuzzy Hash: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
            • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
            APIs
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ConnectRegistry_memmove_wcslen
            • String ID:
            • API String ID: 15295421-0
            • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
            • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
            • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
            • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
            APIs
            • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
            • GetProcAddress.KERNEL32(?,?), ref: 004648F7
            • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
            • GetProcAddress.KERNEL32(?,?), ref: 0046495A
            • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: AddressProc$Library$FreeLoad
            • String ID:
            • API String ID: 2449869053-0
            • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
            • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
            • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
            • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
            APIs
            • GetCursorPos.USER32(?), ref: 004563A6
            • ScreenToClient.USER32(?,?), ref: 004563C3
            • GetAsyncKeyState.USER32(?), ref: 00456400
            • GetAsyncKeyState.USER32(?), ref: 00456410
            • GetWindowLongW.USER32(?,000000F0), ref: 00456466
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: AsyncState$ClientCursorLongScreenWindow
            • String ID:
            • API String ID: 3539004672-0
            • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
            • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
            • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
            • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
            APIs
            • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
            • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
            • Sleep.KERNEL32(0000000A), ref: 0047D455
            • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
            • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Interlocked$DecrementIncrement$Sleep
            • String ID:
            • API String ID: 327565842-0
            • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
            • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
            • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
            • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
            APIs
            • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
            • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
            • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
            • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: PrivateProfile$SectionWrite$String
            • String ID:
            • API String ID: 2832842796-0
            • Opcode ID: 30ee6bb99ff74686aae1268d80be9655946e1dc94406621de855fc36ffcf476c
            • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
            • Opcode Fuzzy Hash: 30ee6bb99ff74686aae1268d80be9655946e1dc94406621de855fc36ffcf476c
            • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
            APIs
            • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
            • RegCloseKey.ADVAPI32(?), ref: 00441CFE
            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
            • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Enum$CloseDeleteOpen
            • String ID:
            • API String ID: 2095303065-0
            • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
            • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
            • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
            • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
            APIs
            • GetWindowRect.USER32(?,?), ref: 00436A24
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: RectWindow
            • String ID:
            • API String ID: 861336768-0
            • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
            • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
            • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
            • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
            APIs
            • SendMessageW.USER32 ref: 00449598
              • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
            • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
            • _wcslen.LIBCMT ref: 0044960D
            • _wcslen.LIBCMT ref: 0044961A
            • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessageSend$_wcslen$_wcspbrk
            • String ID:
            • API String ID: 1856069659-0
            • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
            • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
            • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
            • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
            APIs
            • GetCursorPos.USER32(?), ref: 004478E2
            • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
            • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
            • GetCursorPos.USER32(00000000), ref: 0044796A
            • TrackPopupMenuEx.USER32(00A563D0,00000000,00000000,?,?,00000000), ref: 00447991
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CursorMenuPopupTrack$Proc
            • String ID:
            • API String ID: 1300944170-0
            • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
            • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
            • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
            • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
            APIs
            • GetClientRect.USER32(?,?), ref: 004479CC
            • GetCursorPos.USER32(?), ref: 004479D7
            • ScreenToClient.USER32(?,?), ref: 004479F3
            • WindowFromPoint.USER32(?,?), ref: 00447A34
            • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Client$CursorFromPointProcRectScreenWindow
            • String ID:
            • API String ID: 1822080540-0
            • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
            • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
            • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
            • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
            APIs
            • GetWindowRect.USER32(?,?), ref: 00447C5D
            • ScreenToClient.USER32(?,?), ref: 00447C7B
            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
            • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
            • EndPaint.USER32(?,?), ref: 00447D13
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ClientPaintRectRectangleScreenViewportWindow
            • String ID:
            • API String ID: 659298297-0
            • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
            • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
            • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
            • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
            APIs
            • EnableWindow.USER32(?,00000000), ref: 00448B5C
            • EnableWindow.USER32(?,00000001), ref: 00448B72
            • ShowWindow.USER32(?,00000000), ref: 00448BE8
            • ShowWindow.USER32(?,00000004), ref: 00448BF4
            • EnableWindow.USER32(?,00000001), ref: 00448C09
              • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
              • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
              • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
              • Part of subcall function 00440D98: SendMessageW.USER32(00A51AF0,000000F1,00000000,00000000), ref: 00440E6E
              • Part of subcall function 00440D98: SendMessageW.USER32(00A51AF0,000000F1,00000001,00000000), ref: 00440E9A
