Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Alvise Maria CV 1.exe

Overview

General Information

Sample name:Alvise Maria CV 1.exe
Analysis ID:1546657
MD5:3dc3bbec8d0de761f7992a0464409ba8
SHA1:073728a153af98b84ab24726b373bd994d9688e6
SHA256:9aa6870924984dad7897c2efa17305143d0e95aba5b8ecb387577361c7657d0c
Tags:exeuser-TeamDreier
Infos:

Detection

PureLog Stealer, Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected PureLog Stealer
Yara detected Snake Keylogger
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Alvise Maria CV 1.exe (PID: 4088 cmdline: "C:\Users\user\Desktop\Alvise Maria CV 1.exe" MD5: 3DC3BBEC8D0DE761F7992A0464409BA8)
    • RegSvcs.exe (PID: 5788 cmdline: "C:\Users\user\Desktop\Alvise Maria CV 1.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7814594885:AAHa3uCXluFI0wdWKPRtBnbO9yWlWuXuj84/sendMessage?chat_id=1178171552", "Token": "7814594885:AAHa3uCXluFI0wdWKPRtBnbO9yWlWuXuj84", "Chat_id": "1178171552", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2222638088.0000000000CA0000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0x700:$s3: 83 EC 38 53 B0 E1 88 44 24 2B 88 44 24 2F B0 DE 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1e9d0:$s5: delete[]
  • 0x1de88:$s6: constructor or from DllMain.
00000003.00000002.4496549990.0000000000400000.00000040.80000000.00040000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0x1300:$s3: 83 EC 38 53 B0 E1 88 44 24 2B 88 44 24 2F B0 DE 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1fdd0:$s5: delete[]
  • 0x1f288:$s6: constructor or from DllMain.
00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        Click to see the 30 entries
        SourceRuleDescriptionAuthorStrings
        3.2.RegSvcs.exe.400000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
        • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
        • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
        • 0x1300:$s3: 83 EC 38 53 B0 E1 88 44 24 2B 88 44 24 2F B0 DE 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
        • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
        • 0x1fdd0:$s5: delete[]
        • 0x1f288:$s6: constructor or from DllMain.
        3.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
        • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
        • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
        • 0x700:$s3: 83 EC 38 53 B0 E1 88 44 24 2B 88 44 24 2F B0 DE 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
        • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
        • 0x1e9d0:$s5: delete[]
        • 0x1de88:$s6: constructor or from DllMain.
        0.2.Alvise Maria CV 1.exe.ca0000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
        • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
        • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
        • 0x700:$s3: 83 EC 38 53 B0 E1 88 44 24 2B 88 44 24 2F B0 DE 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
        • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
        • 0x1e9d0:$s5: delete[]
        • 0x1de88:$s6: constructor or from DllMain.
        3.2.RegSvcs.exe.4316458.5.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          3.2.RegSvcs.exe.4316458.5.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            Click to see the 118 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-01T12:07:22.061482+010020229301A Network Trojan was detected52.149.20.212443192.168.2.549704TCP
            2024-11-01T12:08:00.748149+010020229301A Network Trojan was detected52.149.20.212443192.168.2.549937TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-01T12:07:24.528852+010028033053Unknown Traffic192.168.2.549729188.114.97.3443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-01T12:07:22.729741+010028032742Potentially Bad Traffic192.168.2.549715158.101.44.24280TCP
            2024-11-01T12:07:23.807862+010028032742Potentially Bad Traffic192.168.2.549715158.101.44.24280TCP
            2024-11-01T12:07:25.261083+010028032742Potentially Bad Traffic192.168.2.549735158.101.44.24280TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: Alvise Maria CV 1.exeAvira: detected
            Source: 00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7814594885:AAHa3uCXluFI0wdWKPRtBnbO9yWlWuXuj84/sendMessage?chat_id=1178171552", "Token": "7814594885:AAHa3uCXluFI0wdWKPRtBnbO9yWlWuXuj84", "Chat_id": "1178171552", "Version": "5.1"}
            Source: Alvise Maria CV 1.exeReversingLabs: Detection: 60%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: Alvise Maria CV 1.exeJoe Sandbox ML: detected

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Alvise Maria CV 1.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49722 version: TLS 1.0
            Source: Binary string: _.pdb source: RegSvcs.exe, 00000003.00000002.4498039618.0000000002FA4000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4500660567.0000000004311000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdbUGP source: Alvise Maria CV 1.exe, 00000000.00000003.2219820203.00000000039A0000.00000004.00001000.00020000.00000000.sdmp, Alvise Maria CV 1.exe, 00000000.00000003.2220517697.0000000003B40000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: Alvise Maria CV 1.exe, 00000000.00000003.2219820203.00000000039A0000.00000004.00001000.00020000.00000000.sdmp, Alvise Maria CV 1.exe, 00000000.00000003.2220517697.0000000003B40000.00000004.00001000.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DCC2A2 FindFirstFileExW,0_2_00DCC2A2
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E068EE FindFirstFileW,FindClose,0_2_00E068EE
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E0698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00E0698F
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DFD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00DFD076
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DFD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00DFD3A9
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E09642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E09642
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E0979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E0979D
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DFDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00DFDBBE
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E09B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00E09B2B
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E05C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00E05C97
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h3_2_0312E0F8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DB08EDh3_2_06DB04D0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DB02F1h3_2_06DB0040
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DBCD69h3_2_06DBCAC0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DBFD31h3_2_06DBFA88
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DBC911h3_2_06DBC668
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DBC4B9h3_2_06DBC210
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DBF8D9h3_2_06DBF630
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DBDA71h3_2_06DBD7C8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DBA651h3_2_06DBA3A8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DBD619h3_2_06DBD370
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DBD1C1h3_2_06DBCF18
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DBE779h3_2_06DBE4D0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DB08EDh3_2_06DB04C1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DBB359h3_2_06DBB0B0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DBAF01h3_2_06DBAC58
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DBE321h3_2_06DBE078
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DB08EDh3_2_06DB081B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DBAAA9h3_2_06DBA800
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DBDEC9h3_2_06DBDC20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DBF481h3_2_06DBF1D8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DBF029h3_2_06DBED80
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DBC061h3_2_06DBBDB8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DBBC09h3_2_06DBB960
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DBB7B1h3_2_06DBB508
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DBEBD1h3_2_06DBE928
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]3_2_06DCF3F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov ecx, dword ptr [ebp-38h]3_2_06DCB8C4
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DD77E5h3_2_06DD74A8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DD619Ah3_2_06DD5EF0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DD58C1h3_2_06DD5618
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DD6A49h3_2_06DD67A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DD4761h3_2_06DD44B8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]3_2_06DD256E
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DD5011h3_2_06DD4D68
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]3_2_06DD2258
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]3_2_06DD2257
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DD8322h3_2_06DD8278
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DD5D19h3_2_06DD5A70
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DD8322h3_2_06DD8270
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DD6EA1h3_2_06DD6BF8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DD65F1h3_2_06DD6348
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DD72F9h3_2_06DD7050
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DD42E1h3_2_06DD4038
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DD5469h3_2_06DD51C0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06DD4BB9h3_2_06DD4910

            Networking

            barindex
            Source: Yara matchFile source: 3.2.RegSvcs.exe.5870000.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.3160000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.2fe5e1e.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.2fe4f36.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4349590.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4315570.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4316458.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.3160ee8.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: global trafficHTTP traffic detected: GET /xml/173.254.250.82 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/173.254.250.82 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/173.254.250.82 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/173.254.250.82 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/173.254.250.82 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/173.254.250.82 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/173.254.250.82 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/173.254.250.82 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
            Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
            Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
            Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49715 -> 158.101.44.242:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49735 -> 158.101.44.242:80
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49729 -> 188.114.97.3:443
            Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.5:49704
            Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.5:49937
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49722 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E0CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_00E0CE44
            Source: global trafficHTTP traffic detected: GET /xml/173.254.250.82 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/173.254.250.82 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/173.254.250.82 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/173.254.250.82 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/173.254.250.82 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/173.254.250.82 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/173.254.250.82 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/173.254.250.82 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: RegSvcs.exe, 00000003.00000002.4498607513.000000000352A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.000000000343E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034E0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.0000000003539000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034D2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034EE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
            Source: RegSvcs.exe, 00000003.00000002.4498607513.000000000352A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.000000000343E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034E0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.0000000003481000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.0000000003539000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034D2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034EE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034FC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.000000000342C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: RegSvcs.exe, 00000003.00000002.4498607513.0000000003379000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: RegSvcs.exe, 00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498039618.0000000002FA4000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4500660567.0000000004311000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
            Source: RegSvcs.exe, 00000003.00000002.4498607513.000000000352A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034E0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.0000000003539000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034D2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034EE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.0000000003456000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
            Source: RegSvcs.exe, 00000003.00000002.4498607513.0000000003379000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: RegSvcs.exe, 00000003.00000002.4498607513.000000000352A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.000000000343E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034E0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.0000000003481000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.0000000003539000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034D2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034EE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: RegSvcs.exe, 00000003.00000002.4498607513.000000000343E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498039618.0000000002FA4000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4500660567.0000000004311000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: RegSvcs.exe, 00000003.00000002.4498607513.00000000034FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/173.254.250.82
            Source: RegSvcs.exe, 00000003.00000002.4498607513.000000000352A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034E0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.0000000003481000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.0000000003539000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034D2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034EE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/173.254.250.82$
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
            Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
            Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
            Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E0EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00E0EAFF
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E0ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00E0ED6A
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E0EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00E0EAFF
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DFAA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_00DFAA57
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E29576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00E29576

            System Summary

            barindex
            Source: 3.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 0.2.Alvise Maria CV 1.exe.ca0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 3.2.RegSvcs.exe.4316458.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 3.2.RegSvcs.exe.4316458.5.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 3.2.RegSvcs.exe.4316458.5.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 3.2.RegSvcs.exe.4316458.5.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 3.2.RegSvcs.exe.5870000.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 3.2.RegSvcs.exe.5870000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 3.2.RegSvcs.exe.5870000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 3.2.RegSvcs.exe.5870000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 3.2.RegSvcs.exe.3160000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 3.2.RegSvcs.exe.3160000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 3.2.RegSvcs.exe.3160000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 3.2.RegSvcs.exe.3160000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 3.2.RegSvcs.exe.5870000.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 3.2.RegSvcs.exe.5870000.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 3.2.RegSvcs.exe.5870000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 3.2.RegSvcs.exe.5870000.8.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 3.2.RegSvcs.exe.2fe5e1e.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 3.2.RegSvcs.exe.2fe5e1e.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 3.2.RegSvcs.exe.2fe5e1e.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 3.2.RegSvcs.exe.2fe5e1e.2.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 3.2.RegSvcs.exe.4316458.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 3.2.RegSvcs.exe.4316458.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 3.2.RegSvcs.exe.4316458.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 3.2.RegSvcs.exe.4316458.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 3.2.RegSvcs.exe.2fe5e1e.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 3.2.RegSvcs.exe.4315570.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 3.2.RegSvcs.exe.4315570.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 3.2.RegSvcs.exe.4315570.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 3.2.RegSvcs.exe.4315570.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 3.2.RegSvcs.exe.4315570.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 3.2.RegSvcs.exe.2fe5e1e.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 3.2.RegSvcs.exe.4349590.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 3.2.RegSvcs.exe.4349590.7.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 3.2.RegSvcs.exe.4349590.7.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 3.2.RegSvcs.exe.4349590.7.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 3.2.RegSvcs.exe.2fe4f36.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 3.2.RegSvcs.exe.2fe4f36.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 3.2.RegSvcs.exe.4315570.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 3.2.RegSvcs.exe.4315570.6.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 3.2.RegSvcs.exe.4315570.6.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 3.2.RegSvcs.exe.2fe5e1e.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 3.2.RegSvcs.exe.2fe5e1e.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 3.2.RegSvcs.exe.4349590.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 3.2.RegSvcs.exe.4349590.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 3.2.RegSvcs.exe.4349590.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 3.2.RegSvcs.exe.4349590.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 3.2.RegSvcs.exe.2fe4f36.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 3.2.RegSvcs.exe.2fe4f36.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 3.2.RegSvcs.exe.3160000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 3.2.RegSvcs.exe.3160000.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 3.2.RegSvcs.exe.3160000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 3.2.RegSvcs.exe.3160000.4.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 3.2.RegSvcs.exe.3160ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 3.2.RegSvcs.exe.3160ee8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 3.2.RegSvcs.exe.3160ee8.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 3.2.RegSvcs.exe.3160ee8.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 3.2.RegSvcs.exe.3160ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 3.2.RegSvcs.exe.2fe4f36.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 3.2.RegSvcs.exe.3160ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 3.2.RegSvcs.exe.3160ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 3.2.RegSvcs.exe.2fe4f36.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 3.2.RegSvcs.exe.3160ee8.3.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 3.2.RegSvcs.exe.2fe4f36.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 3.2.RegSvcs.exe.2fe4f36.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000000.00000002.2222638088.0000000000CA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 00000003.00000002.4496549990.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
            Source: 00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000003.00000002.4498039618.0000000002FA4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000003.00000002.4498039618.0000000002FA4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000003.00000002.4500660567.0000000004311000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000003.00000002.4500660567.0000000004311000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: RegSvcs.exe PID: 5788, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: RegSvcs.exe PID: 5788, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Alvise Maria CV 1.exeString found in binary or memory: This is a third-party compiled AutoIt script.
            Source: Alvise Maria CV 1.exe, 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_27ff512f-f
            Source: Alvise Maria CV 1.exe, 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_6961a5ce-f
            Source: Alvise Maria CV 1.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_c5f744da-2
            Source: Alvise Maria CV 1.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_66c5d1e9-c
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DFD5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_00DFD5EB
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DF1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00DF1201
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DFE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00DFE8F6
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00D9BF400_2_00D9BF40
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E020460_2_00E02046
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00D980600_2_00D98060
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DF82980_2_00DF8298
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DCE4FF0_2_00DCE4FF
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DC676B0_2_00DC676B
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E248730_2_00E24873
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00D9CAF00_2_00D9CAF0
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DBCAA00_2_00DBCAA0
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DACC390_2_00DACC39
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DC6DD90_2_00DC6DD9
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00D991C00_2_00D991C0
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DAB1190_2_00DAB119
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DB13940_2_00DB1394
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DB17060_2_00DB1706
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DB781B0_2_00DB781B
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DB19B00_2_00DB19B0
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DA997D0_2_00DA997D
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00D979200_2_00D97920
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DB7A4A0_2_00DB7A4A
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DB7CA70_2_00DB7CA7
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DB1C770_2_00DB1C77
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DC9EEE0_2_00DC9EEE
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E1BE440_2_00E1BE44
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DB1F320_2_00DB1F32
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_037036B80_2_037036B8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00408C603_2_00408C60
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0040DC113_2_0040DC11
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00407C3F3_2_00407C3F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00418CCC3_2_00418CCC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00406CA03_2_00406CA0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004028B03_2_004028B0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0041A4BE3_2_0041A4BE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004182443_2_00418244
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004016503_2_00401650
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00402F203_2_00402F20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004193C43_2_004193C4
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004187883_2_00418788
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00402F893_2_00402F89
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00402B903_2_00402B90
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004073A03_2_004073A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_031212B03_2_031212B0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_031212C03_2_031212C0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_031215503_2_03121550
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_031215603_2_03121560
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DB6A303_2_06DB6A30
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DB27303_2_06DB2730
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DB73203_2_06DB7320
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DB00403_2_06DB0040
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBCAC03_2_06DBCAC0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DB72E73_2_06DB72E7
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DB629A3_2_06DB629A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBFA883_2_06DBFA88
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBCAB23_2_06DBCAB2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DB62A83_2_06DB62A8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DB72A33_2_06DB72A3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBC65E3_2_06DBC65E
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DB72443_2_06DB7244
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBFA783_2_06DBFA78
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBC6683_2_06DBC668
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBC2103_2_06DBC210
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBC2003_2_06DBC200
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBF6303_2_06DBF630
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBF62D3_2_06DBF62D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DB72263_2_06DB7226
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBD7C83_2_06DBD7C8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBD7C53_2_06DBD7C5
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBA7F03_2_06DBA7F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBA39D3_2_06DBA39D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBA3A83_2_06DBA3A8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBD3703_2_06DBD370
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBD3603_2_06DBD360
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBCF183_2_06DBCF18
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DB73113_2_06DB7311
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBCF153_2_06DBCF15
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DB27223_2_06DB2722
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBE4D03_2_06DBE4D0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBE4C03_2_06DBE4C0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBB4F83_2_06DBB4F8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBB0B03_2_06DBB0B0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBB0A03_2_06DBB0A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBAC583_2_06DBAC58
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBAC513_2_06DBAC51
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DB6C503_2_06DB6C50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBE0783_2_06DBE078
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBE0753_2_06DBE075
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBDC1A3_2_06DBDC1A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBA8003_2_06DBA800
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBDC203_2_06DBDC20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBF1D83_2_06DBF1D8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBF1D23_2_06DBF1D2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBED803_2_06DBED80
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBBDB83_2_06DBBDB8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBBDAA3_2_06DBBDAA
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBB9513_2_06DBB951
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBED703_2_06DBED70
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBB9603_2_06DBB960
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBE9183_2_06DBE918
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBB5083_2_06DBB508
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBE9283_2_06DBE928
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DCB87C3_2_06DCB87C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DCC9603_2_06DCC960
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DCE9113_2_06DCE911
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DC97B43_2_06DC97B4
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DCB8703_2_06DCB870
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DDA6B03_2_06DDA6B0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DDC6B03_2_06DDC6B0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD74A83_2_06DD74A8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DDAD183_2_06DDAD18
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD93883_2_06DD9388
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DDB3803_2_06DDB380
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DDC0503_2_06DDC050
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DDA0503_2_06DDA050
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD00403_2_06DD0040
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD79F83_2_06DD79F8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD99F03_2_06DD99F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DDB9E83_2_06DDB9E8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD5EF03_2_06DD5EF0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD5EE03_2_06DD5EE0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD5EB83_2_06DD5EB8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD16AA3_2_06DD16AA
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD16A73_2_06DD16A7
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DDC6A63_2_06DDC6A6
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DDA6A03_2_06DDA6A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD56183_2_06DD5618
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD56083_2_06DD5608
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD679D3_2_06DD679D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD67A03_2_06DD67A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD17503_2_06DD1750
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD74983_2_06DD7498
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD44B83_2_06DD44B8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD44B53_2_06DD44B5
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD25D03_2_06DD25D0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD4D5B3_2_06DD4D5B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD4D683_2_06DD4D68
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DDAD093_2_06DDAD09
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD32D03_2_06DD32D0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD7AF13_2_06DD7AF1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD22583_2_06DD2258
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD22573_2_06DD2257
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD5A703_2_06DD5A70
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD5A613_2_06DD5A61
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD6BF83_2_06DD6BF8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD6BF53_2_06DD6BF5
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD63483_2_06DD6348
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD93783_2_06DD9378
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DDB3703_2_06DDB370
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD63393_2_06DD6339
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD70503_2_06DD7050
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD70413_2_06DD7041
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DDA0403_2_06DDA040
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DDC0403_2_06DDC040
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD40383_2_06DD4038
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD40283_2_06DD4028
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DDB9D73_2_06DDB9D7
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD51C03_2_06DD51C0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD99E23_2_06DD99E2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD51BD3_2_06DD51BD
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD49103_2_06DD4910
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DD49013_2_06DD4901
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 44 times
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: String function: 00D99CB3 appears 31 times
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: String function: 00DB0A30 appears 46 times
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: String function: 00DAF9F2 appears 40 times
            Source: Alvise Maria CV 1.exe, 00000000.00000003.2219999953.0000000003C6D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Alvise Maria CV 1.exe
            Source: Alvise Maria CV 1.exe, 00000000.00000002.2222638088.0000000000CA0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Alvise Maria CV 1.exe
            Source: Alvise Maria CV 1.exe, 00000000.00000003.2218409427.0000000003AC3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Alvise Maria CV 1.exe
            Source: Alvise Maria CV 1.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: 3.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 0.2.Alvise Maria CV 1.exe.ca0000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 3.2.RegSvcs.exe.4316458.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 3.2.RegSvcs.exe.4316458.5.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.RegSvcs.exe.4316458.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 3.2.RegSvcs.exe.4316458.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 3.2.RegSvcs.exe.5870000.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 3.2.RegSvcs.exe.5870000.8.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.RegSvcs.exe.5870000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 3.2.RegSvcs.exe.5870000.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 3.2.RegSvcs.exe.3160000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 3.2.RegSvcs.exe.3160000.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.RegSvcs.exe.3160000.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 3.2.RegSvcs.exe.3160000.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 3.2.RegSvcs.exe.5870000.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 3.2.RegSvcs.exe.5870000.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.RegSvcs.exe.5870000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 3.2.RegSvcs.exe.5870000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 3.2.RegSvcs.exe.2fe5e1e.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 3.2.RegSvcs.exe.2fe5e1e.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.RegSvcs.exe.2fe5e1e.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 3.2.RegSvcs.exe.2fe5e1e.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 3.2.RegSvcs.exe.4316458.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 3.2.RegSvcs.exe.4316458.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.RegSvcs.exe.4316458.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 3.2.RegSvcs.exe.4316458.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 3.2.RegSvcs.exe.2fe5e1e.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 3.2.RegSvcs.exe.4315570.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 3.2.RegSvcs.exe.4315570.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 3.2.RegSvcs.exe.4315570.6.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.RegSvcs.exe.4315570.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 3.2.RegSvcs.exe.4315570.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 3.2.RegSvcs.exe.2fe5e1e.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.RegSvcs.exe.4349590.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 3.2.RegSvcs.exe.4349590.7.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.RegSvcs.exe.4349590.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 3.2.RegSvcs.exe.4349590.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 3.2.RegSvcs.exe.2fe4f36.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 3.2.RegSvcs.exe.2fe4f36.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.RegSvcs.exe.4315570.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.RegSvcs.exe.4315570.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 3.2.RegSvcs.exe.4315570.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 3.2.RegSvcs.exe.2fe5e1e.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 3.2.RegSvcs.exe.2fe5e1e.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 3.2.RegSvcs.exe.4349590.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 3.2.RegSvcs.exe.4349590.7.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.RegSvcs.exe.4349590.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 3.2.RegSvcs.exe.4349590.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 3.2.RegSvcs.exe.2fe4f36.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 3.2.RegSvcs.exe.2fe4f36.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 3.2.RegSvcs.exe.3160000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 3.2.RegSvcs.exe.3160000.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.RegSvcs.exe.3160000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 3.2.RegSvcs.exe.3160000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 3.2.RegSvcs.exe.3160ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 3.2.RegSvcs.exe.3160ee8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 3.2.RegSvcs.exe.3160ee8.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.RegSvcs.exe.3160ee8.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 3.2.RegSvcs.exe.3160ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.RegSvcs.exe.2fe4f36.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 3.2.RegSvcs.exe.3160ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 3.2.RegSvcs.exe.3160ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 3.2.RegSvcs.exe.2fe4f36.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.RegSvcs.exe.3160ee8.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 3.2.RegSvcs.exe.2fe4f36.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 3.2.RegSvcs.exe.2fe4f36.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000000.00000002.2222638088.0000000000CA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 00000003.00000002.4496549990.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
            Source: 00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000003.00000002.4498039618.0000000002FA4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000003.00000002.4498039618.0000000002FA4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000003.00000002.4500660567.0000000004311000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000003.00000002.4500660567.0000000004311000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: RegSvcs.exe PID: 5788, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: RegSvcs.exe PID: 5788, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 3.2.RegSvcs.exe.5870000.8.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
            Source: 3.2.RegSvcs.exe.5870000.8.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
            Source: 3.2.RegSvcs.exe.5870000.8.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 3.2.RegSvcs.exe.5870000.8.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 3.2.RegSvcs.exe.5870000.8.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
            Source: 3.2.RegSvcs.exe.5870000.8.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
            Source: 3.2.RegSvcs.exe.2fe5e1e.2.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 3.2.RegSvcs.exe.2fe5e1e.2.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 3.2.RegSvcs.exe.4316458.5.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 3.2.RegSvcs.exe.4316458.5.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 3.2.RegSvcs.exe.4349590.7.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: 3.2.RegSvcs.exe.4349590.7.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@3/2
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E037B5 GetLastError,FormatMessageW,0_2_00E037B5
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DF10BF AdjustTokenPrivileges,CloseHandle,0_2_00DF10BF
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DF16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00DF16C3
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E051CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00E051CD
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E1A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00E1A67C
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E0648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00E0648E
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00D942A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00D942A2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeFile created: C:\Users\user\AppData\Local\Temp\exhilaratinglyJump to behavior
            Source: Alvise Maria CV 1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: RegSvcs.exe, 00000003.00000002.4498607513.00000000035CE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.0000000003602000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000035C0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000035B0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4500660567.00000000043FF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000035F5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: Alvise Maria CV 1.exeReversingLabs: Detection: 60%
            Source: unknownProcess created: C:\Users\user\Desktop\Alvise Maria CV 1.exe "C:\Users\user\Desktop\Alvise Maria CV 1.exe"
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Alvise Maria CV 1.exe"
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Alvise Maria CV 1.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Alvise Maria CV 1.exeStatic file information: File size 1486336 > 1048576
            Source: Alvise Maria CV 1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: Alvise Maria CV 1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: Alvise Maria CV 1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: Alvise Maria CV 1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Alvise Maria CV 1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: Alvise Maria CV 1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: Alvise Maria CV 1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: _.pdb source: RegSvcs.exe, 00000003.00000002.4498039618.0000000002FA4000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4500660567.0000000004311000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdbUGP source: Alvise Maria CV 1.exe, 00000000.00000003.2219820203.00000000039A0000.00000004.00001000.00020000.00000000.sdmp, Alvise Maria CV 1.exe, 00000000.00000003.2220517697.0000000003B40000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: Alvise Maria CV 1.exe, 00000000.00000003.2219820203.00000000039A0000.00000004.00001000.00020000.00000000.sdmp, Alvise Maria CV 1.exe, 00000000.00000003.2220517697.0000000003B40000.00000004.00001000.00020000.00000000.sdmp
            Source: Alvise Maria CV 1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: Alvise Maria CV 1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: Alvise Maria CV 1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: Alvise Maria CV 1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: Alvise Maria CV 1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