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Window$EnableMessageSend$LongShow
            • String ID:
            • API String ID: 142311417-0
            • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
            • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
            • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
            • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
            • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
            • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
            • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
            APIs
            • IsWindowVisible.USER32(?), ref: 00445879
            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
            • _wcslen.LIBCMT ref: 004458FB
            • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
            • String ID:
            • API String ID: 3087257052-0
            • Opcode ID: f26ab1effd119969bc5c598581689495e0ac117966367203f6a60304a78e27fd
            • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
            • Opcode Fuzzy Hash: f26ab1effd119969bc5c598581689495e0ac117966367203f6a60304a78e27fd
            • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
            APIs
              • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
            • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 004653FE
            • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
            • connect.WSOCK32(00000000,?,00000010), ref: 00465446
            • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
            • closesocket.WSOCK32(00000000,00000000), ref: 00465481
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ErrorLast$closesocketconnectinet_addrsocket
            • String ID:
            • API String ID: 245547762-0
            • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
            • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
            • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
            • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
            APIs
            • DeleteObject.GDI32(00000000), ref: 004471D8
            • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
            • SelectObject.GDI32(?,00000000), ref: 00447228
            • BeginPath.GDI32(?), ref: 0044723D
            • SelectObject.GDI32(?,00000000), ref: 00447266
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Object$Select$BeginCreateDeletePath
            • String ID:
            • API String ID: 2338827641-0
            • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
            • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
            • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
            • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
            APIs
            • Sleep.KERNEL32(00000000), ref: 00434598
            • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
            • Sleep.KERNEL32(00000000), ref: 004345D4
            • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CounterPerformanceQuerySleep
            • String ID:
            • API String ID: 2875609808-0
            • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
            • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
            • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
            • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
            APIs
            • GetDlgItem.USER32(?,000003E9), ref: 00460C17
            • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
            • MessageBeep.USER32(00000000), ref: 00460C46
            • KillTimer.USER32(?,0000040A), ref: 00460C68
            • EndDialog.USER32(?,00000001), ref: 00460C83
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: BeepDialogItemKillMessageTextTimerWindow
            • String ID:
            • API String ID: 3741023627-0
            • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
            • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
            • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
            • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Destroy$DeleteObjectWindow$Icon
            • String ID:
            • API String ID: 4023252218-0
            • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
            • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
            • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
            • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
            APIs
            • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
            • DeleteObject.GDI32(?), ref: 00455736
            • DeleteObject.GDI32(?), ref: 00455744
            • DestroyIcon.USER32(?), ref: 00455752
            • DestroyWindow.USER32(?), ref: 00455760
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: DeleteDestroyObject$IconMessageSendWindow
            • String ID:
            • API String ID: 1489400265-0
            • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
            • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
            • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
            • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
            APIs
              • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
            • DestroyWindow.USER32(?), ref: 00455728
            • DeleteObject.GDI32(?), ref: 00455736
            • DeleteObject.GDI32(?), ref: 00455744
            • DestroyIcon.USER32(?), ref: 00455752
            • DestroyWindow.USER32(?), ref: 00455760
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
            • String ID:
            • API String ID: 1042038666-0
            • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
            • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
            • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
            • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Path$ObjectStroke$DeleteFillSelect
            • String ID:
            • API String ID: 2625713937-0
            • Opcode ID: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
            • Instruction ID: 382768f54733291aaafbd4c53fc5fd67df7ff3e11fccf1fbf51b229105ba29ed
            • Opcode Fuzzy Hash: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
            • Instruction Fuzzy Hash: B3F036751125109BD3519F28FD4875E3B68E747321F94423AEA15923F0CB785449CB6D
            APIs
            • __getptd.LIBCMT ref: 0041780F
              • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
              • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
            • __getptd.LIBCMT ref: 00417826
            • __amsg_exit.LIBCMT ref: 00417834
            • __lock.LIBCMT ref: 00417844
            • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
            • String ID:
            • API String ID: 938513278-0
            • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
            • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
            • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
            • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
            APIs
              • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
            • ___set_flsgetvalue.LIBCMT ref: 00413D20
              • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
              • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
            • ___fls_getvalue@4.LIBCMT ref: 00413D2B
              • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
            • ___fls_setvalue@8.LIBCMT ref: 00413D3E
            • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
            • ExitThread.KERNEL32 ref: 00413D4E
            • GetCurrentThreadId.KERNEL32 ref: 00413D54
            • __freefls@4.LIBCMT ref: 00413D74
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
            • String ID:
            • API String ID: 2403457894-0
            • Opcode ID: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