            Data Obfuscation

            barindex
            Source: 3.2.RegSvcs.exe.5870000.8.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 3.2.RegSvcs.exe.2fe5e1e.2.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 3.2.RegSvcs.exe.4316458.5.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 3.2.RegSvcs.exe.4349590.7.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 3.2.RegSvcs.exe.3160ee8.3.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00D942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00D942DE
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DB0A76 push ecx; ret 0_2_00DB0A89
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0041C40C push cs; iretd 3_2_0041C4E2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00423149 push eax; ret 3_2_00423179
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0041C50E push cs; iretd 3_2_0041C4E2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004231C8 push eax; ret 3_2_00423179
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0040E21D push ecx; ret 3_2_0040E230
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0041C6BE push ebx; ret 3_2_0041C6BF
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DBC658 push esp; ret 3_2_06DBC65D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DC5B11 push es; ret 3_2_06DC5B20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06DDE48F push es; retf 3_2_06DDE490
            Source: 3.2.RegSvcs.exe.5870000.8.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'y5uuEU0WmlRYf', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
            Source: 3.2.RegSvcs.exe.2fe5e1e.2.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'y5uuEU0WmlRYf', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
            Source: 3.2.RegSvcs.exe.4316458.5.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'y5uuEU0WmlRYf', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
            Source: 3.2.RegSvcs.exe.4349590.7.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'y5uuEU0WmlRYf', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
            Source: 3.2.RegSvcs.exe.3160ee8.3.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'y5uuEU0WmlRYf', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DAF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00DAF98E
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E21C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00E21C41
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5788, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-98572
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeAPI/Special instruction interceptor: Address: 37032DC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,3_2_004019F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599891Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599672Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599344Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599219Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599109Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598891Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598781Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598672Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598562Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598453Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598342Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598234Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598125Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598016Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597891Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597766Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597656Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597547Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597437Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597328Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597219Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597109Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596891Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596766Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596641Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596531Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596422Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596313Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596188Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596063Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595953Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595844Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595719Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595609Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595500Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595391Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595281Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595172Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595062Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594953Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594844Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594719Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594609Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594499Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1264Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8590Jump to behavior
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeAPI coverage: 3.5 %
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DCC2A2 FindFirstFileExW,0_2_00DCC2A2
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E068EE FindFirstFileW,FindClose,0_2_00E068EE
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E0698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00E0698F
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DFD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00DFD076
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DFD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00DFD3A9
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E09642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E09642
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E0979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E0979D
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DFDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00DFDBBE
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E09B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00E09B2B
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E05C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00E05C97
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00D942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00D942DE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599891Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599672Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599344Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599219Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599109Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598891Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598781Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598672Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598562Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598453Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598342Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598234Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598125Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598016Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597891Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597766Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597656Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597547Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597437Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597328Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597219Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597109Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596891Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596766Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596641Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596531Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596422Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596313Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596188Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596063Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595953Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595844Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595719Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595609Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595500Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595391Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595281Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595172Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595062Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594953Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594844Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594719Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594609Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594499Jump to behavior
            Source: RegSvcs.exe, 00000003.00000002.4496958305.000000000149D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end node
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E0EAA2 BlockInput,0_2_00E0EAA2
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DC2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00DC2622
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,3_2_004019F0
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00D942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00D942DE
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DB4CE8 mov eax, dword ptr fs:[00000030h]0_2_00DB4CE8
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_03703548 mov eax, dword ptr fs:[00000030h]0_2_03703548
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_037035A8 mov eax, dword ptr fs:[00000030h]0_2_037035A8
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_03701EB8 mov eax, dword ptr fs:[00000030h]0_2_03701EB8
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DF0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00DF0B62
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DC2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00DC2622
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DB083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00DB083F
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DB09D5 SetUnhandledExceptionFilter,0_2_00DB09D5
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DB0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00DB0C21
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_0040CE09
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_0040E61C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00416F6A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004123F1 SetUnhandledExceptionFilter,3_2_004123F1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 11D2008Jump to behavior
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DF1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00DF1201
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DD2BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00DD2BA5
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DFB226 SendInput,keybd_event,0_2_00DFB226
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E122DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_00E122DA
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Alvise Maria CV 1.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DF0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00DF0B62
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DF1663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00DF1663
            Source: Alvise Maria CV 1.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
            Source: Alvise Maria CV 1.exeBinary or memory string: Shell_TrayWnd
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DB0698 cpuid 0_2_00DB0698
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,3_2_00417A20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E08195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00E08195
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DED27A GetUserNameW,0_2_00DED27A
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00DCB952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_00DCB952
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00D942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00D942DE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4316458.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.5870000.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.3160000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.5870000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4315570.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.2fe5e1e.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.2fe4f36.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4316458.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.2fe5e1e.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4315570.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4349590.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.3160000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4349590.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.3160ee8.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.3160ee8.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.2fe4f36.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4498039618.0000000002FA4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4500660567.0000000004311000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4316458.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.5870000.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.3160000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.5870000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4315570.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.2fe5e1e.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.2fe4f36.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4316458.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.2fe5e1e.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4315570.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4349590.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.3160000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4349590.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.3160ee8.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.3160ee8.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.2fe4f36.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4498039618.0000000002FA4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4498607513.0000000003547000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4500660567.0000000004311000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4498607513.0000000003379000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5788, type: MEMORYSTR
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Alvise Maria CV 1.exeBinary or memory string: WIN_81
            Source: Alvise Maria CV 1.exeBinary or memory string: WIN_XP
            Source: Alvise Maria CV 1.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
            Source: Alvise Maria CV 1.exeBinary or memory string: WIN_XPe
            Source: Alvise Maria CV 1.exeBinary or memory string: WIN_VISTA
            Source: Alvise Maria CV 1.exeBinary or memory string: WIN_7
            Source: Alvise Maria CV 1.exeBinary or memory string: WIN_8
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4316458.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.5870000.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.3160000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.2fe5e1e.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.2fe5e1e.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.5870000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.2fe4f36.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4349590.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4315570.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4316458.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4349590.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4315570.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.3160000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.3160ee8.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.3160ee8.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.2fe4f36.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4498039618.0000000002FA4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4500660567.0000000004311000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5788, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4316458.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.5870000.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.3160000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.5870000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4315570.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.2fe5e1e.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.2fe4f36.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4316458.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.2fe5e1e.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4315570.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4349590.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.3160000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4349590.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.3160ee8.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.3160ee8.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.2fe4f36.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4498039618.0000000002FA4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4500660567.0000000004311000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4316458.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.5870000.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.3160000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.5870000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4315570.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.2fe5e1e.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.2fe4f36.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4316458.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.2fe5e1e.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4315570.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4349590.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.3160000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.4349590.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.3160ee8.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.3160ee8.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.RegSvcs.exe.2fe4f36.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4498039618.0000000002FA4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4498607513.0000000003547000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4500660567.0000000004311000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4498607513.0000000003379000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5788, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E11204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00E11204
            Source: C:\Users\user\Desktop\Alvise Maria CV 1.exeCode function: 0_2_00E11806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00E11806
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure2
            Valid Accounts
            1
            Native API
            1
            DLL Side-Loading
            1
            Exploitation for Privilege Escalation
            11
            Disable or Modify Tools
            1
            OS Credential Dumping
            2
            System Time Discovery
            Remote Services11
            Archive Collected Data
            2
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/Job2
            Valid Accounts
            1
            DLL Side-Loading
            11
            Deobfuscate/Decode Files or Information
            21
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            11
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
            Valid Accounts
            3
            Obfuscated Files or Information
            Security Account Manager1
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
            Access Token Manipulation
            1
            Software Packing
            NTDS137
            System Information Discovery
            Distributed Component Object Model21
            Input Capture
            13
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
            Process Injection
            1
            DLL Side-Loading
            LSA Secrets231
            Security Software Discovery
            SSH3
            Clipboard Data
            Fallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
            Valid Accounts
            Cached Domain Credentials111
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items111
            Virtualization/Sandbox Evasion
            DCSync2
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
            Access Token Manipulation
            Proc Filesystem11
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
            Process Injection
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
            System Network Configuration Discovery
            Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Alvise Maria CV 1.exe61%ReversingLabsWin32.Spyware.Snakekeylogger
            Alvise Maria CV 1.exe100%AviraDR/AutoIt.Gen8
            Alvise Maria CV 1.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://reallyfreegeoip.org0%URL Reputationsafe
            http://checkip.dyndns.org0%URL Reputationsafe
            http://checkip.dyndns.org/0%URL Reputationsafe
            http://checkip.dyndns.com0%URL Reputationsafe
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            http://checkip.dyndns.org/q0%URL Reputationsafe
            http://reallyfreegeoip.org0%URL Reputationsafe
            https://reallyfreegeoip.org/xml/0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            reallyfreegeoip.org
            188.114.97.3
            truetrue
              unknown
              checkip.dyndns.com
              158.101.44.242
              truefalse
                unknown
                checkip.dyndns.org
                unknown
                unknowntrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://reallyfreegeoip.org/xml/173.254.250.82false
                    unknown
                    http://checkip.dyndns.org/false
                    • URL Reputation: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://reallyfreegeoip.orgRegSvcs.exe, 00000003.00000002.4498607513.000000000352A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.000000000343E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034E0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.0000000003481000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.0000000003539000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034D2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034EE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034FC000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://checkip.dyndns.orgRegSvcs.exe, 00000003.00000002.4498607513.000000000352A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.000000000343E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034E0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.0000000003481000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.0000000003539000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034D2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034EE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034FC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.000000000342C000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://checkip.dyndns.comRegSvcs.exe, 00000003.00000002.4498607513.000000000352A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.000000000343E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034E0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.0000000003539000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034D2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034EE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034FC000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000003.00000002.4498607513.0000000003379000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://reallyfreegeoip.org/xml/173.254.250.82$RegSvcs.exe, 00000003.00000002.4498607513.000000000352A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034E0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.0000000003481000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.0000000003539000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034D2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034EE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034FC000.00000004.00000800.00020000.00000000.sdmpfalse
                      unknown
                      http://checkip.dyndns.org/qRegSvcs.exe, 00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498039618.0000000002FA4000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4500660567.0000000004311000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://reallyfreegeoip.orgRegSvcs.exe, 00000003.00000002.4498607513.000000000352A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034E0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.0000000003539000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034D2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034EE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.0000000003456000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498607513.00000000034FC000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://reallyfreegeoip.org/xml/RegSvcs.exe, 00000003.00000002.4498607513.000000000343E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498039618.0000000002FA4000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4500660567.0000000004311000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      188.114.97.3
                      reallyfreegeoip.orgEuropean Union
                      13335CLOUDFLARENETUStrue
                      158.101.44.242
                      checkip.dyndns.comUnited States
                      31898ORACLE-BMC-31898USfalse
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1546657
                      Start date and time:2024-11-01 12:06:12 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 8m 22s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:6
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:Alvise Maria CV 1.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@3/1@3/2
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 97%
                      • Number of executed functions: 42
                      • Number of non-executed functions: 298
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • VT rate limit hit for: Alvise Maria CV 1.exe
                      TimeTypeDescription
                      07:07:23API Interceptor10621118x Sleep call for process: RegSvcs.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      188.114.97.318in SPA-198-2024.exeGet hashmaliciousFormBookBrowse
                      • www.timizoasisey.shop/3p0l/
                      lf1SPbZI3V.exeGet hashmaliciousLokibotBrowse
                      • touxzw.ir/alpha2/five/fre.php
                      Comprobante de pago.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                      • paste.ee/d/vdlzo
                      Purchase_Order_pdf.exeGet hashmaliciousFormBookBrowse
                      • www.bayarcepat19.click/g48c/
                      zxalphamn.docGet hashmaliciousLokibotBrowse
                      • touxzw.ir/alpha2/five/fre.php
                      rPO-000172483.exeGet hashmaliciousFormBookBrowse
                      • www.launchdreamidea.xyz/2b9b/
                      rPO_28102400.exeGet hashmaliciousLokibotBrowse
                      • ghcopz.shop/ClarkB/PWS/fre.php
                      PbfYaIvR5B.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                      • windowsxp.top/ExternaltoPhppollcpuupdateTrafficpublic.php
                      SR3JZpolPo.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                      • xilloolli.com/api.php?status=1&wallets=0&av=1
                      5Z1WFRMTOXRH6X21Z8NU8.exeGet hashmaliciousUnknownBrowse
                      • artvisions-autoinsider.com/8bkjdSdfjCe/index.php
                      158.101.44.242Payment Receipt.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • checkip.dyndns.org/
                      Product Inquiry-002.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • checkip.dyndns.org/
                      Pedido de Cota#U00e7#U00e3o -RFQ20241030_Pdf.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                      • checkip.dyndns.org/
                      Eprdtdrqbr.exeGet hashmaliciousSnake KeyloggerBrowse
                      • checkip.dyndns.org/
                      Quotation.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                      • checkip.dyndns.org/
                      Gun Ici Cek Statu Listesi.exeGet hashmaliciousMassLogger RATBrowse
                      • checkip.dyndns.org/
                      PO Number- 4900003753.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                      • checkip.dyndns.org/
                      PO 4500580954.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                      • checkip.dyndns.org/
                      PG567777878-H677889978-6G89O9I4567778.exeGet hashmaliciousSnake KeyloggerBrowse
                      • checkip.dyndns.org/
                      INVOICE.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                      • checkip.dyndns.org/
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      reallyfreegeoip.org2Lzx7LMDWV.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • 188.114.96.3
                      Quotation Document.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                      • 188.114.96.3
                      z17Mz7zumpwTUMRxyS.exeGet hashmaliciousSnake KeyloggerBrowse
                      • 188.114.96.3
                      INVOICE ATTACHMENT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                      • 188.114.96.3
                      Y2EM7suNV5.exeGet hashmaliciousMassLogger RATBrowse
                      • 188.114.97.3
                      RFQ Proposals ADC-24-65.exeGet hashmaliciousMassLogger RATBrowse
                      • 188.114.97.3
                      RFQ Q700mm CB St44 PN20 e=5.6 mm TSEN 10217-1 #U7edd#U7f18#U94a2#U7ba1#Uff1a200 #U7c73.exeGet hashmaliciousMassLogger RATBrowse
                      • 188.114.97.3
                      MB267382625AE.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                      • 188.114.97.3
                      Payment Receipt.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • 188.114.96.3
                      Product Inquiry-002.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • 188.114.96.3
                      checkip.dyndns.com2Lzx7LMDWV.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • 193.122.6.168
                      Quotation Document.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                      • 193.122.6.168
                      z17Mz7zumpwTUMRxyS.exeGet hashmaliciousSnake KeyloggerBrowse
                      • 132.226.247.73
                      INVOICE ATTACHMENT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                      • 132.226.8.169
                      Y2EM7suNV5.exeGet hashmaliciousMassLogger RATBrowse
                      • 132.226.8.169
                      RFQ Proposals ADC-24-65.exeGet hashmaliciousMassLogger RATBrowse
                      • 132.226.8.169
                      RFQ Q700mm CB St44 PN20 e=5.6 mm TSEN 10217-1 #U7edd#U7f18#U94a2#U7ba1#Uff1a200 #U7c73.exeGet hashmaliciousMassLogger RATBrowse
                      • 132.226.247.73
                      MB267382625AE.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                      • 132.226.8.169
                      Payment Receipt.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • 158.101.44.242
                      Product Inquiry-002.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • 158.101.44.242
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      CLOUDFLARENETUSAction Desk Support 01 Nov.msgGet hashmaliciousUnknownBrowse
                      • 188.114.96.3
                      https://www.cognitoforms.com/f/wAh1CzXrnEmEifrmJ4OEgg/1Get hashmaliciousHTMLPhisher, Mamba2FABrowse
                      • 104.17.24.14
                      file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                      • 188.114.97.3
                      file.exeGet hashmaliciousLummaCBrowse
                      • 104.21.85.194
                      kill.exeGet hashmaliciousUnknownBrowse
                      • 104.26.13.205
                      http://edgeupgrade.comGet hashmaliciousUnknownBrowse
                      • 104.22.48.74
                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                      • 188.114.96.3
                      https://pcapp.store/pixel.gifGet hashmaliciousUnknownBrowse
                      • 172.67.15.14
                      draft contract for order #782334.exeGet hashmaliciousFormBookBrowse
                      • 172.67.131.32
                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                      • 188.114.96.3
                      ORACLE-BMC-31898US2Lzx7LMDWV.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • 193.122.6.168
                      Quotation Document.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                      • 193.122.6.168
                      Y2EM7suNV5.exeGet hashmaliciousMassLogger RATBrowse
                      • 193.122.130.0
                      Payment Receipt.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • 158.101.44.242
                      Product Inquiry-002.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • 158.101.44.242
                      Pedido de Cota#U00e7#U00e3o -RFQ20241030_Pdf.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                      • 158.101.44.242
                      200716 SUMI SAUJANA Water Pump 100%.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                      • 193.122.130.0
                      Eprdtdrqbr.exeGet hashmaliciousSnake KeyloggerBrowse
                      • 158.101.44.242
                      Quotation.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                      • 158.101.44.242
                      PROFORMA FATURA pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                      • 193.122.6.168
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      54328bd36c14bd82ddaa0c04b25ed9ad2Lzx7LMDWV.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • 188.114.97.3
                      Quotation Document.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                      • 188.114.97.3
                      z17Mz7zumpwTUMRxyS.exeGet hashmaliciousSnake KeyloggerBrowse
                      • 188.114.97.3
                      INVOICE ATTACHMENT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                      • 188.114.97.3
                      RFQ Proposals ADC-24-65.exeGet hashmaliciousMassLogger RATBrowse
                      • 188.114.97.3
                      RFQ Q700mm CB St44 PN20 e=5.6 mm TSEN 10217-1 #U7edd#U7f18#U94a2#U7ba1#Uff1a200 #U7c73.exeGet hashmaliciousMassLogger RATBrowse
                      • 188.114.97.3
                      MB267382625AE.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                      • 188.114.97.3
                      Payment Receipt.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • 188.114.97.3
                      Product Inquiry-002.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • 188.114.97.3
                      Quotation enquiry.exeGet hashmaliciousUnknownBrowse
                      • 188.114.97.3
                      No context
                      Process:C:\Users\user\Desktop\Alvise Maria CV 1.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):229376
                      Entropy (8bit):7.86508179689231
                      Encrypted:false
                      SSDEEP:6144:nfMbzfgwREJjYgBV1V9NqNRHxWZmF+U8rkpM5:UbEK+jRBV1V9NqN7hF+zEM5
                      MD5:54FEBDE6BEC04BEBA913C2000F351072
                      SHA1:176B3750784088258F4429CC56267FECE7E87A2F
                      SHA-256:6774BB053B1B57E05427444A48537EC37933517459DF242A5F3175D6477F19F3
                      SHA-512:31F164801B507189BEBB80A6010181E4B225CBA1C25DD52134953BB8E4D773A48F0C919AA327B8A799161396E1B04A3A426058322D86E0231B4022C2901F1263
                      Malicious:false
                      Reputation:low
                      Preview:...UAK5D0A5C..RG.Y3DADQ6.RDNRHIYUBK5D4A5C42RGIY3DADQ6LRDNRHI.UBK;[.O5.=.s.H..e.,8El"6!5:(4u!*[*[5.!Q. 2'yZ*a..el?+*7fDT_fK5D4A5C\".je(.:m5.H`#.0`k6'j3.KO..KhE.,k8.M.0./.o<:R#.7kv+5.5.?.`OL.6.'a-",}G.,DNRHIYUBK5D4A5C4.../Y3DA..6L.EJR<.Y.BK5D4A5C.2qFBX:DA.P6L.ENRHIYz.K5D$A5C.3RGI.3DQDQ6NRDKRHIYUBK0D4A5C42R.JY3@AD..NRFNR.IYEBK%D4A5S42BGIY3DATQ6LRDNRHIYU.^7DdA5C4RPG..2DADQ6LRDNRHIYUBK5D4A5C42R..X3XADQ6LRDNRHIYUBK5D4A5C42RGIY.ICD.6LRDNRHIYUBK.E4.4C42RGIY3DADQ6LRDNRHIYUBK5D.5P;@2RGQ.2DATQ6L.ENRLIYUBK5D4A5C42RgIYSj3 0B-RD.?HIY.CK5*4A5.52RGIY3DADQ6LR.NR.g=46*5D4..C42rEIY%DAD[4LRDNRHIYUBK5DtA5..@!5*Y3D..P6L2FNR(HYUbI5D4A5C42RGIY3.AD.6LRDNRHIYUBK5D4A5C42RGIY3DADQ6LRDNRHIYUBK5D4A5C42RGIY3DADQ6LRDNRHIYUBK5D4A5C42RGIY3DADQ6LRDNRHIYUBK5D4A5C42RGIY3DADQ6LRDNRHIYUBK5D4A5C42RGIY3DADQ6LRDNRHIYUBK5D4A5C42RGIY3DADQ6LRDNRHIYUBK5D4A5C42RGIY3DADQ6LRDNRHIYUBK5D4A5C42RGIY3DADQ6LRDNRHIYUBK5D4A5C42RGIY3DADQ6LRDNRHIYUBK5D4A5C42RGIY3DADQ6LRDNRHIYUBK5D4A5C42RGIY3DADQ6LRDNRHIYUBK5D4A5C42RGIY3DADQ6LRDNRHIYUBK5D4A5C42
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):7.342372681183114
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:Alvise Maria CV 1.exe
                      File size:1'486'336 bytes
                      MD5:3dc3bbec8d0de761f7992a0464409ba8
                      SHA1:073728a153af98b84ab24726b373bd994d9688e6
                      SHA256:9aa6870924984dad7897c2efa17305143d0e95aba5b8ecb387577361c7657d0c
                      SHA512:8bbb9e321241326d7a4da14069a165455b805dc2f161aa83557ff2619bf6b12c10c9d80916eb60046a15306353167bfd9a3818d31e7931c30b6d345a3332059f
                      SSDEEP:24576:pqDEvCTbMWu7rQYlBQcBiT6rprG8arPWg0EGRxH9DD3/MfOJ4L/:pTvC/MTQYxsWR7arfqlg44L
                      TLSH:4965D00233D1D022FF9B92334B5AF6515BBC69260523E62F13981DB9BE705B1463E7A3
                      File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                      Icon Hash:aaf3e3e3938382a0
                      Entrypoint:0x420577
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                      Time Stamp:0x6724152C [Thu Oct 31 23:39:24 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:5
                      OS Version Minor:1
                      File Version Major:5
                      File Version Minor:1
                      Subsystem Version Major:5
                      Subsystem Version Minor:1
                      Import Hash:948cc502fe9226992dce9417f952fce3
                      Instruction
                      call 00007FDECCE405F3h
                      jmp 00007FDECCE3FEFFh
                      push ebp
                      mov ebp, esp
                      push esi
                      push dword ptr [ebp+08h]
                      mov esi, ecx
                      call 00007FDECCE400DDh
                      mov dword ptr [esi], 0049FDF0h
                      mov eax, esi
                      pop esi
                      pop ebp
                      retn 0004h
                      and dword ptr [ecx+04h], 00000000h
                      mov eax, ecx
                      and dword ptr [ecx+08h], 00000000h
                      mov dword ptr [ecx+04h], 0049FDF8h
                      mov dword ptr [ecx], 0049FDF0h
                      ret
                      push ebp
                      mov ebp, esp
                      push esi
                      push dword ptr [ebp+08h]
                      mov esi, ecx
                      call 00007FDECCE400AAh
                      mov dword ptr [esi], 0049FE0Ch
                      mov eax, esi
                      pop esi
                      pop ebp
                      retn 0004h
                      and dword ptr [ecx+04h], 00000000h
                      mov eax, ecx
                      and dword ptr [ecx+08h], 00000000h
                      mov dword ptr [ecx+04h], 0049FE14h
                      mov dword ptr [ecx], 0049FE0Ch
                      ret
                      push ebp
                      mov ebp, esp
                      push esi
                      mov esi, ecx
                      lea eax, dword ptr [esi+04h]
                      mov dword ptr [esi], 0049FDD0h
                      and dword ptr [eax], 00000000h
                      and dword ptr [eax+04h], 00000000h
                      push eax
                      mov eax, dword ptr [ebp+08h]
                      add eax, 04h
                      push eax
                      call 00007FDECCE42C9Dh
                      pop ecx
                      pop ecx
                      mov eax, esi
                      pop esi
                      pop ebp
                      retn 0004h
                      lea eax, dword ptr [ecx+04h]
                      mov dword ptr [ecx], 0049FDD0h
                      push eax
                      call 00007FDECCE42CE8h
                      pop ecx
                      ret
                      push ebp
                      mov ebp, esp
                      push esi
                      mov esi, ecx
                      lea eax, dword ptr [esi+04h]
                      mov dword ptr [esi], 0049FDD0h
                      push eax
                      call 00007FDECCE42CD1h
                      test byte ptr [ebp+08h], 00000001h
                      pop ecx
                      Programming Language:
                      • [ C ] VS2008 SP1 build 30729
                      • [IMP] VS2008 SP1 build 30729
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x94228.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1690000x7594.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0xd40000x942280x9440010c1b22b3ba625904e4027aed765ec49False0.9565931966694773data7.9528456740840765IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x1690000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0xd44a00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                      RT_ICON0xd45c80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                      RT_ICON0xd48b00x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                      RT_ICON0xd49d80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                      RT_ICON0xd58800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                      RT_ICON0xd61280x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                      RT_ICON0xd66900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                      RT_ICON0xd8c380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                      RT_ICON0xd9ce00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                      RT_STRING0xda1480x594dataEnglishGreat Britain0.3333333333333333
                      RT_STRING0xda6dc0x68adataEnglishGreat Britain0.2735961768219833
                      RT_STRING0xdad680x490dataEnglishGreat Britain0.3715753424657534
                      RT_STRING0xdb1f80x5fcdataEnglishGreat Britain0.3087467362924282
                      RT_STRING0xdb7f40x65cdataEnglishGreat Britain0.34336609336609336
                      RT_STRING0xdbe500x466dataEnglishGreat Britain0.3605683836589698
                      RT_STRING0xdc2b80x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                      RT_RCDATA0xdc4100x8b8c0data1.0003166638674281
                      RT_GROUP_ICON0x167cd00x76dataEnglishGreat Britain0.6610169491525424
                      RT_GROUP_ICON0x167d480x14dataEnglishGreat Britain1.15
                      RT_VERSION0x167d5c0xdcdataEnglishGreat Britain0.6181818181818182
                      RT_MANIFEST0x167e380x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                      DLLImport
                      WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                      VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                      COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                      MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                      WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                      PSAPI.DLLGetProcessMemoryInfo
                      IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                      USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                      UxTheme.dllIsThemeActive
                      KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                      USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                      GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                      COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                      ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                      SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                      ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                      OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                      Language of compilation systemCountry where language is spokenMap
                      EnglishGreat Britain
                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                      2024-11-01T12:07:22.061482+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.549704TCP
                      2024-11-01T12:07:22.729741+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549715158.101.44.24280TCP
                      2024-11-01T12:07:23.807862+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549715158.101.44.24280TCP
                      2024-11-01T12:07:24.528852+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549729188.114.97.3443TCP
                      2024-11-01T12:07:25.261083+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549735158.101.44.24280TCP
                      2024-11-01T12:08:00.748149+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.549937TCP
                      TimestampSource PortDest PortSource IPDest IP
                      Nov 1, 2024 12:07:21.818883896 CET4971580192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:21.823700905 CET8049715158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:21.823775053 CET4971580192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:21.829269886 CET4971580192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:21.835299015 CET8049715158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:22.461810112 CET8049715158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:22.467628002 CET4971580192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:22.472430944 CET8049715158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:22.617007971 CET8049715158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:22.665848017 CET49722443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:22.665896893 CET44349722188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:22.666126966 CET49722443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:22.673228979 CET49722443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:22.673290014 CET44349722188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:22.729741096 CET4971580192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:23.297415018 CET44349722188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:23.297493935 CET49722443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:23.401699066 CET49722443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:23.401727915 CET44349722188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:23.402776957 CET44349722188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:23.448486090 CET49722443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:23.455959082 CET49722443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:23.499332905 CET44349722188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:23.594650030 CET44349722188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:23.594764948 CET44349722188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:23.594929934 CET49722443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:23.616255999 CET49722443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:23.619745970 CET4971580192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:23.625555038 CET8049715158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:23.766319990 CET8049715158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:23.768806934 CET49729443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:23.768857956 CET44349729188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:23.768934011 CET49729443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:23.769323111 CET49729443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:23.769346952 CET44349729188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:23.807862043 CET4971580192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:24.381190062 CET44349729188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:24.392421007 CET49729443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:24.392458916 CET44349729188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:24.528915882 CET44349729188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:24.529212952 CET44349729188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:24.529305935 CET49729443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:24.529962063 CET49729443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:24.533996105 CET4971580192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:24.535331011 CET4973580192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:24.540422916 CET8049715158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:24.540479898 CET4971580192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:24.541054010 CET8049735158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:24.541127920 CET4973580192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:24.541204929 CET4973580192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:24.545916080 CET8049735158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:25.216298103 CET8049735158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:25.217603922 CET49740443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:25.217643023 CET44349740188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:25.217787027 CET49740443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:25.218139887 CET49740443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:25.218157053 CET44349740188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:25.261082888 CET4973580192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:25.830265045 CET44349740188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:25.831971884 CET49740443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:25.831988096 CET44349740188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:25.969203949 CET44349740188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:25.969429970 CET44349740188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:25.969480038 CET49740443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:25.969989061 CET49740443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:25.974438906 CET4974480192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:25.979554892 CET8049744158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:25.979629040 CET4974480192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:25.979793072 CET4974480192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:25.985411882 CET8049744158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:27.765265942 CET8049744158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:27.766562939 CET49755443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:27.766591072 CET44349755188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:27.766661882 CET49755443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:27.766864061 CET49755443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:27.766876936 CET44349755188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:27.808621883 CET4974480192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:28.414372921 CET44349755188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:28.416455984 CET49755443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:28.416476011 CET44349755188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:28.561935902 CET44349755188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:28.562187910 CET44349755188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:28.562267065 CET49755443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:28.562685013 CET49755443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:28.566260099 CET4974480192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:28.567298889 CET4975980192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:28.571611881 CET8049744158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:28.571676970 CET4974480192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:28.572114944 CET8049759158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:28.572186947 CET4975980192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:28.572274923 CET4975980192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:28.577018976 CET8049759158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:29.202791929 CET8049759158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:29.204292059 CET49765443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:29.204334974 CET44349765188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:29.204509974 CET49765443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:29.204808950 CET49765443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:29.204823971 CET44349765188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:29.245366096 CET4975980192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:29.823913097 CET44349765188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:29.825586081 CET49765443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:29.825622082 CET44349765188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:29.962606907 CET44349765188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:29.962838888 CET44349765188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:29.963011026 CET49765443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:29.963423967 CET49765443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:29.967111111 CET4975980192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:29.968410015 CET4976880192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:29.972187042 CET8049759158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:29.972242117 CET4975980192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:29.973258972 CET8049768158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:29.973332882 CET4976880192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:29.973445892 CET4976880192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:29.978204012 CET8049768158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:30.636043072 CET8049768158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:30.637629986 CET49772443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:30.637686014 CET44349772188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:30.637788057 CET49772443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:30.638044119 CET49772443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:30.638070107 CET44349772188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:30.682902098 CET4976880192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:31.247971058 CET44349772188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:31.250257015 CET49772443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:31.250297070 CET44349772188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:31.392483950 CET44349772188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:31.392771006 CET44349772188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:31.396683931 CET49772443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:31.397373915 CET49772443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:31.400942087 CET4976880192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:31.402476072 CET4977880192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:31.406449080 CET8049768158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:31.406502962 CET4976880192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:31.407332897 CET8049778158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:31.407398939 CET4977880192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:31.407465935 CET4977880192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:31.412273884 CET8049778158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:32.055039883 CET8049778158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:32.056492090 CET49783443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:32.056515932 CET44349783188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:32.056617022 CET49783443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:32.057022095 CET49783443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:32.057032108 CET44349783188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:32.104760885 CET4977880192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:32.661355972 CET44349783188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:32.662986994 CET49783443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:32.663002968 CET44349783188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:32.798779011 CET44349783188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:32.799015999 CET44349783188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:32.799066067 CET49783443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:32.799489021 CET49783443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:32.804548025 CET4977880192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:32.807652950 CET4978880192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:32.809750080 CET8049778158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:32.809797049 CET4977880192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:32.812558889 CET8049788158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:32.812629938 CET4978880192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:32.812743902 CET4978880192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:32.818350077 CET8049788158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:35.476022959 CET8049788158.101.44.242192.168.2.5
                      Nov 1, 2024 12:07:35.477600098 CET49804443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:35.477647066 CET44349804188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:35.477711916 CET49804443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:35.478079081 CET49804443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:35.478095055 CET44349804188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:35.526608944 CET4978880192.168.2.5158.101.44.242
                      Nov 1, 2024 12:07:36.101280928 CET44349804188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:36.102868080 CET49804443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:36.102888107 CET44349804188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:36.240442991 CET44349804188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:36.240580082 CET44349804188.114.97.3192.168.2.5
                      Nov 1, 2024 12:07:36.240665913 CET49804443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:07:36.241122961 CET49804443192.168.2.5188.114.97.3
                      Nov 1, 2024 12:08:30.239063978 CET8049735158.101.44.242192.168.2.5
                      Nov 1, 2024 12:08:30.239135027 CET4973580192.168.2.5158.101.44.242
                      Nov 1, 2024 12:08:40.499398947 CET8049788158.101.44.242192.168.2.5
                      Nov 1, 2024 12:08:40.499510050 CET4978880192.168.2.5158.101.44.242
                      Nov 1, 2024 12:09:15.480711937 CET4978880192.168.2.5158.101.44.242
                      Nov 1, 2024 12:09:15.485980034 CET8049788158.101.44.242192.168.2.5
                      TimestampSource PortDest PortSource IPDest IP
                      Nov 1, 2024 12:07:21.795563936 CET6044653192.168.2.51.1.1.1
                      Nov 1, 2024 12:07:21.804243088 CET53604461.1.1.1192.168.2.5
                      Nov 1, 2024 12:07:22.657852888 CET5216853192.168.2.51.1.1.1
                      Nov 1, 2024 12:07:22.665165901 CET53521681.1.1.1192.168.2.5
                      Nov 1, 2024 12:07:35.279073954 CET5439153192.168.2.51.1.1.1
                      Nov 1, 2024 12:07:35.286727905 CET53543911.1.1.1192.168.2.5
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Nov 1, 2024 12:07:21.795563936 CET192.168.2.51.1.1.10x3209Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                      Nov 1, 2024 12:07:22.657852888 CET192.168.2.51.1.1.10xbff5Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                      Nov 1, 2024 12:07:35.279073954 CET192.168.2.51.1.1.10xd50bStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Nov 1, 2024 12:07:21.804243088 CET1.1.1.1192.168.2.50x3209No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                      Nov 1, 2024 12:07:21.804243088 CET1.1.1.1192.168.2.50x3209No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                      Nov 1, 2024 12:07:21.804243088 CET1.1.1.1192.168.2.50x3209No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                      Nov 1, 2024 12:07:21.804243088 CET1.1.1.1192.168.2.50x3209No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                      Nov 1, 2024 12:07:21.804243088 CET1.1.1.1192.168.2.50x3209No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                      Nov 1, 2024 12:07:21.804243088 CET1.1.1.1192.168.2.50x3209No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                      Nov 1, 2024 12:07:22.665165901 CET1.1.1.1192.168.2.50xbff5No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                      Nov 1, 2024 12:07:22.665165901 CET1.1.1.1192.168.2.50xbff5No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                      Nov 1, 2024 12:07:35.286727905 CET1.1.1.1192.168.2.50xd50bNo error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                      Nov 1, 2024 12:07:35.286727905 CET1.1.1.1192.168.2.50xd50bNo error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                      • reallyfreegeoip.org
                      • checkip.dyndns.org
                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.549715158.101.44.242805788C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      TimestampBytes transferredDirectionData
                      Nov 1, 2024 12:07:21.829269886 CET151OUTGET / HTTP/1.1
                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                      Host: checkip.dyndns.org
                      Connection: Keep-Alive
                      Nov 1, 2024 12:07:22.461810112 CET323INHTTP/1.1 200 OK
                      Date: Fri, 01 Nov 2024 11:07:22 GMT
                      Content-Type: text/html
                      Content-Length: 106
                      Connection: keep-alive
                      Cache-Control: no-cache
                      Pragma: no-cache
                      X-Request-ID: 7c96d248b914dedf7d708e6d47d0691c
                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 32 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.82</body></html>
                      Nov 1, 2024 12:07:22.467628002 CET127OUTGET / HTTP/1.1
                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                      Host: checkip.dyndns.org
                      Nov 1, 2024 12:07:22.617007971 CET323INHTTP/1.1 200 OK
                      Date: Fri, 01 Nov 2024 11:07:22 GMT
                      Content-Type: text/html
                      Content-Length: 106
                      Connection: keep-alive
                      Cache-Control: no-cache
                      Pragma: no-cache
                      X-Request-ID: 3b9610e3836b7d1eb76caa38f82dffae
                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 32 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.82</body></html>
                      Nov 1, 2024 12:07:23.619745970 CET127OUTGET / HTTP/1.1
                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                      Host: checkip.dyndns.org
                      Nov 1, 2024 12:07:23.766319990 CET323INHTTP/1.1 200 OK
                      Date: Fri, 01 Nov 2024 11:07:23 GMT
                      Content-Type: text/html
                      Content-Length: 106
                      Connection: keep-alive
                      Cache-Control: no-cache
                      Pragma: no-cache
                      X-Request-ID: 7ee5e4aa4b98743909307d234cf2b1af
                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 32 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.82</body></html>