            • Instruction ID: 99982f4671f9afe760f134679f3a1374bf557b67af872bc9692f731b59fefeca
            • Opcode Fuzzy Hash: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
            • Instruction Fuzzy Hash: 1AE04F318443056B8F013BB39C1E8CF363C9E0434AB20082ABE1493112DA2C99C1C6BE
            APIs
              • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
            • ___set_flsgetvalue.LIBCMT ref: 004151C0
              • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
              • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
            • ___fls_getvalue@4.LIBCMT ref: 004151CB
              • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
            • ___fls_setvalue@8.LIBCMT ref: 004151DD
            • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
            • ExitThread.KERNEL32 ref: 004151ED
            • __freefls@4.LIBCMT ref: 00415209
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
            • String ID:
            • API String ID: 4247068974-0
            • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
            • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
            • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
            • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID:
            • String ID: 5$8$^
            • API String ID: 0-3622883839
            • Opcode ID: 5b0bf54134f80cff9ca6ce4a8dff4b23300e7e002ba4f74be1d0103a91d53083
            • Instruction ID: 6ee989b57c56cc683e8081b45a60e8d88641feefa2b309a8211b066407c3f2e5
            • Opcode Fuzzy Hash: 5b0bf54134f80cff9ca6ce4a8dff4b23300e7e002ba4f74be1d0103a91d53083
            • Instruction Fuzzy Hash: 82F1B4B1D00649AACB24CFA9C940AEEFBF4EF84300F14856FE455E7351E3B89A45CB56
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID:
            • String ID: )$U$\
            • API String ID: 0-3705770531
            • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
            • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
            • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
            • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
            APIs
              • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
            • CoInitialize.OLE32(00000000), ref: 0046E505
            • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
            • CoUninitialize.OLE32 ref: 0046E53D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CreateInitializeInstanceUninitialize_wcslen
            • String ID: .lnk
            • API String ID: 886957087-24824748
            • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
            • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
            • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
            • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
            Strings
            • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
            • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
            • API String ID: 708495834-557222456
            • Opcode ID: ad57006ec1c627c896323e780c1188bc9069f79cba7bd3d755793e69e2ee2a80
            • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
            • Opcode Fuzzy Hash: ad57006ec1c627c896323e780c1188bc9069f79cba7bd3d755793e69e2ee2a80
            • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
            APIs
              • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
            • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
              • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
              • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
              • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
              • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
            • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
            • String ID: @
            • API String ID: 4150878124-2766056989
            • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
            • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
            • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
            • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _memmove
            • String ID: \$]$h
            • API String ID: 4104443479-3262404753
            • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
            • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
            • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
            • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
            APIs
            • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
              • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
              • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
            • CloseHandle.KERNEL32(?), ref: 00457E09
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CloseExecuteHandleShell_wcscpy_wcslen
            • String ID: <$@
            • API String ID: 2417854910-1426351568
            • Opcode ID: 024707e8d0be736fd9aee974053134abdf34597ecb22147b7e98c4ffc578353a
            • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
            • Opcode Fuzzy Hash: 024707e8d0be736fd9aee974053134abdf34597ecb22147b7e98c4ffc578353a
            • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
            APIs
            • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
              • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
            • String ID:
            • API String ID: 3705125965-3916222277
            • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
            • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
            • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
            • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
            APIs
            • GetMenuItemInfoW.USER32 ref: 0045FAC4
            • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
            • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Menu$Delete$InfoItem
            • String ID: 0
            • API String ID: 135850232-4108050209
            • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
            • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
            • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
            • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
            APIs
            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
            • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Window$Long
            • String ID: SysTreeView32
            • API String ID: 847901565-1698111956
            • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
            • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
            • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
            • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
            APIs
            • LoadLibraryA.KERNEL32(?), ref: 00434B10
            • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
            • FreeLibrary.KERNEL32(?), ref: 00434B9F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Library$AddressFreeLoadProc
            • String ID: AU3_GetPluginDetails
            • API String ID: 145871493-4132174516
            • Opcode ID: 159cfda42166365942fc35f4e8310eed724addc4652cab969a8521ebf27062eb
            • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
            • Opcode Fuzzy Hash: 159cfda42166365942fc35f4e8310eed724addc4652cab969a8521ebf27062eb
            • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
            APIs
            • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessageSend$Window
            • String ID: SysMonthCal32
            • API String ID: 2326795674-1439706946
            • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
            • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
            • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
            • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
            APIs