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      1192.168.2.549735158.101.44.242805788C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      TimestampBytes transferredDirectionData
                      Nov 1, 2024 12:07:24.541204929 CET127OUTGET / HTTP/1.1
                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                      Host: checkip.dyndns.org
                      Nov 1, 2024 12:07:25.216298103 CET323INHTTP/1.1 200 OK
                      Date: Fri, 01 Nov 2024 11:07:25 GMT
                      Content-Type: text/html
                      Content-Length: 106
                      Connection: keep-alive
                      Cache-Control: no-cache
                      Pragma: no-cache
                      X-Request-ID: 8169a73b58944f13abcf9061f572d214
                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 32 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.82</body></html>


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      2192.168.2.549744158.101.44.242805788C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      TimestampBytes transferredDirectionData
                      Nov 1, 2024 12:07:25.979793072 CET151OUTGET / HTTP/1.1
                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                      Host: checkip.dyndns.org
                      Connection: Keep-Alive
                      Nov 1, 2024 12:07:27.765265942 CET323INHTTP/1.1 200 OK
                      Date: Fri, 01 Nov 2024 11:07:27 GMT
                      Content-Type: text/html
                      Content-Length: 106
                      Connection: keep-alive
                      Cache-Control: no-cache
                      Pragma: no-cache
                      X-Request-ID: 9b03dcfb8ad74d3e5c77ed1a705bf20c
                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 32 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.82</body></html>


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      3192.168.2.549759158.101.44.242805788C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      TimestampBytes transferredDirectionData
                      Nov 1, 2024 12:07:28.572274923 CET151OUTGET / HTTP/1.1
                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                      Host: checkip.dyndns.org
                      Connection: Keep-Alive
                      Nov 1, 2024 12:07:29.202791929 CET323INHTTP/1.1 200 OK
                      Date: Fri, 01 Nov 2024 11:07:29 GMT
                      Content-Type: text/html
                      Content-Length: 106
                      Connection: keep-alive
                      Cache-Control: no-cache
                      Pragma: no-cache
                      X-Request-ID: 298f47e40274b0b1e1a85114301f0701
                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 32 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.82</body></html>


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      4192.168.2.549768158.101.44.242805788C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      TimestampBytes transferredDirectionData
                      Nov 1, 2024 12:07:29.973445892 CET151OUTGET / HTTP/1.1
                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                      Host: checkip.dyndns.org
                      Connection: Keep-Alive
                      Nov 1, 2024 12:07:30.636043072 CET323INHTTP/1.1 200 OK
                      Date: Fri, 01 Nov 2024 11:07:30 GMT
                      Content-Type: text/html
                      Content-Length: 106
                      Connection: keep-alive
                      Cache-Control: no-cache
                      Pragma: no-cache
                      X-Request-ID: cf6085897738d6c538d066489d759cf1
                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 32 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.82</body></html>


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      5192.168.2.549778158.101.44.242805788C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      TimestampBytes transferredDirectionData
                      Nov 1, 2024 12:07:31.407465935 CET151OUTGET / HTTP/1.1
                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                      Host: checkip.dyndns.org
                      Connection: Keep-Alive
                      Nov 1, 2024 12:07:32.055039883 CET323INHTTP/1.1 200 OK
                      Date: Fri, 01 Nov 2024 11:07:31 GMT
                      Content-Type: text/html
                      Content-Length: 106
                      Connection: keep-alive
                      Cache-Control: no-cache
                      Pragma: no-cache
                      X-Request-ID: c3a8fa6fdcd2da8f217e38b77a74c351
                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 32 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.82</body></html>


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      6192.168.2.549788158.101.44.242805788C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      TimestampBytes transferredDirectionData
                      Nov 1, 2024 12:07:32.812743902 CET151OUTGET / HTTP/1.1
                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                      Host: checkip.dyndns.org
                      Connection: Keep-Alive
                      Nov 1, 2024 12:07:35.476022959 CET323INHTTP/1.1 200 OK
                      Date: Fri, 01 Nov 2024 11:07:35 GMT
                      Content-Type: text/html
                      Content-Length: 106
                      Connection: keep-alive
                      Cache-Control: no-cache
                      Pragma: no-cache
                      X-Request-ID: 9d3bf8895d2108a21cdeec5ff83e9d44
                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 32 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.82</body></html>


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.549722188.114.97.34435788C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      TimestampBytes transferredDirectionData
                      2024-11-01 11:07:23 UTC87OUTGET /xml/173.254.250.82 HTTP/1.1
                      Host: reallyfreegeoip.org
                      Connection: Keep-Alive
                      2024-11-01 11:07:23 UTC1217INHTTP/1.1 200 OK
                      Date: Fri, 01 Nov 2024 11:07:23 GMT
                      Content-Type: text/xml
                      Content-Length: 359
                      Connection: close
                      x-amzn-requestid: dcb7f8fd-cb89-43da-858d-6f4f77c7b6b0
                      x-amzn-trace-id: Root=1-67244fb1-0547127a4d31c545397ac2c8;Parent=30ed2c4e00ab7389;Sampled=0;Lineage=1:fc9e8231:0
                      x-cache: Miss from cloudfront
                      via: 1.1 a271e07df9c41dd2c067133c2d7094f0.cloudfront.net (CloudFront)
                      x-amz-cf-pop: DFW57-P5
                      x-amz-cf-id: JJhBUDOUMs3p8bjG7il8adLMdGX07bMRaaR4wWJNrS_PeJVXxOHsgA==
                      Cache-Control: max-age=31536000
                      CF-Cache-Status: HIT
                      Age: 26298
                      Last-Modified: Fri, 01 Nov 2024 03:49:05 GMT
                      Accept-Ranges: bytes
                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=G%2B4II0JetKqBS5ONnoo0NgQdKQo9zDf5FCnNMSNRcgFjHe8cSgUcaQJIbhU44JT81wd0UcMErMzANuXeFy30fXungFiAsZf%2BbFR%2F9m5zyTK8ibYC97LwCp5Zb7P380VNx7xnoJkX"}],"group":"cf-nel","max_age":604800}
                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                      Server: cloudflare
                      CF-RAY: 8dbb6bc00c392ccf-DFW
                      alt-svc: h3=":443"; ma=86400
                      server-timing: cfL4;desc="?proto=TCP&rtt=1059&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=2683966&cwnd=251&unsent_bytes=0&cid=0951dd8ba84534e2&ts=310&x=0"
                      2024-11-01 11:07:23 UTC152INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 32 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54
                      Data Ascii: <Response><IP>173.254.250.82</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>T
                      2024-11-01 11:07:23 UTC207INData Raw: 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 31 2e 30 30 36 35 3c 2f 4c 61 74 69 74 75 64 65 3e 0a 09 3c 4c 6f 6e 67 69 74 75 64 65 3e 2d 39 37 2e 38 34 30 36 3c 2f 4c 6f 6e 67 69 74 75 64 65 3e 0a 09 3c 4d 65 74 72 6f 43 6f 64 65 3e 36 32 35 3c 2f 4d 65 74 72 6f 43 6f 64 65 3e 0a 3c 2f 52 65 73 70 6f 6e 73 65 3e 0a
                      Data Ascii: exas</RegionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>31.0065</Latitude><Longitude>-97.8406</Longitude><MetroCode>625</MetroCode></Response>


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      1192.168.2.549729188.114.97.34435788C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      TimestampBytes transferredDirectionData
                      2024-11-01 11:07:24 UTC63OUTGET /xml/173.254.250.82 HTTP/1.1
                      Host: reallyfreegeoip.org
                      2024-11-01 11:07:24 UTC1219INHTTP/1.1 200 OK
                      Date: Fri, 01 Nov 2024 11:07:24 GMT
                      Content-Type: text/xml
                      Content-Length: 359
                      Connection: close
                      x-amzn-requestid: dcb7f8fd-cb89-43da-858d-6f4f77c7b6b0
                      x-amzn-trace-id: Root=1-67244fb1-0547127a4d31c545397ac2c8;Parent=30ed2c4e00ab7389;Sampled=0;Lineage=1:fc9e8231:0
                      x-cache: Miss from cloudfront
                      via: 1.1 a271e07df9c41dd2c067133c2d7094f0.cloudfront.net (CloudFront)
                      x-amz-cf-pop: DFW57-P5
                      x-amz-cf-id: JJhBUDOUMs3p8bjG7il8adLMdGX07bMRaaR4wWJNrS_PeJVXxOHsgA==
                      Cache-Control: max-age=31536000
                      CF-Cache-Status: HIT
                      Age: 26299
                      Last-Modified: Fri, 01 Nov 2024 03:49:05 GMT
                      Accept-Ranges: bytes
                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=F5bSjxHxevjC4slahw%2BveHwiE%2FUWy9wM0aAsTj2J6JzYBPiOzNZ6QmHNs8OnoEl%2B7V88u0oUvrMvEvggwHGiPCAVt59%2Fw81CekjO2MIZT6PgKMQgEjjaPaWEvXGtae0PmHrqQkHJ"}],"group":"cf-nel","max_age":604800}
                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                      Server: cloudflare
                      CF-RAY: 8dbb6bc5d9403162-DFW
                      alt-svc: h3=":443"; ma=86400
                      server-timing: cfL4;desc="?proto=TCP&rtt=1064&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=2681481&cwnd=251&unsent_bytes=0&cid=04a1d1d4438faf1a&ts=157&x=0"
                      2024-11-01 11:07:24 UTC150INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 32 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65
                      Data Ascii: <Response><IP>173.254.250.82</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName
                      2024-11-01 11:07:24 UTC209INData Raw: 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 31 2e 30 30 36 35 3c 2f 4c 61 74 69 74 75 64 65 3e 0a 09 3c 4c 6f 6e 67 69 74 75 64 65 3e 2d 39 37 2e 38 34 30 36 3c 2f 4c 6f 6e 67 69 74 75 64 65 3e 0a 09 3c 4d 65 74 72 6f 43 6f 64 65 3e 36 32 35 3c 2f 4d 65 74 72 6f 43 6f 64 65 3e 0a 3c 2f 52 65 73 70 6f 6e 73 65 3e 0a
                      Data Ascii: >Texas</RegionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>31.0065</Latitude><Longitude>-97.8406</Longitude><MetroCode>625</MetroCode></Response>


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      2192.168.2.549740188.114.97.34435788C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      TimestampBytes transferredDirectionData
                      2024-11-01 11:07:25 UTC87OUTGET /xml/173.254.250.82 HTTP/1.1
                      Host: reallyfreegeoip.org
                      Connection: Keep-Alive
                      2024-11-01 11:07:25 UTC1217INHTTP/1.1 200 OK
                      Date: Fri, 01 Nov 2024 11:07:25 GMT
                      Content-Type: text/xml
                      Content-Length: 359
                      Connection: close
                      x-amzn-requestid: dcb7f8fd-cb89-43da-858d-6f4f77c7b6b0
                      x-amzn-trace-id: Root=1-67244fb1-0547127a4d31c545397ac2c8;Parent=30ed2c4e00ab7389;Sampled=0;Lineage=1:fc9e8231:0
                      x-cache: Miss from cloudfront
                      via: 1.1 a271e07df9c41dd2c067133c2d7094f0.cloudfront.net (CloudFront)
                      x-amz-cf-pop: DFW57-P5
                      x-amz-cf-id: JJhBUDOUMs3p8bjG7il8adLMdGX07bMRaaR4wWJNrS_PeJVXxOHsgA==
                      Cache-Control: max-age=31536000
                      CF-Cache-Status: HIT
                      Age: 26300
                      Last-Modified: Fri, 01 Nov 2024 03:49:05 GMT
                      Accept-Ranges: bytes
                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mxyrxLPBYii9xCOress9Nw0BOby4erlG%2BWs1znTkZrFao4BXMGFEQXH3hYl0R701c55WEQDPzp%2FgRcDvRALpHqt2RgfNRu9gGU44Kagcm8d4IoeaIdzt3e25VEkhtbR6Ez%2BJ7Oz7"}],"group":"cf-nel","max_age":604800}
                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                      Server: cloudflare
                      CF-RAY: 8dbb6bceda27468c-DFW
                      alt-svc: h3=":443"; ma=86400
                      server-timing: cfL4;desc="?proto=TCP&rtt=1878&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=701&delivery_rate=1525816&cwnd=241&unsent_bytes=0&cid=1bca561a9662f8d1&ts=147&x=0"
                      2024-11-01 11:07:25 UTC152INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 32 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54
                      Data Ascii: <Response><IP>173.254.250.82</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>T
                      2024-11-01 11:07:25 UTC207INData Raw: 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 31 2e 30 30 36 35 3c 2f 4c 61 74 69 74 75 64 65 3e 0a 09 3c 4c 6f 6e 67 69 74 75 64 65 3e 2d 39 37 2e 38 34 30 36 3c 2f 4c 6f 6e 67 69 74 75 64 65 3e 0a 09 3c 4d 65 74 72 6f 43 6f 64 65 3e 36 32 35 3c 2f 4d 65 74 72 6f 43 6f 64 65 3e 0a 3c 2f 52 65 73 70 6f 6e 73 65 3e 0a
                      Data Ascii: exas</RegionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>31.0065</Latitude><Longitude>-97.8406</Longitude><MetroCode>625</MetroCode></Response>


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      3192.168.2.549755188.114.97.34435788C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      TimestampBytes transferredDirectionData
                      2024-11-01 11:07:28 UTC87OUTGET /xml/173.254.250.82 HTTP/1.1
                      Host: reallyfreegeoip.org
                      Connection: Keep-Alive
                      2024-11-01 11:07:28 UTC1217INHTTP/1.1 200 OK
                      Date: Fri, 01 Nov 2024 11:07:28 GMT
                      Content-Type: text/xml
                      Content-Length: 359
                      Connection: close
                      x-amzn-requestid: dcb7f8fd-cb89-43da-858d-6f4f77c7b6b0
                      x-amzn-trace-id: Root=1-67244fb1-0547127a4d31c545397ac2c8;Parent=30ed2c4e00ab7389;Sampled=0;Lineage=1:fc9e8231:0
                      x-cache: Miss from cloudfront
                      via: 1.1 a271e07df9c41dd2c067133c2d7094f0.cloudfront.net (CloudFront)
                      x-amz-cf-pop: DFW57-P5
                      x-amz-cf-id: JJhBUDOUMs3p8bjG7il8adLMdGX07bMRaaR4wWJNrS_PeJVXxOHsgA==
                      Cache-Control: max-age=31536000
                      CF-Cache-Status: HIT
                      Age: 26303
                      Last-Modified: Fri, 01 Nov 2024 03:49:05 GMT
                      Accept-Ranges: bytes
                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YHLxoFsCjssEzzecMlTIuPTtLd9tcE7fK6CJPtxdqPAHRzyhS7zsaylC%2F3RHFtHZWSWS3o%2B1AxYTw%2FrSAbajMqsMsXLfo7gKS8qKjl7wGj6YFeMsh5e3X4SyI9948vSQH1cSYT0R"}],"group":"cf-nel","max_age":604800}
                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                      Server: cloudflare
                      CF-RAY: 8dbb6bdf08766c55-DFW
                      alt-svc: h3=":443"; ma=86400
                      server-timing: cfL4;desc="?proto=TCP&rtt=1825&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=1573058&cwnd=244&unsent_bytes=0&cid=6ae13415ae66e51e&ts=157&x=0"
                      2024-11-01 11:07:28 UTC152INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 32 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54
                      Data Ascii: <Response><IP>173.254.250.82</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>T
                      2024-11-01 11:07:28 UTC207INData Raw: 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 31 2e 30 30 36 35 3c 2f 4c 61 74 69 74 75 64 65 3e 0a 09 3c 4c 6f 6e 67 69 74 75 64 65 3e 2d 39 37 2e 38 34 30 36 3c 2f 4c 6f 6e 67 69 74 75 64 65 3e 0a 09 3c 4d 65 74 72 6f 43 6f 64 65 3e 36 32 35 3c 2f 4d 65 74 72 6f 43 6f 64 65 3e 0a 3c 2f 52 65 73 70 6f 6e 73 65 3e 0a
                      Data Ascii: exas</RegionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>31.0065</Latitude><Longitude>-97.8406</Longitude><MetroCode>625</MetroCode></Response>


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      4192.168.2.549765188.114.97.34435788C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      TimestampBytes transferredDirectionData
                      2024-11-01 11:07:29 UTC87OUTGET /xml/173.254.250.82 HTTP/1.1
                      Host: reallyfreegeoip.org
                      Connection: Keep-Alive
                      2024-11-01 11:07:29 UTC1219INHTTP/1.1 200 OK
                      Date: Fri, 01 Nov 2024 11:07:29 GMT
                      Content-Type: text/xml
                      Content-Length: 359
                      Connection: close
                      x-amzn-requestid: dcb7f8fd-cb89-43da-858d-6f4f77c7b6b0
                      x-amzn-trace-id: Root=1-67244fb1-0547127a4d31c545397ac2c8;Parent=30ed2c4e00ab7389;Sampled=0;Lineage=1:fc9e8231:0
                      x-cache: Miss from cloudfront
                      via: 1.1 a271e07df9c41dd2c067133c2d7094f0.cloudfront.net (CloudFront)
                      x-amz-cf-pop: DFW57-P5
                      x-amz-cf-id: JJhBUDOUMs3p8bjG7il8adLMdGX07bMRaaR4wWJNrS_PeJVXxOHsgA==
                      Cache-Control: max-age=31536000
                      CF-Cache-Status: HIT
                      Age: 26304
                      Last-Modified: Fri, 01 Nov 2024 03:49:05 GMT
                      Accept-Ranges: bytes
                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jbI4tegZ7KujCJPTj3URKZzGO0d2acmmhftucogVX8Oi0tQBFs2O%2F%2Bo8PKKxmjIrZ63CEGLj4pGKL8WUeoB43H8SHQB98ax4%2B6Iz9Ul8XE4TbpvzoGiLorg%2FwLP5a0OkygHstFG5"}],"group":"cf-nel","max_age":604800}
                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                      Server: cloudflare
                      CF-RAY: 8dbb6be7dff74864-DFW
                      alt-svc: h3=":443"; ma=86400
                      server-timing: cfL4;desc="?proto=TCP&rtt=1092&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=2538124&cwnd=249&unsent_bytes=0&cid=2b8e23e15a068355&ts=148&x=0"
                      2024-11-01 11:07:29 UTC150INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 32 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65
                      Data Ascii: <Response><IP>173.254.250.82</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName
                      2024-11-01 11:07:29 UTC209INData Raw: 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 31 2e 30 30 36 35 3c 2f 4c 61 74 69 74 75 64 65 3e 0a 09 3c 4c 6f 6e 67 69 74 75 64 65 3e 2d 39 37 2e 38 34 30 36 3c 2f 4c 6f 6e 67 69 74 75 64 65 3e 0a 09 3c 4d 65 74 72 6f 43 6f 64 65 3e 36 32 35 3c 2f 4d 65 74 72 6f 43 6f 64 65 3e 0a 3c 2f 52 65 73 70 6f 6e 73 65 3e 0a
                      Data Ascii: >Texas</RegionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>31.0065</Latitude><Longitude>-97.8406</Longitude><MetroCode>625</MetroCode></Response>


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      5192.168.2.549772188.114.97.34435788C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      TimestampBytes transferredDirectionData
                      2024-11-01 11:07:31 UTC87OUTGET /xml/173.254.250.82 HTTP/1.1
                      Host: reallyfreegeoip.org
                      Connection: Keep-Alive
                      2024-11-01 11:07:31 UTC1223INHTTP/1.1 200 OK
                      Date: Fri, 01 Nov 2024 11:07:31 GMT
                      Content-Type: text/xml
                      Content-Length: 359
                      Connection: close
                      x-amzn-requestid: dcb7f8fd-cb89-43da-858d-6f4f77c7b6b0
                      x-amzn-trace-id: Root=1-67244fb1-0547127a4d31c545397ac2c8;Parent=30ed2c4e00ab7389;Sampled=0;Lineage=1:fc9e8231:0
                      x-cache: Miss from cloudfront
                      via: 1.1 a271e07df9c41dd2c067133c2d7094f0.cloudfront.net (CloudFront)
                      x-amz-cf-pop: DFW57-P5
                      x-amz-cf-id: JJhBUDOUMs3p8bjG7il8adLMdGX07bMRaaR4wWJNrS_PeJVXxOHsgA==
                      Cache-Control: max-age=31536000
                      CF-Cache-Status: HIT
                      Age: 26306
                      Last-Modified: Fri, 01 Nov 2024 03:49:05 GMT
                      Accept-Ranges: bytes
                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=C2rghGtebjfzukHyvS0SJ4nDOR3K%2F9cRcbnvnR%2BJHataTe8AcHz6rfbrMPCAyv8bw2ypf72PAwNN7SKUDFP5IxBZnX96dhhDlPRvpr%2BaW2V%2BDkn%2Bp958vyStddoYpC%2FjQnWytcXd"}],"group":"cf-nel","max_age":604800}
                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                      Server: cloudflare
                      CF-RAY: 8dbb6bf0beda2e5d-DFW
                      alt-svc: h3=":443"; ma=86400
                      server-timing: cfL4;desc="?proto=TCP&rtt=1362&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=701&delivery_rate=2100072&cwnd=250&unsent_bytes=0&cid=44bfe05cd978c079&ts=150&x=0"
                      2024-11-01 11:07:31 UTC146INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 32 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e
                      Data Ascii: <Response><IP>173.254.250.82</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><Region
                      2024-11-01 11:07:31 UTC213INData Raw: 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 31 2e 30 30 36 35 3c 2f 4c 61 74 69 74 75 64 65 3e 0a 09 3c 4c 6f 6e 67 69 74 75 64 65 3e 2d 39 37 2e 38 34 30 36 3c 2f 4c 6f 6e 67 69 74 75 64 65 3e 0a 09 3c 4d 65 74 72 6f 43 6f 64 65 3e 36 32 35 3c 2f 4d 65 74 72 6f 43 6f 64 65 3e 0a 3c 2f 52 65 73 70 6f 6e 73 65 3e 0a
                      Data Ascii: Name>Texas</RegionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>31.0065</Latitude><Longitude>-97.8406</Longitude><MetroCode>625</MetroCode></Response>


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      6192.168.2.549783188.114.97.34435788C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      TimestampBytes transferredDirectionData
                      2024-11-01 11:07:32 UTC87OUTGET /xml/173.254.250.82 HTTP/1.1
                      Host: reallyfreegeoip.org
                      Connection: Keep-Alive
                      2024-11-01 11:07:32 UTC1220INHTTP/1.1 200 OK
                      Date: Fri, 01 Nov 2024 11:07:32 GMT
                      Content-Type: text/xml
                      Content-Length: 359
                      Connection: close
                      x-amzn-requestid: dcb7f8fd-cb89-43da-858d-6f4f77c7b6b0
                      x-amzn-trace-id: Root=1-67244fb1-0547127a4d31c545397ac2c8;Parent=30ed2c4e00ab7389;Sampled=0;Lineage=1:fc9e8231:0
                      x-cache: Miss from cloudfront
                      via: 1.1 a271e07df9c41dd2c067133c2d7094f0.cloudfront.net (CloudFront)
                      x-amz-cf-pop: DFW57-P5
                      x-amz-cf-id: JJhBUDOUMs3p8bjG7il8adLMdGX07bMRaaR4wWJNrS_PeJVXxOHsgA==
                      Cache-Control: max-age=31536000
                      CF-Cache-Status: HIT
                      Age: 26307
                      Last-Modified: Fri, 01 Nov 2024 03:49:05 GMT
                      Accept-Ranges: bytes
                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=b%2FLC7B6bNy475jbGCYGi26gZr2nnrxmLXdgNyaqxYaQIZaGlxsLR9wb%2BvX9diRtfytIhADBpmSmRxmYhyv7D74kEFij2OR8%2Ffl4WR%2BPVJjqMBRFeO68W95EykVd%2B4SUSkrnAXgw7"}],"group":"cf-nel","max_age":604800}
                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                      Server: cloudflare
                      CF-RAY: 8dbb6bf988e36bb9-DFW
                      alt-svc: h3=":443"; ma=86400
                      server-timing: cfL4;desc="?proto=TCP&rtt=919&sent=4&recv=7&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=3103965&cwnd=251&unsent_bytes=0&cid=0e22d1cced4f064e&ts=146&x=0"
                      2024-11-01 11:07:32 UTC149INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 32 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d
                      Data Ascii: <Response><IP>173.254.250.82</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionNam
                      2024-11-01 11:07:32 UTC210INData Raw: 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 31 2e 30 30 36 35 3c 2f 4c 61 74 69 74 75 64 65 3e 0a 09 3c 4c 6f 6e 67 69 74 75 64 65 3e 2d 39 37 2e 38 34 30 36 3c 2f 4c 6f 6e 67 69 74 75 64 65 3e 0a 09 3c 4d 65 74 72 6f 43 6f 64 65 3e 36 32 35 3c 2f 4d 65 74 72 6f 43 6f 64 65 3e 0a 3c 2f 52 65 73 70 6f 6e 73 65 3e 0a
                      Data Ascii: e>Texas</RegionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>31.0065</Latitude><Longitude>-97.8406</Longitude><MetroCode>625</MetroCode></Response>


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      7192.168.2.549804188.114.97.34435788C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      TimestampBytes transferredDirectionData
                      2024-11-01 11:07:36 UTC87OUTGET /xml/173.254.250.82 HTTP/1.1
                      Host: reallyfreegeoip.org
                      Connection: Keep-Alive
                      2024-11-01 11:07:36 UTC1219INHTTP/1.1 200 OK
                      Date: Fri, 01 Nov 2024 11:07:36 GMT
                      Content-Type: text/xml
                      Content-Length: 359
                      Connection: close
                      x-amzn-requestid: dcb7f8fd-cb89-43da-858d-6f4f77c7b6b0
                      x-amzn-trace-id: Root=1-67244fb1-0547127a4d31c545397ac2c8;Parent=30ed2c4e00ab7389;Sampled=0;Lineage=1:fc9e8231:0
                      x-cache: Miss from cloudfront
                      via: 1.1 a271e07df9c41dd2c067133c2d7094f0.cloudfront.net (CloudFront)
                      x-amz-cf-pop: DFW57-P5
                      x-amz-cf-id: JJhBUDOUMs3p8bjG7il8adLMdGX07bMRaaR4wWJNrS_PeJVXxOHsgA==
                      Cache-Control: max-age=31536000
                      CF-Cache-Status: HIT
                      Age: 26311
                      Last-Modified: Fri, 01 Nov 2024 03:49:05 GMT
                      Accept-Ranges: bytes
                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nPjUkLjjklfgQF%2F2fDW532tXFXFb%2B8E2sHuIcoJhmeipFhomTJhsAAcrEvhyKkhpv8bSKeSsiQGULebcxuwZv0Fbw1f2%2FNB06t6tzR60Izd1Y1hxCrMo52ksQQjm%2B4q8E3wPwpT5"}],"group":"cf-nel","max_age":604800}
                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                      Server: cloudflare
                      CF-RAY: 8dbb6c0f09c13476-DFW
                      alt-svc: h3=":443"; ma=86400
                      server-timing: cfL4;desc="?proto=TCP&rtt=1233&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=2571936&cwnd=251&unsent_bytes=0&cid=f3bc93d15ba3b1c7&ts=148&x=0"
                      2024-11-01 11:07:36 UTC150INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 32 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65
                      Data Ascii: <Response><IP>173.254.250.82</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName
                      2024-11-01 11:07:36 UTC209INData Raw: 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 31 2e 30 30 36 35 3c 2f 4c 61 74 69 74 75 64 65 3e 0a 09 3c 4c 6f 6e 67 69 74 75 64 65 3e 2d 39 37 2e 38 34 30 36 3c 2f 4c 6f 6e 67 69 74 75 64 65 3e 0a 09 3c 4d 65 74 72 6f 43 6f 64 65 3e 36 32 35 3c 2f 4d 65 74 72 6f 43 6f 64 65 3e 0a 3c 2f 52 65 73 70 6f 6e 73 65 3e 0a
                      Data Ascii: >Texas</RegionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>31.0065</Latitude><Longitude>-97.8406</Longitude><MetroCode>625</MetroCode></Response>


                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:07:07:01
                      Start date:01/11/2024
                      Path:C:\Users\user\Desktop\Alvise Maria CV 1.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\Alvise Maria CV 1.exe"
                      Imagebase:0xd90000
                      File size:1'486'336 bytes
                      MD5 hash:3DC3BBEC8D0DE761F7992A0464409BA8
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.2222638088.0000000000CA0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                      Reputation:low
                      Has exited:true

                      Target ID:3
                      Start time:07:07:20
                      Start date:01/11/2024
                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\Alvise Maria CV 1.exe"
                      Imagebase:0xea0000
                      File size:45'984 bytes
                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000003.00000002.4496549990.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                      • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                      • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000003.00000002.4501145808.0000000005870000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.4498039618.0000000002FA4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000003.00000002.4498039618.0000000002FA4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000002.4498039618.0000000002FA4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000003.00000002.4498039618.0000000002FA4000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000003.00000002.4498039618.0000000002FA4000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000002.4498607513.0000000003547000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                      • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                      • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000003.00000002.4498248513.0000000003160000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.4500660567.0000000004311000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000003.00000002.4500660567.0000000004311000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000002.4500660567.0000000004311000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000003.00000002.4500660567.0000000004311000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                      • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000003.00000002.4500660567.0000000004311000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                      • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000002.4498607513.0000000003379000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high
                      Has exited:false