            • DestroyWindow.USER32(00000000), ref: 00450A2F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: DestroyWindow
            • String ID: msctls_updown32
            • API String ID: 3375834691-2298589950
            • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
            • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
            • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
            • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _memmove
            • String ID: $<
            • API String ID: 4104443479-428540627
            • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
            • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
            • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
            • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ErrorMode$DiskFreeSpace
            • String ID: \VH
            • API String ID: 1682464887-234962358
            • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
            • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
            • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
            • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ErrorMode$DiskFreeSpace
            • String ID: \VH
            • API String ID: 1682464887-234962358
            • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
            • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
            • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
            • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ErrorMode$DiskFreeSpace
            • String ID: \VH
            • API String ID: 1682464887-234962358
            • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
            • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
            • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
            • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
            • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ErrorMode$InformationVolume
            • String ID: \VH
            • API String ID: 2507767853-234962358
            • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
            • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
            • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
            • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
            • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ErrorMode$InformationVolume
            • String ID: \VH
            • API String ID: 2507767853-234962358
            • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
            • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
            • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
            • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
            APIs
            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
            • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: msctls_trackbar32
            • API String ID: 3850602802-1010561917
            • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
            • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
            • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
            • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
            APIs
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • CLSIDFromString.OLE32(?,00000000), ref: 00435236
            • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
            • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
            • String ID: crts
            • API String ID: 943502515-3724388283
            • Opcode ID: 6bd881ada2ae8ff0a5326c51e5497572252972d1a55ad2f97464bff4f718433f
            • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
            • Opcode Fuzzy Hash: 6bd881ada2ae8ff0a5326c51e5497572252972d1a55ad2f97464bff4f718433f
            • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
            APIs
              • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
            • CoInitialize.OLE32(00000000), ref: 0046E505
            • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
            • CoUninitialize.OLE32 ref: 0046E53D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CreateInitializeInstanceUninitialize_wcslen
            • String ID: .lnk
            • API String ID: 886957087-24824748
            • Opcode ID: ca4e97b0deac3c583c427a3e57c18447ee07ba297a7231e98f3a70961bae8bd6
            • Instruction ID: 8523b4f55483354ee3aaa8e7e2ee5f8b04597d59409be9d2747526508be4cfd1
            • Opcode Fuzzy Hash: ca4e97b0deac3c583c427a3e57c18447ee07ba297a7231e98f3a70961bae8bd6
            • Instruction Fuzzy Hash: E72183312082009FD700EF55C985F4AB7F4AF88729F14866EF9589B2E1D7B4E804CB56
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
            • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
            • SetErrorMode.KERNEL32(?), ref: 0045D35C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ErrorMode$LabelVolume
            • String ID: \VH
            • API String ID: 2006950084-234962358
            • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
            • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
            • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
            • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
            APIs
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • GetMenuItemInfoW.USER32 ref: 00449727
            • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
            • DrawMenuBar.USER32 ref: 00449761
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Menu$InfoItem$Draw_malloc
            • String ID: 0
            • API String ID: 772068139-4108050209
            • Opcode ID: c51535a36009e0b84663db87369d5282580437b440f7bb88edfbca7c2865f555
            • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
            • Opcode Fuzzy Hash: c51535a36009e0b84663db87369d5282580437b440f7bb88edfbca7c2865f555
            • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _wcslen$_wcscpy
            • String ID: 3, 3, 8, 1
            • API String ID: 3469035223-357260408
            • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
            • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
            • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
            • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
            APIs
            • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
            • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: ICMP.DLL$IcmpCloseHandle
            • API String ID: 2574300362-3530519716
            • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
            • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
            • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
            • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
            APIs
            • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
            • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: ICMP.DLL$IcmpCreateFile
            • API String ID: 2574300362-275556492
            • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
            • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
            • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
            • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
            APIs
            • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
            • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: ICMP.DLL$IcmpSendEcho
            • API String ID: 2574300362-58917771
            • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
            • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
            • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
            • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
            APIs
            • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: RegDeleteKeyExW$advapi32.dll
            • API String ID: 2574300362-4033151799
            • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
            • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
            • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
            • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00430DD3
            • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00430DE5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: GetSystemWow64DirectoryW$kernel32.dll
            • API String ID: 2574300362-1816364905
            • Opcode ID: 14bf9b0efbe06d93ad9dae09c2ad7cadeb51a6503e8f45336d859f06d84a08d6
            • Instruction ID: 24515a708fc6b3a38513646dac5635f6d90a943ae1c03eade4216686bbe3791e
            • Opcode Fuzzy Hash: 14bf9b0efbe06d93ad9dae09c2ad7cadeb51a6503e8f45336d859f06d84a08d6
            • Instruction Fuzzy Hash: 51E0127154070A9BD7105FA5E91878A77D8DB14751F10882AFD45E2650D7B8E480C7BC
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
            • Instruction ID: c5df29d3d24fc858ebdc5227190e2e918b6fbc7f8fe9fd347d916346834f6d96
            • Opcode Fuzzy Hash: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
            • Instruction Fuzzy Hash: 66E17F75600209AFCB04DF98C880EAEB7B9FF88714F10859AE909DB351D775EE45CBA0
            APIs
            • VariantInit.OLEAUT32(?), ref: 0047950F
            • SysAllocString.OLEAUT32(00000000), ref: 004795D8
            • VariantCopy.OLEAUT32(?,?), ref: 0047960F
            • VariantClear.OLEAUT32(?), ref: 00479650
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Variant$AllocClearCopyInitString
            • String ID:
            • API String ID: 2808897238-0
            • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
            • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
            • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
            • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
            APIs
            • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
            • __itow.LIBCMT ref: 004699CD
              • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
            • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
            • __itow.LIBCMT ref: 00469A97
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessageSend$__itow
            • String ID:
            • API String ID: 3379773720-0
            • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
            • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
            • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
            • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
            APIs
            • GetWindowRect.USER32(?,?), ref: 00449A4A
            • ScreenToClient.USER32(?,?), ref: 00449A80
            • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Window$ClientMoveRectScreen
            • String ID:
            • API String ID: 3880355969-0
            • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
            • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
            • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
            • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: __flsbuf__flush__getptd_noexit__write_memmove
            • String ID:
            • API String ID: 2782032738-0
            • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
            • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
            • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
            • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
            APIs
            • ClientToScreen.USER32(00000000,?), ref: 0044169A
            • GetWindowRect.USER32(?,?), ref: 00441722
            • PtInRect.USER32(?,?,?), ref: 00441734
            • MessageBeep.USER32(00000000), ref: 004417AD
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Rect$BeepClientMessageScreenWindow
            • String ID:
            • API String ID: 1352109105-0
            • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
            • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
            • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
            • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
            APIs
            • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
            • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
            • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
            • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CreateHardLink$DeleteErrorFileLast
            • String ID:
            • API String ID: 3321077145-0
            • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
            • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
            • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
            • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
            APIs
            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
            • __isleadbyte_l.LIBCMT ref: 004208A6
            • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
            • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
            • String ID:
            • API String ID: 3058430110-0
            • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
            • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
            • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
            • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
            APIs
            • GetParent.USER32(?), ref: 004503C8
            • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
            • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
            • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Proc$Parent
            • String ID:
            • API String ID: 2351499541-0
            • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
            • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
            • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
            • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
            APIs
            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
            • TranslateMessage.USER32(?), ref: 00442B01
            • DispatchMessageW.USER32(?), ref: 00442B0B
            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Message$Peek$DispatchTranslate
            • String ID:
            • API String ID: 1795658109-0
            • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
            • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
            • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
            • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
            APIs
            • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
              • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
              • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
              • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
            • GetCaretPos.USER32(?), ref: 004743B2
            • ClientToScreen.USER32(00000000,?), ref: 004743E8
            • GetForegroundWindow.USER32 ref: 004743EE
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
            • String ID:
            • API String ID: 2759813231-0
            • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
            • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
            • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
            • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
            APIs
              • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
            • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
            • _wcslen.LIBCMT ref: 00449519
            • _wcslen.LIBCMT ref: 00449526
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessageSend_wcslen$_wcspbrk
            • String ID:
            • API String ID: 2886238975-0
            • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
            • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
            • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
            • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: __setmode$DebugOutputString_fprintf