                      Reset < >

                        Execution Graph

                        Execution Coverage:2.7%
                        Dynamic/Decrypted Code Coverage:1.1%
                        Signature Coverage:5.3%
                        Total number of Nodes:1595
                        Total number of Limit Nodes:53
                        execution_graph 96760 db03fb 96761 db0407 ___BuildCatchObject 96760->96761 96789 dafeb1 96761->96789 96763 db040e 96764 db0561 96763->96764 96767 db0438 96763->96767 96816 db083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 96764->96816 96766 db0568 96817 db4e52 28 API calls _abort 96766->96817 96778 db0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 96767->96778 96800 dc247d 96767->96800 96769 db056e 96818 db4e04 28 API calls _abort 96769->96818 96773 db0576 96774 db0457 96776 db04d8 96808 db0959 96776->96808 96778->96776 96812 db4e1a 38 API calls 2 library calls 96778->96812 96780 db04de 96781 db04f3 96780->96781 96813 db0992 GetModuleHandleW 96781->96813 96783 db04fa 96783->96766 96784 db04fe 96783->96784 96785 db0507 96784->96785 96814 db4df5 28 API calls _abort 96784->96814 96815 db0040 13 API calls 2 library calls 96785->96815 96788 db050f 96788->96774 96790 dafeba 96789->96790 96819 db0698 IsProcessorFeaturePresent 96790->96819 96792 dafec6 96820 db2c94 10 API calls 3 library calls 96792->96820 96794 dafecb 96795 dafecf 96794->96795 96821 dc2317 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96794->96821 96795->96763 96797 dafed8 96798 dafee6 96797->96798 96822 db2cbd 8 API calls 3 library calls 96797->96822 96798->96763 96803 dc2494 96800->96803 96802 db0451 96802->96774 96804 dc2421 96802->96804 96823 db0a8c 96803->96823 96806 dc2450 96804->96806 96805 db0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 96807 dc2479 96805->96807 96806->96805 96807->96778 96831 db2340 96808->96831 96811 db097f 96811->96780 96812->96776 96813->96783 96814->96785 96815->96788 96816->96766 96817->96769 96818->96773 96819->96792 96820->96794 96821->96797 96822->96795 96824 db0a97 IsProcessorFeaturePresent 96823->96824 96825 db0a95 96823->96825 96827 db0c5d 96824->96827 96825->96802 96830 db0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96827->96830 96829 db0d40 96829->96802 96830->96829 96832 db096c GetStartupInfoW 96831->96832 96832->96811 96833 d91098 96838 d942de 96833->96838 96837 d910a7 96859 d9a961 96838->96859 96842 d94342 96845 d94378 96842->96845 96876 d993b2 96842->96876 96844 d9436c 96880 d937a0 96844->96880 96846 d9441b GetCurrentProcess IsWow64Process 96845->96846 96854 dd37df 96845->96854 96848 d94437 96846->96848 96849 d9444f LoadLibraryA 96848->96849 96850 dd3824 GetSystemInfo 96848->96850 96851 d9449c GetSystemInfo 96849->96851 96852 d94460 GetProcAddress 96849->96852 96853 d94476 96851->96853 96852->96851 96855 d94470 GetNativeSystemInfo 96852->96855 96856 d9447a FreeLibrary 96853->96856 96857 d9109d 96853->96857 96855->96853 96856->96857 96858 db00a3 29 API calls __onexit 96857->96858 96858->96837 96884 dafe0b 96859->96884 96861 d9a976 96894 dafddb 96861->96894 96863 d942f5 GetVersionExW 96864 d96b57 96863->96864 96865 dd4ba1 96864->96865 96866 d96b67 _wcslen 96864->96866 96867 d993b2 22 API calls 96865->96867 96869 d96b7d 96866->96869 96870 d96ba2 96866->96870 96868 dd4baa 96867->96868 96868->96868 96919 d96f34 22 API calls 96869->96919 96872 dafddb 22 API calls 96870->96872 96874 d96bae 96872->96874 96873 d96b85 __fread_nolock 96873->96842 96875 dafe0b 22 API calls 96874->96875 96875->96873 96877 d993c0 96876->96877 96878 d993c9 __fread_nolock 96876->96878 96877->96878 96920 d9aec9 96877->96920 96878->96844 96878->96878 96881 d937ae 96880->96881 96882 d993b2 22 API calls 96881->96882 96883 d937c2 96882->96883 96883->96845 96887 dafddb 96884->96887 96886 dafdfa 96886->96861 96887->96886 96889 dafdfc 96887->96889 96904 dbea0c 96887->96904 96911 db4ead 7 API calls 2 library calls 96887->96911 96890 db066d 96889->96890 96912 db32a4 RaiseException 96889->96912 96913 db32a4 RaiseException 96890->96913 96893 db068a 96893->96861 96897 dafde0 96894->96897 96895 dbea0c ___std_exception_copy 21 API calls 96895->96897 96896 dafdfa 96896->96863 96897->96895 96897->96896 96900 dafdfc 96897->96900 96916 db4ead 7 API calls 2 library calls 96897->96916 96899 db066d 96918 db32a4 RaiseException 96899->96918 96900->96899 96917 db32a4 RaiseException 96900->96917 96903 db068a 96903->96863 96906 dc3820 __dosmaperr 96904->96906 96905 dc385e 96915 dbf2d9 20 API calls __dosmaperr 96905->96915 96906->96905 96907 dc3849 RtlAllocateHeap 96906->96907 96914 db4ead 7 API calls 2 library calls 96906->96914 96907->96906 96909 dc385c 96907->96909 96909->96887 96911->96887 96912->96890 96913->96893 96914->96906 96915->96909 96916->96897 96917->96899 96918->96903 96919->96873 96921 d9aed9 __fread_nolock 96920->96921 96922 d9aedc 96920->96922 96921->96878 96923 dafddb 22 API calls 96922->96923 96924 d9aee7 96923->96924 96925 dafe0b 22 API calls 96924->96925 96925->96921 96926 d9105b 96931 d9344d 96926->96931 96928 d9106a 96962 db00a3 29 API calls __onexit 96928->96962 96930 d91074 96932 d9345d __wsopen_s 96931->96932 96933 d9a961 22 API calls 96932->96933 96934 d93513 96933->96934 96963 d93a5a 96934->96963 96936 d9351c 96970 d93357 96936->96970 96943 d9a961 22 API calls 96944 d9354d 96943->96944 96991 d9a6c3 96944->96991 96947 dd3176 RegQueryValueExW 96948 dd320c RegCloseKey 96947->96948 96949 dd3193 96947->96949 96951 d93578 96948->96951 96961 dd321e _wcslen 96948->96961 96950 dafe0b 22 API calls 96949->96950 96952 dd31ac 96950->96952 96951->96928 96997 d95722 96952->96997 96955 dd31d4 96956 d96b57 22 API calls 96955->96956 96958 dd31ee messages 96956->96958 96957 d94c6d 22 API calls 96957->96961 96958->96948 96960 d9515f 22 API calls 96960->96961 96961->96951 96961->96957 96961->96960 97000 d99cb3 96961->97000 96962->96930 97006 dd1f50 96963->97006 96966 d99cb3 22 API calls 96967 d93a8d 96966->96967 97008 d93aa2 96967->97008 96969 d93a97 96969->96936 96971 dd1f50 __wsopen_s 96970->96971 96972 d93364 GetFullPathNameW 96971->96972 96973 d93386 96972->96973 96974 d96b57 22 API calls 96973->96974 96975 d933a4 96974->96975 96976 d933c6 96975->96976 96977 d933dd 96976->96977 96978 dd30bb 96976->96978 97018 d933ee 96977->97018 96980 dafddb 22 API calls 96978->96980 96982 dd30c5 _wcslen 96980->96982 96981 d933e8 96985 d9515f 96981->96985 96983 dafe0b 22 API calls 96982->96983 96984 dd30fe __fread_nolock 96983->96984 96986 d9516e 96985->96986 96990 d9518f __fread_nolock 96985->96990 96989 dafe0b 22 API calls 96986->96989 96987 dafddb 22 API calls 96988 d93544 96987->96988 96988->96943 96989->96990 96990->96987 96992 d9a6dd 96991->96992 96996 d93556 RegOpenKeyExW 96991->96996 96993 dafddb 22 API calls 96992->96993 96994 d9a6e7 96993->96994 96995 dafe0b 22 API calls 96994->96995 96995->96996 96996->96947 96996->96951 96998 dafddb 22 API calls 96997->96998 96999 d95734 RegQueryValueExW 96998->96999 96999->96955 96999->96958 97001 d99cc2 _wcslen 97000->97001 97002 dafe0b 22 API calls 97001->97002 97003 d99cea __fread_nolock 97002->97003 97004 dafddb 22 API calls 97003->97004 97005 d99d00 97004->97005 97005->96961 97007 d93a67 GetModuleFileNameW 97006->97007 97007->96966 97009 dd1f50 __wsopen_s 97008->97009 97010 d93aaf GetFullPathNameW 97009->97010 97011 d93ae9 97010->97011 97012 d93ace 97010->97012 97014 d9a6c3 22 API calls 97011->97014 97013 d96b57 22 API calls 97012->97013 97015 d93ada 97013->97015 97014->97015 97016 d937a0 22 API calls 97015->97016 97017 d93ae6 97016->97017 97017->96969 97019 d933fe _wcslen 97018->97019 97020 dd311d 97019->97020 97021 d93411 97019->97021 97022 dafddb 22 API calls 97020->97022 97028 d9a587 97021->97028 97024 dd3127 97022->97024 97026 dafe0b 22 API calls 97024->97026 97025 d9341e __fread_nolock 97025->96981 97027 dd3157 __fread_nolock 97026->97027 97029 d9a59d 97028->97029 97032 d9a598 __fread_nolock 97028->97032 97030 ddf80f 97029->97030 97031 dafe0b 22 API calls 97029->97031 97031->97032 97032->97025 97033 d9f7bf 97034 d9f7d3 97033->97034 97035 d9fcb6 97033->97035 97037 d9fcc2 97034->97037 97038 dafddb 22 API calls 97034->97038 97125 d9aceb 23 API calls messages 97035->97125 97126 d9aceb 23 API calls messages 97037->97126 97040 d9f7e5 97038->97040 97040->97037 97041 d9fd3d 97040->97041 97042 d9f83e 97040->97042 97127 e01155 22 API calls 97041->97127 97060 d9ed9d messages 97042->97060 97068 da1310 97042->97068 97045 d9fef7 97045->97060 97129 d9a8c7 22 API calls __fread_nolock 97045->97129 97047 dafddb 22 API calls 97065 d9ec76 messages 97047->97065 97049 de4600 97049->97060 97128 d9a8c7 22 API calls __fread_nolock 97049->97128 97050 de4b0b 97131 e0359c 82 API calls __wsopen_s 97050->97131 97056 d9a8c7 22 API calls 97056->97065 97057 db0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 97057->97065 97058 d9fbe3 97058->97060 97061 de4bdc 97058->97061 97066 d9f3ae messages 97058->97066 97059 d9a961 22 API calls 97059->97065 97132 e0359c 82 API calls __wsopen_s 97061->97132 97063 de4beb 97133 e0359c 82 API calls __wsopen_s 97063->97133 97064 db00a3 29 API calls pre_c_initialization 97064->97065 97065->97045 97065->97047 97065->97049 97065->97050 97065->97056 97065->97057 97065->97058 97065->97059 97065->97060 97065->97063 97065->97064 97065->97066 97067 db01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 97065->97067 97123 da01e0 207 API calls 2 library calls 97065->97123 97124 da06a0 41 API calls messages 97065->97124 97066->97060 97130 e0359c 82 API calls __wsopen_s 97066->97130 97067->97065 97069 da17b0 97068->97069 97070 da1376 97068->97070 97235 db0242 5 API calls __Init_thread_wait 97069->97235 97072 da1390 97070->97072 97073 de6331 97070->97073 97134 da1940 97072->97134 97074 de633d 97073->97074 97240 e1709c 207 API calls 97073->97240 97074->97065 97076 da17ba 97078 da17fb 97076->97078 97080 d99cb3 22 API calls 97076->97080 97084 de6346 97078->97084 97085 da182c 97078->97085 97089 da17d4 97080->97089 97081 da1940 9 API calls 97082 da13b6 97081->97082 97082->97078 97083 da13ec 97082->97083 97083->97084 97094 da1408 __fread_nolock 97083->97094 97241 e0359c 82 API calls __wsopen_s 97084->97241 97237 d9aceb 23 API calls messages 97085->97237 97088 da1839 97238 dad217 207 API calls 97088->97238 97236 db01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97089->97236 97092 de636e 97242 e0359c 82 API calls __wsopen_s 97092->97242 97093 da1872 97239 dafaeb 23 API calls 97093->97239 97094->97088 97094->97092 97100 dafddb 22 API calls 97094->97100 97101 dafe0b 22 API calls 97094->97101 97108 da152f 97094->97108 97109 de63b2 97094->97109 97112 de6369 97094->97112 97210 d9ec40 97094->97210 97096 da153c 97099 da1940 9 API calls 97096->97099 97097 de63d1 97244 e15745 54 API calls _wcslen 97097->97244 97103 da1549 97099->97103 97100->97094 97101->97094 97102 de64fa 97102->97112 97246 e0359c 82 API calls __wsopen_s 97102->97246 97103->97102 97104 da1940 9 API calls 97103->97104 97110 da1563 97104->97110 97108->97096 97108->97097 97243 e0359c 82 API calls __wsopen_s 97109->97243 97110->97102 97115 da15c7 messages 97110->97115 97245 d9a8c7 22 API calls __fread_nolock 97110->97245 97112->97065 97114 da1940 9 API calls 97114->97115 97115->97093 97115->97102 97115->97112 97115->97114 97117 da167b messages 97115->97117 97144 e1958b 97115->97144 97147 d96246 97115->97147 97151 e083da 97115->97151 97154 e0744a 97115->97154 97116 da171d 97116->97065 97117->97116 97234 dace17 22 API calls messages 97117->97234 97123->97065 97124->97065 97125->97037 97126->97041 97127->97060 97128->97060 97129->97060 97130->97060 97131->97060 97132->97063 97133->97060 97135 da1981 97134->97135 97137 da195d 97134->97137 97247 db0242 5 API calls __Init_thread_wait 97135->97247 97136 da13a0 97136->97081 97137->97136 97249 db0242 5 API calls __Init_thread_wait 97137->97249 97140 da198b 97140->97137 97248 db01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97140->97248 97141 da8727 97141->97136 97250 db01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97141->97250 97251 e17f59 97144->97251 97146 e1959b 97146->97115 97148 d9625f 97147->97148 97149 d96250 97147->97149 97148->97149 97150 d96264 CloseHandle 97148->97150 97149->97115 97150->97149 97371 e098e3 97151->97371 97153 e083ea 97153->97115 97155 e07469 97154->97155 97156 e07474 97154->97156 97450 d9b567 39 API calls 97155->97450 97160 d9a961 22 API calls 97156->97160 97193 e07554 97156->97193 97158 dafddb 22 API calls 97159 e07587 97158->97159 97161 dafe0b 22 API calls 97159->97161 97162 e07495 97160->97162 97163 e07598 97161->97163 97164 d9a961 22 API calls 97162->97164 97166 d96246 CloseHandle 97163->97166 97165 e0749e 97164->97165 97167 d97510 53 API calls 97165->97167 97168 e075a3 97166->97168 97169 e074aa 97167->97169 97170 d9a961 22 API calls 97168->97170 97451 d9525f 22 API calls 97169->97451 97172 e075ab 97170->97172 97174 d96246 CloseHandle 97172->97174 97173 e074bf 97452 d96350 97173->97452 97176 e075b2 97174->97176 97178 d97510 53 API calls 97176->97178 97180 e075be 97178->97180 97179 e0754a 97463 d9b567 39 API calls 97179->97463 97182 d96246 CloseHandle 97180->97182 97185 e075c8 97182->97185 97184 e07502 97184->97179 97186 e07506 97184->97186 97187 d95745 5 API calls 97185->97187 97188 d99cb3 22 API calls 97186->97188 97189 e075e2 97187->97189 97190 e07513 97188->97190 97191 e075ea 97189->97191 97192 e076de GetLastError 97189->97192 97462 dfd2c1 26 API calls 97190->97462 97464 d953de 27 API calls messages 97191->97464 97195 e076f7 97192->97195 97193->97158 97208 e076a4 97193->97208 97467 d96216 CloseHandle messages 97195->97467 97198 e0751c 97198->97179 97199 e075f8 97465 d953c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 97199->97465 97201 e07645 97202 dafddb 22 API calls 97201->97202 97204 e07679 97202->97204 97203 e075ff 97203->97201 97205 dfccff 4 API calls 97203->97205 97206 d9a961 22 API calls 97204->97206 97205->97201 97207 e07686 97206->97207 97207->97208 97466 df417d 22 API calls __fread_nolock 97207->97466 97208->97115 97231 d9ec76 messages 97210->97231 97211 d9fef7 97226 d9ed9d messages 97211->97226 97483 d9a8c7 22 API calls __fread_nolock 97211->97483 97213 dafddb 22 API calls 97213->97231 97215 de4600 97215->97226 97482 d9a8c7 22 API calls __fread_nolock 97215->97482 97216 de4b0b 97485 e0359c 82 API calls __wsopen_s 97216->97485 97217 d9a8c7 22 API calls 97217->97231 97223 db0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 97223->97231 97224 d9fbe3 97224->97226 97227 de4bdc 97224->97227 97233 d9f3ae messages 97224->97233 97225 d9a961 22 API calls 97225->97231 97226->97094 97486 e0359c 82 API calls __wsopen_s 97227->97486 97229 db00a3 29 API calls pre_c_initialization 97229->97231 97230 de4beb 97487 e0359c 82 API calls __wsopen_s 97230->97487 97231->97211 97231->97213 97231->97215 97231->97216 97231->97217 97231->97223 97231->97224 97231->97225 97231->97226 97231->97229 97231->97230 97232 db01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 97231->97232 97231->97233 97480 da01e0 207 API calls 2 library calls 97231->97480 97481 da06a0 41 API calls messages 97231->97481 97232->97231 97233->97226 97484 e0359c 82 API calls __wsopen_s 97233->97484 97234->97117 97235->97076 97236->97078 97237->97088 97238->97093 97239->97093 97240->97074 97241->97112 97242->97112 97243->97112 97244->97110 97245->97115 97246->97112 97247->97140 97248->97137 97249->97141 97250->97136 97289 d97510 97251->97289 97255 e18281 97256 e1844f 97255->97256 97260 e1828f 97255->97260 97353 e18ee4 60 API calls 97256->97353 97259 e1845e 97259->97260 97261 e1846a 97259->97261 97325 e17e86 97260->97325 97276 e17fd5 messages 97261->97276 97262 d97510 53 API calls 97281 e18049 97262->97281 97267 e182c8 97340 dafc70 97267->97340 97270 e18302 97347 d963eb 22 API calls 97270->97347 97271 e182e8 97346 e0359c 82 API calls __wsopen_s 97271->97346 97274 e182f3 GetCurrentProcess TerminateProcess 97274->97270 97275 e18311 97348 d96a50 22 API calls 97275->97348 97276->97146 97278 e1832a 97288 e18352 97278->97288 97349 da04f0 22 API calls 97278->97349 97280 e184c5 97280->97276 97285 e184d9 FreeLibrary 97280->97285 97281->97255 97281->97262 97281->97276 97344 df417d 22 API calls __fread_nolock 97281->97344 97345 e1851d 42 API calls _strftime 97281->97345 97282 e18341 97350 e18b7b 75 API calls 97282->97350 97285->97276 97288->97280 97351 da04f0 22 API calls 97288->97351 97352 d9aceb 23 API calls messages 97288->97352 97354 e18b7b 75 API calls 97288->97354 97290 d97522 97289->97290 97291 d97525 97289->97291 97290->97276 97312 e18cd3 97290->97312 97292 d9755b 97291->97292 97293 d9752d 97291->97293 97294 dd50f6 97292->97294 97296 d9756d 97292->97296 97303 dd500f 97292->97303 97355 db51c6 26 API calls 97293->97355 97358 db5183 26 API calls 97294->97358 97356 dafb21 51 API calls 97296->97356 97297 d9753d 97302 dafddb 22 API calls 97297->97302 97300 dd510e 97300->97300 97304 d97547 97302->97304 97306 dafe0b 22 API calls 97303->97306 97311 dd5088 97303->97311 97305 d99cb3 22 API calls 97304->97305 97305->97290 97307 dd5058 97306->97307 97308 dafddb 22 API calls 97307->97308 97309 dd507f 97308->97309 97310 d99cb3 22 API calls 97309->97310 97310->97311 97357 dafb21 51 API calls 97311->97357 97313 d9aec9 22 API calls 97312->97313 97314 e18cee CharLowerBuffW 97313->97314 97359 df8e54 97314->97359 97318 d9a961 22 API calls 97319 e18d2a 97318->97319 97366 d96d25 22 API calls __fread_nolock 97319->97366 97320 e18e5e _wcslen 97320->97281 97322 e18d3e 97323 d993b2 22 API calls 97322->97323 97324 e18d48 _wcslen 97323->97324 97324->97320 97367 e1851d 42 API calls _strftime 97324->97367 97326 e17ea1 97325->97326 97327 e17eec 97325->97327 97328 dafe0b 22 API calls 97326->97328 97331 e19096 97327->97331 97329 e17ec3 97328->97329 97329->97327 97330 dafddb 22 API calls 97329->97330 97330->97329 97332 e192ab messages 97331->97332 97339 e190ba _strcat _wcslen 97331->97339 97332->97267 97333 d9b38f 39 API calls 97333->97339 97334 d9b567 39 API calls 97334->97339 97335 d9b6b5 39 API calls 97335->97339 97336 d97510 53 API calls 97336->97339 97337 dbea0c 21 API calls ___std_exception_copy 97337->97339 97339->97332 97339->97333 97339->97334 97339->97335 97339->97336 97339->97337 97370 dfefae 24 API calls _wcslen 97339->97370 97342 dafc85 97340->97342 97341 dafd1d VirtualProtect 97343 dafceb 97341->97343 97342->97341 97342->97343 97343->97270 97343->97271 97344->97281 97345->97281 97346->97274 97347->97275 97348->97278 97349->97282 97350->97288 97351->97288 97352->97288 97353->97259 97354->97288 97355->97297 97356->97297 97357->97294 97358->97300 97361 df8e74 _wcslen 97359->97361 97360 df8f63 97360->97318 97360->97324 97361->97360 97362 df8ea9 97361->97362 97363 df8f68 97361->97363 97362->97360 97368 dace60 41 API calls 97362->97368 97363->97360 97369 dace60 41 API calls 97363->97369 97366->97322 97367->97320 97368->97362 97369->97363 97370->97339 97372 e09902 97371->97372 97373 e099e8 97371->97373 97375 dafddb 22 API calls 97372->97375 97441 e09caa 39 API calls 97373->97441 97376 e09909 97375->97376 97377 dafe0b 22 API calls 97376->97377 97378 e0991a 97377->97378 97381 d96246 CloseHandle 97378->97381 97379 e099a2 97380 e09ac5 97379->97380 97382 e099ca 97379->97382 97388 e09a33 97379->97388 97422 e01e96 97380->97422 97384 e09925 97381->97384 97382->97153 97385 d9a961 22 API calls 97384->97385 97387 e0992d 97385->97387 97386 e09acc 97426 dfccff 97386->97426 97389 d96246 CloseHandle 97387->97389 97390 d97510 53 API calls 97388->97390 97391 e09934 97389->97391 97400 e09a3a 97390->97400 97393 d97510 53 API calls 97391->97393 97396 e09940 97393->97396 97394 e09abb 97445 dfcd57 30 API calls 97394->97445 97398 d96246 CloseHandle 97396->97398 97397 e09a6e 97442 d96270 22 API calls 97397->97442 97402 e0994a 97398->97402 97400->97394 97400->97397 97401 d96246 CloseHandle 97404 e09b1e 97401->97404 97430 d95745 97402->97430 97403 e09a7e 97406 e09a8e 97403->97406 97443 d9a8c7 22 API calls __fread_nolock 97403->97443 97446 d96216 CloseHandle messages 97404->97446 97410 d933c6 22 API calls 97406->97410 97413 e09a9c 97410->97413 97411 e099c2 97440 d96216 CloseHandle messages 97411->97440 97412 e0995d 97438 d953de 27 API calls messages 97412->97438 97444 dfcd57 30 API calls 97413->97444 97416 e09aa8 97416->97382 97416->97401 97418 e0996b 97439 d953c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 97418->97439 97420 e09972 97420->97379 97421 dfccff 4 API calls 97420->97421 97421->97379 97423 e01ea4 97422->97423 97424 e01e9f 97422->97424 97423->97386 97447 e00f67 24 API calls __fread_nolock 97424->97447 97427 dfcd0e 97426->97427 97428 dfcd19 WriteFile 97426->97428 97448 dfcc37 SetFilePointerEx SetFilePointerEx SetFilePointerEx 97427->97448 97428->97416 97431 d9575c CreateFileW 97430->97431 97432 dd4035 97430->97432 97433 d9577b 97431->97433 97432->97433 97434 dd403b CreateFileW 97432->97434 97433->97411 97433->97412 97434->97433 97435 dd4063 97434->97435 97449 d954c6 SetFilePointerEx SetFilePointerEx SetFilePointerEx 97435->97449 97437 dd406e 97437->97433 97438->97418 97439->97420 97440->97382 97441->97379 97442->97403 97443->97406 97444->97416 97445->97416 97446->97382 97447->97423 97448->97428 97449->97437 97450->97156 97451->97173 97453 d96362 97452->97453 97454 dd4a51 97452->97454 97468 d96373 97453->97468 97478 d94a88 22 API calls __fread_nolock 97454->97478 97457 d9636e 97457->97179 97461 dfd4ce lstrlenW GetFileAttributesW FindFirstFileW FindClose 97457->97461 97458 dd4a5b 97459 dd4a67 97458->97459 97479 d9a8c7 22 API calls __fread_nolock 97458->97479 97461->97184 97462->97198 97463->97193 97464->97199 97465->97203 97466->97208 97467->97208 97469 d96382 97468->97469 97474 d963b6 __fread_nolock 97468->97474 97470 dd4a82 97469->97470 97471 d963a9 97469->97471 97469->97474 97473 dafddb 22 API calls 97470->97473 97472 d9a587 22 API calls 97471->97472 97472->97474 97475 dd4a91 97473->97475 97474->97457 97476 dafe0b 22 API calls 97475->97476 97477 dd4ac5 __fread_nolock 97476->97477 97478->97458 97479->97459 97480->97231 97481->97231 97482->97226 97483->97226 97484->97226 97485->97226 97486->97230 97487->97226 97488 37023f8 97502 3700048 97488->97502 97490 370250e 97505 37022e8 97490->97505 97492 3702537 CreateFileW 97494 3702589 97492->97494 97495 370258e 97492->97495 97495->97494 97496 37025a8 VirtualAlloc 97495->97496 97496->97494 97497 37025c6 ReadFile 97496->97497 97497->97494 97498 37025e4 97497->97498 97499 37012e8 13 API calls 97498->97499 97500 3702617 97499->97500 97501 370263a ExitProcess 97500->97501 97501->97494 97508 3703548 GetPEB 97502->97508 97504 37006d3 97504->97490 97506 37022f1 Sleep 97505->97506 97507 37022ff 97506->97507 97509 3703572 97508->97509 97509->97504 97510 d91033 97515 d94c91 97510->97515 97514 d91042 97516 d9a961 22 API calls 97515->97516 97517 d94cff 97516->97517 97523 d93af0 97517->97523 97520 d94d9c 97521 d91038 97520->97521 97526 d951f7 22 API calls __fread_nolock 97520->97526 97522 db00a3 29 API calls __onexit 97521->97522 97522->97514 97527 d93b1c 97523->97527 97526->97520 97528 d93b29 97527->97528 97529 d93b0f 97527->97529 97528->97529 97530 d93b30 RegOpenKeyExW 97528->97530 97529->97520 97530->97529 97531 d93b4a RegQueryValueExW 97530->97531 97532 d93b6b 97531->97532 97533 d93b80 RegCloseKey 97531->97533 97532->97533 97533->97529 97534 de3f75 97545 daceb1 97534->97545 97536 de3f8b 97537 de4006 97536->97537 97612 dae300 23 API calls 97536->97612 97554 d9bf40 97537->97554 97539 de3fe6 97543 de4052 97539->97543 97613 e01abf 22 API calls 97539->97613 97542 de4a88 97543->97542 97614 e0359c 82 API calls __wsopen_s 97543->97614 97546 dacebf 97545->97546 97547 daced2 97545->97547 97615 d9aceb 23 API calls messages 97546->97615 97548 daced7 97547->97548 97549 dacf05 97547->97549 97551 dafddb 22 API calls 97548->97551 97616 d9aceb 23 API calls messages 97549->97616 97553 dacec9 97551->97553 97553->97536 97617 d9adf0 97554->97617 97556 d9bf9d 97557 d9bfa9 97556->97557 97558 de04b6 97556->97558 97560 de04c6 97557->97560 97561 d9c01e 97557->97561 97636 e0359c 82 API calls __wsopen_s 97558->97636 97637 e0359c 82 API calls __wsopen_s 97560->97637 97622 d9ac91 97561->97622 97564 df7120 22 API calls 97596 d9c039 __fread_nolock messages 97564->97596 97565 d9c7da 97570 dafe0b 22 API calls 97565->97570 97566 de09bf 97611 d9c603 97566->97611 97652 e0359c 82 API calls __wsopen_s 97566->97652 97576 d9c808 __fread_nolock 97570->97576 97572 de04f5 97577 de055a 97572->97577 97638 dad217 207 API calls 97572->97638 97575 d9af8a 22 API calls 97575->97596 97579 dafe0b 22 API calls 97576->97579 97577->97611 97639 e0359c 82 API calls __wsopen_s 97577->97639 97578 de091a 97649 e03209 23 API calls 97578->97649 97598 d9c350 __fread_nolock messages 97579->97598 97582 d9ec40 207 API calls 97582->97596 97583 de08a5 97584 d9ec40 207 API calls 97583->97584 97585 de08cf 97584->97585 97585->97611 97647 d9a81b 41 API calls 97585->97647 97587 de0591 97640 e0359c 82 API calls __wsopen_s 97587->97640 97590 de08f6 97648 e0359c 82 API calls __wsopen_s 97590->97648 97593 d9c3ac 97593->97543 97594 d9c237 97597 d9c253 97594->97597 97650 d9a8c7 22 API calls __fread_nolock 97594->97650 97596->97564 97596->97565 97596->97566 97596->97572 97596->97575 97596->97576 97596->97577 97596->97578 97596->97582 97596->97583 97596->97587 97596->97590 97596->97594 97603 dafddb 22 API calls 97596->97603 97608 d9bbe0 40 API calls 97596->97608 97610 dafe0b 22 API calls 97596->97610 97596->97611 97626 d9ad81 97596->97626 97641 df7099 22 API calls __fread_nolock 97596->97641 97642 e15745 54 API calls _wcslen 97596->97642 97643 daaa42 22 API calls messages 97596->97643 97644 dff05c 40 API calls 97596->97644 97645 d9a993 41 API calls 97596->97645 97646 d9aceb 23 API calls messages 97596->97646 97600 de0976 97597->97600 97604 d9c297 messages 97597->97604 97598->97593 97635 dace17 22 API calls messages 97598->97635 97651 d9aceb 23 API calls messages 97600->97651 97603->97596 97604->97566 97633 d9aceb 23 API calls messages 97604->97633 97606 d9c335 97606->97566 97607 d9c342 97606->97607 97634 d9a704 22 API calls messages 97607->97634 97608->97596 97610->97596 97611->97543 97612->97539 97613->97537 97614->97542 97615->97553 97616->97553 97618 d9ae01 97617->97618 97621 d9ae1c messages 97617->97621 97619 d9aec9 22 API calls 97618->97619 97620 d9ae09 CharUpperBuffW 97619->97620 97620->97621 97621->97556 97624 d9acae 97622->97624 97623 d9acd1 97623->97596 97624->97623 97653 e0359c 82 API calls __wsopen_s 97624->97653 97627 ddfadb 97626->97627 97628 d9ad92 97626->97628 97629 dafddb 22 API calls 97628->97629 97630 d9ad99 97629->97630 97654 d9adcd 97630->97654 97633->97606 97634->97598 97635->97598 97636->97560 97637->97611 97638->97577 97639->97611 97640->97611 97641->97596 97642->97596 97643->97596 97644->97596 97645->97596 97646->97596 97647->97590 97648->97611 97649->97594 97650->97597 97651->97566 97652->97611 97653->97623 97660 d9addd 97654->97660 97655 d9adb6 97655->97596 97656 dafddb 22 API calls 97656->97660 97657 d9a961 22 API calls 97657->97660 97659 d9adcd 22 API calls 97659->97660 97660->97655 97660->97656 97660->97657 97660->97659 97661 d9a8c7 22 API calls __fread_nolock 97660->97661 97661->97660 97662 d92e37 97663 d9a961 22 API calls 97662->97663 97664 d92e4d 97663->97664 97741 d94ae3 97664->97741 97666 d92e6b 97667 d93a5a 24 API calls 97666->97667 97668 d92e7f 97667->97668 97669 d99cb3 22 API calls 97668->97669 97670 d92e8c 97669->97670 97755 d94ecb 97670->97755 97673 d92ead 97777 d9a8c7 22 API calls __fread_nolock 97673->97777 97674 dd2cb0 97795 e02cf9 97674->97795 97676 dd2cc3 97678 dd2ccf 97676->97678 97821 d94f39 97676->97821 97682 d94f39 68 API calls 97678->97682 97679 d92ec3 97778 d96f88 22 API calls 97679->97778 97684 dd2ce5 97682->97684 97683 d92ecf 97685 d99cb3 22 API calls 97683->97685 97827 d93084 22 API calls 97684->97827 97686 d92edc 97685->97686 97779 d9a81b 41 API calls 97686->97779 97689 d92eec 97691 d99cb3 22 API calls 97689->97691 97690 dd2d02 97828 d93084 22 API calls 97690->97828 97692 d92f12 97691->97692 97780 d9a81b 41 API calls 97692->97780 97695 dd2d1e 97696 d93a5a 24 API calls 97695->97696 97697 dd2d44 97696->97697 97829 d93084 22 API calls 97697->97829 97698 d92f21 97701 d9a961 22 API calls 97698->97701 97700 dd2d50 97830 d9a8c7 22 API calls __fread_nolock 97700->97830 97703 d92f3f 97701->97703 97781 d93084 22 API calls 97703->97781 97704 dd2d5e 97831 d93084 22 API calls 97704->97831 97707 d92f4b 97782 db4a28 40 API calls 3 library calls 97707->97782 97708 dd2d6d 97832 d9a8c7 22 API calls __fread_nolock 97708->97832 97710 d92f59 97710->97684 97711 d92f63 97710->97711 97783 db4a28 40 API calls 3 library calls 97711->97783 97714 d92f6e 97714->97690 97716 d92f78 97714->97716 97715 dd2d83 97833 d93084 22 API calls 97715->97833 97784 db4a28 40 API calls 3 library calls 97716->97784 97719 dd2d90 97720 d92f83 97720->97695 97721 d92f8d 97720->97721 97785 db4a28 40 API calls 3 library calls 97721->97785 97723 d92f98 97724 d92fdc 97723->97724 97786 d93084 22 API calls 97723->97786 97724->97708 97725 d92fe8 97724->97725 97725->97719 97789 d963eb 22 API calls 97725->97789 97728 d92fbf 97787 d9a8c7 22 API calls __fread_nolock 97728->97787 97729 d92ff8 97790 d96a50 22 API calls 97729->97790 97732 d92fcd 97788 d93084 22 API calls 97732->97788 97733 d93006 97791 d970b0 23 API calls 97733->97791 97738 d93021 97739 d93065 97738->97739 97792 d96f88 22 API calls 97738->97792 97793 d970b0 23 API calls 97738->97793 97794 d93084 22 API calls 97738->97794 97742 d94af0 __wsopen_s 97741->97742 97743 d96b57 22 API calls 97742->97743 97744 d94b22 97742->97744 97743->97744 97753 d94b58 97744->97753 97834 d94c6d 97744->97834 97746 d99cb3 22 API calls 97748 d94c52 97746->97748 97747 d99cb3 22 API calls 97747->97753 97749 d9515f 22 API calls 97748->97749 97751 d94c5e 97749->97751 97750 d9515f 22 API calls 97750->97753 97751->97666 97752 d94c29 97752->97746 97752->97751 97753->97747 97753->97750 97753->97752 97754 d94c6d 22 API calls 97753->97754 97754->97753 97837 d94e90 LoadLibraryA 97755->97837 97760 dd3ccf 97763 d94f39 68 API calls 97760->97763 97761 d94ef6 LoadLibraryExW 97845 d94e59 LoadLibraryA 97761->97845 97765 dd3cd6 97763->97765 97767 d94e59 3 API calls 97765->97767 97769 dd3cde 97767->97769 97768 d94f20 97768->97769 97770 d94f2c 97768->97770 97867 d950f5 97769->97867 97771 d94f39 68 API calls 97770->97771 97773 d92ea5 97771->97773 97773->97673 97773->97674 97776 dd3d05 97777->97679 97778->97683 97779->97689 97780->97698 97781->97707 97782->97710 97783->97714 97784->97720 97785->97723 97786->97728 97787->97732 97788->97724 97789->97729 97790->97733 97791->97738 97792->97738 97793->97738 97794->97738 97796 e02d15 97795->97796 97797 d9511f 64 API calls 97796->97797 97798 e02d29 97797->97798 98007 e02e66 97798->98007 97801 d950f5 40 API calls 97802 e02d56 97801->97802 97803 d950f5 40 API calls 97802->97803 