            • String ID:
            • API String ID: 1792727568-0
            • Opcode ID: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
            • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
            • Opcode Fuzzy Hash: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
            • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
            APIs
              • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
            • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
            • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Window$Long$AttributesLayered
            • String ID:
            • API String ID: 2169480361-0
            • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
            • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
            • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
            • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
            APIs
              • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
              • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
              • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
            • lstrlenW.KERNEL32(?), ref: 00434CF6
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
            • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: lstrcmpilstrcpylstrlen$_malloc
            • String ID: cdecl
            • API String ID: 3850814276-3896280584
            • Opcode ID: 5248fcd12fa573e8471e03ef3ffe1589e610c1ecd3e4c73a3bae80ffd9d943a4
            • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
            • Opcode Fuzzy Hash: 5248fcd12fa573e8471e03ef3ffe1589e610c1ecd3e4c73a3bae80ffd9d943a4
            • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
            APIs
              • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
            • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046D42D
            • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
            • _memmove.LIBCMT ref: 0046D475
            • inet_ntoa.WSOCK32(?), ref: 0046D481
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
            • String ID:
            • API String ID: 2502553879-0
            • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
            • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
            • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
            • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
            APIs
            • SendMessageW.USER32 ref: 00448C69
            • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
            • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
            • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessageSend$LongWindow
            • String ID:
            • API String ID: 312131281-0
            • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
            • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
            • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
            • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
            APIs
            • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
            • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
            • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
            • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ErrorLastacceptselect
            • String ID:
            • API String ID: 385091864-0
            • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
            • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
            • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
            • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
            APIs
            • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessageSend
            • String ID:
            • API String ID: 3850602802-0
            • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
            • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
            • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
            • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
            APIs
            • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
            • GetStockObject.GDI32(00000011), ref: 00430258
            • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
            • ShowWindow.USER32(00000000,00000000), ref: 0043027D
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Window$CreateMessageObjectSendShowStock
            • String ID:
            • API String ID: 1358664141-0
            • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
            • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
            • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
            • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
            APIs
            • GetCurrentThreadId.KERNEL32 ref: 00443CA6
            • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
            • CloseHandle.KERNEL32(00000000), ref: 00443CF9
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
            • String ID:
            • API String ID: 2880819207-0
            • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
            • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
            • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
            • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
            APIs
            • GetWindowRect.USER32(?,?), ref: 00430BA2
            • ScreenToClient.USER32(?,?), ref: 00430BC1
            • ScreenToClient.USER32(?,?), ref: 00430BE2
            • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ClientRectScreen$InvalidateWindow
            • String ID:
            • API String ID: 357397906-0
            • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
            • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
            • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
            • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
            APIs
            • __wsplitpath.LIBCMT ref: 0043392E
              • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
            • __wsplitpath.LIBCMT ref: 00433950
            • __wcsicoll.LIBCMT ref: 00433974
            • __wcsicoll.LIBCMT ref: 0043398A
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
            • String ID:
            • API String ID: 1187119602-0
            • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
            • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
            • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
            • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _wcslen$_malloc_wcscat_wcscpy
            • String ID:
            • API String ID: 1597257046-0
            • Opcode ID: ffb306b0524748cf2939c1f0cf37236c46535da1521513c3132486090f10cb1b
            • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
            • Opcode Fuzzy Hash: ffb306b0524748cf2939c1f0cf37236c46535da1521513c3132486090f10cb1b
            • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
            APIs
            • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
            • __malloc_crt.LIBCMT ref: 0041F5B6
            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: EnvironmentStrings$Free__malloc_crt
            • String ID:
            • API String ID: 237123855-0
            • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
            • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
            • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
            • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: DeleteDestroyObject$IconWindow
            • String ID:
            • API String ID: 3349847261-0
            • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
            • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
            • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
            • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
            APIs
            • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
            • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
            • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
            • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CriticalSection$Leave$EnterExchangeInterlocked
            • String ID:
            • API String ID: 2223660684-0
            • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
            • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
            • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
            • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
            APIs
              • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
              • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
              • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
            • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
            • LineTo.GDI32(?,?,?), ref: 00447326
            • EndPath.GDI32(?), ref: 00447336
            • StrokePath.GDI32(?), ref: 00447344
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
            • String ID:
            • API String ID: 2783949968-0
            • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
            • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
            • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
            • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
            APIs
            • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
            • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
            • GetCurrentThreadId.KERNEL32 ref: 004364A3
            • AttachThreadInput.USER32(00000000), ref: 004364AA
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
            • String ID:
            • API String ID: 2710830443-0
            • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
            • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
            • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
            • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
            APIs
            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
            • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
            • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
            • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
              • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
              • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
            • String ID:
            • API String ID: 146765662-0
            • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
            • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
            • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
            • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
            APIs
            • GetDesktopWindow.USER32 ref: 00472B63
            • GetDC.USER32(00000000), ref: 00472B6C
            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
            • ReleaseDC.USER32(00000000,?), ref: 00472B99
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CapsDesktopDeviceReleaseWindow
            • String ID:
            • API String ID: 2889604237-0
            • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
            • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
            • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
            • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
            APIs
            • GetDesktopWindow.USER32 ref: 00472BB2
            • GetDC.USER32(00000000), ref: 00472BBB
            • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
            • ReleaseDC.USER32(00000000,?), ref: 00472BE8
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CapsDesktopDeviceReleaseWindow
            • String ID:
            • API String ID: 2889604237-0
            • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
            • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
            • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
            • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
            APIs
            • __getptd_noexit.LIBCMT ref: 00415150
              • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
              • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
              • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
              • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
              • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
            • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
            • __freeptd.LIBCMT ref: 0041516B
            • ExitThread.KERNEL32 ref: 00415173
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
            • String ID:
            • API String ID: 1454798553-0
            • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
            • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
            • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
            • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _strncmp
            • String ID: Q\E
            • API String ID: 909875538-2189900498
            • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
            • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
            • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
            • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
            APIs
            • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
              • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
              • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
              • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
            • String ID: AutoIt3GUI$Container
            • API String ID: 2652923123-3941886329
            • Opcode ID: 8072d5a6eeba690fa35a4ade7926f5ea60e583888e5bb087a82b37f5ec0490ad
            • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
            • Opcode Fuzzy Hash: 8072d5a6eeba690fa35a4ade7926f5ea60e583888e5bb087a82b37f5ec0490ad
            • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _memmove_strncmp
            • String ID: U$\
            • API String ID: 2666721431-100911408
            • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
            • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
            • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
            • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
            APIs
              • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
              • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
            • __wcsnicmp.LIBCMT ref: 00467288
            • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Connection__wcsnicmp_wcscpy_wcslen
            • String ID: LPT
            • API String ID: 3035604524-1350329615
            • Opcode ID: d6ee32a1e65a10be59cd2aee46927f2afb98f966929ec107a83db754813dcd00
            • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
            • Opcode Fuzzy Hash: d6ee32a1e65a10be59cd2aee46927f2afb98f966929ec107a83db754813dcd00
            • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _memmove
            • String ID: \$h
            • API String ID: 4104443479-677774858
            • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
            • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
            • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
            • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _memcmp
            • String ID: &
            • API String ID: 2931989736-1010288
            • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
            • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
            • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
            • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _memmove
            • String ID: \
            • API String ID: 4104443479-2967466578
            • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
            • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
            • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
            • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
            APIs
            • _wcslen.LIBCMT ref: 00466825
            • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CrackInternet_wcslen
            • String ID: |
            • API String ID: 596671847-2343686810
            • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
            • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
            • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
            • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
            APIs
            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: '
            • API String ID: 3850602802-1997036262
            • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
            • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
            • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
            • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
            APIs
            • _strlen.LIBCMT ref: 0040F858
              • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
              • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
            • _sprintf.LIBCMT ref: 0040F9AE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _memmove$_sprintf_strlen
            • String ID: %02X
            • API String ID: 1921645428-436463671
            • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
            • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
            • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
            • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
            APIs
            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: Combobox
            • API String ID: 3850602802-2096851135
            • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
            • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
            • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
            • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
            APIs
            • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: LengthMessageSendTextWindow
            • String ID: edit
            • API String ID: 2978978980-2167791130
            • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
            • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
            • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
            • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
            APIs
            • Sleep.KERNEL32(00000000), ref: 00476CB0
            • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: GlobalMemorySleepStatus
            • String ID: @
            • API String ID: 2783356886-2766056989
            • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
            • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
            • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
            • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: htonsinet_addr
            • String ID: 255.255.255.255
            • API String ID: 3832099526-2422070025
            • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
            • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
            • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
            • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
            APIs
            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: InternetOpen
            • String ID: <local>
            • API String ID: 2038078732-4266983199
            • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
            • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
            • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
            • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: __fread_nolock_memmove
            • String ID: EA06
            • API String ID: 1988441806-3962188686
            • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
            • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
            • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
            • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: _memmove
            • String ID: u,D
            • API String ID: 4104443479-3858472334
            • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
            • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
            • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
            • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
            APIs
            • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • wsprintfW.USER32 ref: 0045612A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: MessageSend_mallocwsprintf
            • String ID: %d/%02d/%02d
            • API String ID: 1262938277-328681919
            • Opcode ID: 7568e53d503701dc6c53574dfbed37be0c9226c9331a2ec32bea4e30f7db6fe8
            • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
            • Opcode Fuzzy Hash: 7568e53d503701dc6c53574dfbed37be0c9226c9331a2ec32bea4e30f7db6fe8
            • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
            APIs
            • InternetCloseHandle.WININET(?), ref: 00442663
            • InternetCloseHandle.WININET ref: 00442668
              • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: CloseHandleInternet$ObjectSingleWait
            • String ID: aeB
            • API String ID: 857135153-906807131
            • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
            • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
            • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
            • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
            APIs
            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
            • PostMessageW.USER32(00000000), ref: 00441C05
              • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: FindMessagePostSleepWindow
            • String ID: Shell_TrayWnd
            • API String ID: 529655941-2988720461
            • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
            • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
            • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
            • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
            APIs
            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
            • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
              • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: FindMessagePostSleepWindow
            • String ID: Shell_TrayWnd
            • API String ID: 529655941-2988720461
            • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
            • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
            • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
            • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
            APIs
            • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
              • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1716222633.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.1716200909.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716265556.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716291142.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716308529.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716324381.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1716356813.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_gV3dy8Pfcp.jbxd
            Similarity
            • API ID: Message_doexit
            • String ID: AutoIt$Error allocating memory.
            • API String ID: 1993061046-4017498283
            • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
            • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
            • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
            • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D