97804 e02d66 97803->97804 97805 d950f5 40 API calls 97804->97805 97806 e02d81 97805->97806 97807 d950f5 40 API calls 97806->97807 97808 e02d9c 97807->97808 97809 d9511f 64 API calls 97808->97809 97810 e02db3 97809->97810 97811 dbea0c ___std_exception_copy 21 API calls 97810->97811 97812 e02dba 97811->97812 97813 dbea0c ___std_exception_copy 21 API calls 97812->97813 97814 e02dc4 97813->97814 97815 d950f5 40 API calls 97814->97815 97816 e02dd8 97815->97816 97817 e028fe 27 API calls 97816->97817 97819 e02dee 97817->97819 97818 e02d3f 97818->97676 97819->97818 98013 e022ce 97819->98013 97822 d94f4a 97821->97822 97823 d94f43 97821->97823 97825 d94f59 97822->97825 97826 d94f6a FreeLibrary 97822->97826 97824 dbe678 67 API calls 97823->97824 97824->97822 97825->97678 97826->97825 97827->97690 97828->97695 97829->97700 97830->97704 97831->97708 97832->97715 97833->97719 97835 d9aec9 22 API calls 97834->97835 97836 d94c78 97835->97836 97836->97744 97838 d94ea8 GetProcAddress 97837->97838 97839 d94ec6 97837->97839 97840 d94eb8 97838->97840 97842 dbe5eb 97839->97842 97840->97839 97841 d94ebf FreeLibrary 97840->97841 97841->97839 97875 dbe52a 97842->97875 97844 d94eea 97844->97760 97844->97761 97846 d94e8d 97845->97846 97847 d94e6e GetProcAddress 97845->97847 97850 d94f80 97846->97850 97848 d94e7e 97847->97848 97848->97846 97849 d94e86 FreeLibrary 97848->97849 97849->97846 97851 dafe0b 22 API calls 97850->97851 97852 d94f95 97851->97852 97853 d95722 22 API calls 97852->97853 97854 d94fa1 __fread_nolock 97853->97854 97855 dd3d1d 97854->97855 97856 d950a5 97854->97856 97866 d94fdc 97854->97866 97947 e0304d 74 API calls 97855->97947 97936 d942a2 CreateStreamOnHGlobal 97856->97936 97859 dd3d22 97861 d9511f 64 API calls 97859->97861 97860 d950f5 40 API calls 97860->97866 97862 dd3d45 97861->97862 97863 d950f5 40 API calls 97862->97863 97865 d9506e messages 97863->97865 97865->97768 97866->97859 97866->97860 97866->97865 97942 d9511f 97866->97942 97868 dd3d70 97867->97868 97869 d95107 97867->97869 97969 dbe8c4 97869->97969 97872 e028fe 97990 e0274e 97872->97990 97874 e02919 97874->97776 97877 dbe536 ___BuildCatchObject 97875->97877 97876 dbe544 97900 dbf2d9 20 API calls __dosmaperr 97876->97900 97877->97876 97879 dbe574 97877->97879 97881 dbe579 97879->97881 97882 dbe586 97879->97882 97880 dbe549 97901 dc27ec 26 API calls __wsopen_s 97880->97901 97902 dbf2d9 20 API calls __dosmaperr 97881->97902 97892 dc8061 97882->97892 97886 dbe58f 97887 dbe595 97886->97887 97889 dbe5a2 97886->97889 97903 dbf2d9 20 API calls __dosmaperr 97887->97903 97904 dbe5d4 LeaveCriticalSection __fread_nolock 97889->97904 97891 dbe554 __wsopen_s 97891->97844 97893 dc806d ___BuildCatchObject 97892->97893 97905 dc2f5e EnterCriticalSection 97893->97905 97895 dc807b 97906 dc80fb 97895->97906 97899 dc80ac __wsopen_s 97899->97886 97900->97880 97901->97891 97902->97891 97903->97891 97904->97891 97905->97895 97914 dc811e 97906->97914 97907 dc8177 97925 dc4c7d 20 API calls __dosmaperr 97907->97925 97909 dc8180 97926 dc29c8 97909->97926 97912 dc8189 97915 dc8088 97912->97915 97932 dc3405 11 API calls 2 library calls 97912->97932 97914->97907 97914->97915 97923 db918d EnterCriticalSection 97914->97923 97924 db91a1 LeaveCriticalSection 97914->97924 97920 dc80b7 97915->97920 97916 dc81a8 97933 db918d EnterCriticalSection 97916->97933 97919 dc81bb 97919->97915 97935 dc2fa6 LeaveCriticalSection 97920->97935 97922 dc80be 97922->97899 97923->97914 97924->97914 97925->97909 97927 dc29fc __dosmaperr 97926->97927 97928 dc29d3 RtlFreeHeap 97926->97928 97927->97912 97928->97927 97929 dc29e8 97928->97929 97934 dbf2d9 20 API calls __dosmaperr 97929->97934 97931 dc29ee GetLastError 97931->97927 97932->97916 97933->97919 97934->97931 97935->97922 97937 d942d9 97936->97937 97938 d942bc FindResourceExW 97936->97938 97937->97866 97938->97937 97939 dd35ba LoadResource 97938->97939 97939->97937 97940 dd35cf SizeofResource 97939->97940 97940->97937 97941 dd35e3 LockResource 97940->97941 97941->97937 97943 d9512e 97942->97943 97946 dd3d90 97942->97946 97948 dbece3 97943->97948 97947->97859 97951 dbeaaa 97948->97951 97950 d9513c 97950->97866 97955 dbeab6 ___BuildCatchObject 97951->97955 97952 dbeac2 97964 dbf2d9 20 API calls __dosmaperr 97952->97964 97954 dbeae8 97966 db918d EnterCriticalSection 97954->97966 97955->97952 97955->97954 97957 dbeac7 97965 dc27ec 26 API calls __wsopen_s 97957->97965 97958 dbeaf4 97967 dbec0a 62 API calls 2 library calls 97958->97967 97961 dbeb08 97968 dbeb27 LeaveCriticalSection __fread_nolock 97961->97968 97963 dbead2 __wsopen_s 97963->97950 97964->97957 97965->97963 97966->97958 97967->97961 97968->97963 97972 dbe8e1 97969->97972 97971 d95118 97971->97872 97973 dbe8ed ___BuildCatchObject 97972->97973 97974 dbe92d 97973->97974 97975 dbe900 ___scrt_fastfail 97973->97975 97977 dbe925 __wsopen_s 97973->97977 97987 db918d EnterCriticalSection 97974->97987 97985 dbf2d9 20 API calls __dosmaperr 97975->97985 97977->97971 97978 dbe937 97988 dbe6f8 38 API calls 4 library calls 97978->97988 97981 dbe91a 97986 dc27ec 26 API calls __wsopen_s 97981->97986 97982 dbe94e 97989 dbe96c LeaveCriticalSection __fread_nolock 97982->97989 97985->97981 97986->97977 97987->97978 97988->97982 97989->97977 97993 dbe4e8 97990->97993 97992 e0275d 97992->97874 97996 dbe469 97993->97996 97995 dbe505 97995->97992 97997 dbe478 97996->97997 97998 dbe48c 97996->97998 98004 dbf2d9 20 API calls __dosmaperr 97997->98004 98003 dbe488 __alldvrm 97998->98003 98006 dc333f 11 API calls 2 library calls 97998->98006 98000 dbe47d 98005 dc27ec 26 API calls __wsopen_s 98000->98005 98003->97995 98004->98000 98005->98003 98006->98003 98012 e02e7a 98007->98012 98008 d950f5 40 API calls 98008->98012 98009 e02d3b 98009->97801 98009->97818 98010 e028fe 27 API calls 98010->98012 98011 d9511f 64 API calls 98011->98012 98012->98008 98012->98009 98012->98010 98012->98011 98014 e022e7 98013->98014 98015 e022d9 98013->98015 98017 e0232c 98014->98017 98018 dbe5eb 29 API calls 98014->98018 98029 e022f0 98014->98029 98016 dbe5eb 29 API calls 98015->98016 98016->98014 98042 e02557 40 API calls __fread_nolock 98017->98042 98019 e02311 98018->98019 98019->98017 98021 e0231a 98019->98021 98021->98029 98050 dbe678 98021->98050 98022 e02370 98023 e02374 98022->98023 98024 e02395 98022->98024 98025 e02381 98023->98025 98028 dbe678 67 API calls 98023->98028 98043 e02171 98024->98043 98025->98029 98031 dbe678 67 API calls 98025->98031 98028->98025 98029->97818 98030 e0239d 98032 e023c3 98030->98032 98033 e023a3 98030->98033 98031->98029 98063 e023f3 74 API calls 98032->98063 98035 dbe678 67 API calls 98033->98035 98037 e023b0 98033->98037 98035->98037 98036 dbe678 67 API calls 98036->98029 98037->98029 98037->98036 98038 e023ca 98039 e023de 98038->98039 98040 dbe678 67 API calls 98038->98040 98039->98029 98041 dbe678 67 API calls 98039->98041 98040->98039 98041->98029 98042->98022 98044 dbea0c ___std_exception_copy 21 API calls 98043->98044 98045 e0217f 98044->98045 98046 dbea0c ___std_exception_copy 21 API calls 98045->98046 98047 e02190 98046->98047 98048 dbea0c ___std_exception_copy 21 API calls 98047->98048 98049 e0219c 98048->98049 98049->98030 98051 dbe684 ___BuildCatchObject 98050->98051 98052 dbe6aa 98051->98052 98053 dbe695 98051->98053 98062 dbe6a5 __wsopen_s 98052->98062 98064 db918d EnterCriticalSection 98052->98064 98081 dbf2d9 20 API calls __dosmaperr 98053->98081 98056 dbe69a 98082 dc27ec 26 API calls __wsopen_s 98056->98082 98057 dbe6c6 98065 dbe602 98057->98065 98060 dbe6d1 98083 dbe6ee LeaveCriticalSection __fread_nolock 98060->98083 98062->98029 98063->98038 98064->98057 98066 dbe60f 98065->98066 98067 dbe624 98065->98067 98116 dbf2d9 20 API calls __dosmaperr 98066->98116 98072 dbe61f 98067->98072 98084 dbdc0b 98067->98084 98069 dbe614 98117 dc27ec 26 API calls __wsopen_s 98069->98117 98072->98060 98077 dbe646 98101 dc862f 98077->98101 98080 dc29c8 _free 20 API calls 98080->98072 98081->98056 98082->98062 98083->98062 98085 dbdc23 98084->98085 98089 dbdc1f 98084->98089 98086 dbd955 __fread_nolock 26 API calls 98085->98086 98085->98089 98087 dbdc43 98086->98087 98118 dc59be 62 API calls 3 library calls 98087->98118 98090 dc4d7a 98089->98090 98091 dc4d90 98090->98091 98093 dbe640 98090->98093 98092 dc29c8 _free 20 API calls 98091->98092 98091->98093 98092->98093 98094 dbd955 98093->98094 98095 dbd961 98094->98095 98096 dbd976 98094->98096 98119 dbf2d9 20 API calls __dosmaperr 98095->98119 98096->98077 98098 dbd966 98120 dc27ec 26 API calls __wsopen_s 98098->98120 98100 dbd971 98100->98077 98102 dc863e 98101->98102 98103 dc8653 98101->98103 98124 dbf2c6 20 API calls __dosmaperr 98102->98124 98105 dc868e 98103->98105 98109 dc867a 98103->98109 98126 dbf2c6 20 API calls __dosmaperr 98105->98126 98106 dc8643 98125 dbf2d9 20 API calls __dosmaperr 98106->98125 98121 dc8607 98109->98121 98110 dc8693 98127 dbf2d9 20 API calls __dosmaperr 98110->98127 98113 dc869b 98128 dc27ec 26 API calls __wsopen_s 98113->98128 98114 dbe64c 98114->98072 98114->98080 98116->98069 98117->98072 98118->98089 98119->98098 98120->98100 98129 dc8585 98121->98129 98123 dc862b 98123->98114 98124->98106 98125->98114 98126->98110 98127->98113 98128->98114 98130 dc8591 ___BuildCatchObject 98129->98130 98140 dc5147 EnterCriticalSection 98130->98140 98132 dc859f 98133 dc85c6 98132->98133 98134 dc85d1 98132->98134 98141 dc86ae 98133->98141 98156 dbf2d9 20 API calls __dosmaperr 98134->98156 98137 dc85cc 98157 dc85fb LeaveCriticalSection __wsopen_s 98137->98157 98139 dc85ee __wsopen_s 98139->98123 98140->98132 98158 dc53c4 98141->98158 98143 dc86c4 98171 dc5333 21 API calls 2 library calls 98143->98171 98145 dc86be 98145->98143 98146 dc86f6 98145->98146 98149 dc53c4 __wsopen_s 26 API calls 98145->98149 98146->98143 98147 dc53c4 __wsopen_s 26 API calls 98146->98147 98150 dc8702 CloseHandle 98147->98150 98148 dc871c 98151 dc873e 98148->98151 98172 dbf2a3 20 API calls __dosmaperr 98148->98172 98152 dc86ed 98149->98152 98150->98143 98153 dc870e GetLastError 98150->98153 98151->98137 98155 dc53c4 __wsopen_s 26 API calls 98152->98155 98153->98143 98155->98146 98156->98137 98157->98139 98159 dc53e6 98158->98159 98160 dc53d1 98158->98160 98165 dc540b 98159->98165 98175 dbf2c6 20 API calls __dosmaperr 98159->98175 98173 dbf2c6 20 API calls __dosmaperr 98160->98173 98162 dc53d6 98174 dbf2d9 20 API calls __dosmaperr 98162->98174 98165->98145 98166 dc5416 98176 dbf2d9 20 API calls __dosmaperr 98166->98176 98167 dc53de 98167->98145 98169 dc541e 98177 dc27ec 26 API calls __wsopen_s 98169->98177 98171->98148 98172->98151 98173->98162 98174->98167 98175->98166 98176->98169 98177->98167 98178 d93156 98181 d93170 98178->98181 98182 d93187 98181->98182 98183 d931eb 98182->98183 98184 d9318c 98182->98184 98222 d931e9 98182->98222 98186 dd2dfb 98183->98186 98187 d931f1 98183->98187 98188 d93199 98184->98188 98189 d93265 PostQuitMessage 98184->98189 98185 d931d0 DefWindowProcW 98190 d9316a 98185->98190 98237 d918e2 10 API calls 98186->98237 98191 d931f8 98187->98191 98192 d9321d SetTimer RegisterWindowMessageW 98187->98192 98194 dd2e7c 98188->98194 98195 d931a4 98188->98195 98189->98190 98197 dd2d9c 98191->98197 98198 d93201 KillTimer 98191->98198 98192->98190 98200 d93246 CreatePopupMenu 98192->98200 98242 dfbf30 34 API calls ___scrt_fastfail 98194->98242 98201 dd2e68 98195->98201 98202 d931ae 98195->98202 98206 dd2dd7 MoveWindow 98197->98206 98207 dd2da1 98197->98207 98233 d930f2 Shell_NotifyIconW ___scrt_fastfail 98198->98233 98199 dd2e1c 98238 dae499 42 API calls 98199->98238 98200->98190 98226 dfc161 98201->98226 98203 dd2e4d 98202->98203 98204 d931b9 98202->98204 98203->98185 98241 df0ad7 22 API calls 98203->98241 98211 d931c4 98204->98211 98212 d93253 98204->98212 98205 dd2e8e 98205->98185 98205->98190 98206->98190 98213 dd2da7 98207->98213 98214 dd2dc6 SetFocus 98207->98214 98211->98185 98239 d930f2 Shell_NotifyIconW ___scrt_fastfail 98211->98239 98235 d9326f 44 API calls ___scrt_fastfail 98212->98235 98213->98211 98217 dd2db0 98213->98217 98214->98190 98215 d93214 98234 d93c50 DeleteObject DestroyWindow 98215->98234 98236 d918e2 10 API calls 98217->98236 98220 d93263 98220->98190 98222->98185 98224 dd2e41 98240 d93837 49 API calls ___scrt_fastfail 98224->98240 98227 dfc179 ___scrt_fastfail 98226->98227 98228 dfc276 98226->98228 98243 d93923 98227->98243 98228->98190 98230 dfc25f KillTimer SetTimer 98230->98228 98231 dfc1a0 98231->98230 98232 dfc251 Shell_NotifyIconW 98231->98232 98232->98230 98233->98215 98234->98190 98235->98220 98236->98190 98237->98199 98238->98211 98239->98224 98240->98222 98241->98222 98242->98205 98244 d9393f 98243->98244 98245 d93a13 98243->98245 98265 d96270 22 API calls 98244->98265 98245->98231 98247 d9394d 98248 d9395a 98247->98248 98249 dd3393 LoadStringW 98247->98249 98250 d96b57 22 API calls 98248->98250 98251 dd33ad 98249->98251 98252 d9396f 98250->98252 98259 d93994 ___scrt_fastfail 98251->98259 98266 d9a8c7 22 API calls __fread_nolock 98251->98266 98253 dd33c9 98252->98253 98254 d9397c 98252->98254 98257 d96350 22 API calls 98253->98257 98254->98251 98256 d93986 98254->98256 98258 d96350 22 API calls 98256->98258 98260 dd33d7 98257->98260 98258->98259 98262 d939f9 Shell_NotifyIconW 98259->98262 98260->98259 98261 d933c6 22 API calls 98260->98261 98263 dd33f9 98261->98263 98262->98245 98264 d933c6 22 API calls 98263->98264 98264->98259 98265->98247 98266->98259 98267 d91cad SystemParametersInfoW 98268 dd2ba5 98269 dd2baf 98268->98269 98270 d92b25 98268->98270 98272 d93a5a 24 API calls 98269->98272 98296 d92b83 7 API calls 98270->98296 98274 dd2bb8 98272->98274 98276 d99cb3 22 API calls 98274->98276 98278 dd2bc6 98276->98278 98277 d92b2f 98286 d92b44 98277->98286 98300 d93837 49 API calls ___scrt_fastfail 98277->98300 98279 dd2bce 98278->98279 98280 dd2bf5 98278->98280 98283 d933c6 22 API calls 98279->98283 98281 d933c6 22 API calls 98280->98281 98295 dd2bf1 GetForegroundWindow ShellExecuteW 98281->98295 98284 dd2bd9 98283->98284 98287 d96350 22 API calls 98284->98287 98290 d92b5f 98286->98290 98301 d930f2 Shell_NotifyIconW ___scrt_fastfail 98286->98301 98289 dd2be7 98287->98289 98292 d933c6 22 API calls 98289->98292 98293 d92b66 SetCurrentDirectoryW 98290->98293 98291 dd2c26 98291->98290 98292->98295 98294 d92b7a 98293->98294 98295->98291 98302 d92cd4 7 API calls 98296->98302 98298 d92b2a 98299 d92c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 98298->98299 98299->98277 98300->98286 98301->98290 98302->98298 98303 d9ddc0 98306 d9aa19 98303->98306 98305 d9ddcc 98307 d9aa3a 98306->98307 98314 d9aa8f 98306->98314 98309 d9ec40 207 API calls 98307->98309 98307->98314 98311 d9aa6b 98309->98311 98310 ddf907 98310->98310 98312 d9aabe 98311->98312 98315 d9aceb 23 API calls messages 98311->98315 98312->98305 98314->98312 98316 e0359c 82 API calls __wsopen_s 98314->98316 98315->98314 98316->98310 98317 d92de3 98318 d92df0 __wsopen_s 98317->98318 98319 d92e09 98318->98319 98320 dd2c2b ___scrt_fastfail 98318->98320 98321 d93aa2 23 API calls 98319->98321 98322 dd2c47 GetOpenFileNameW 98320->98322 98323 d92e12 98321->98323 98324 dd2c96 98322->98324 98333 d92da5 98323->98333 98326 d96b57 22 API calls 98324->98326 98328 dd2cab 98326->98328 98328->98328 98330 d92e27 98351 d944a8 98330->98351 98334 dd1f50 __wsopen_s 98333->98334 98335 d92db2 GetLongPathNameW 98334->98335 98336 d96b57 22 API calls 98335->98336 98337 d92dda 98336->98337 98338 d93598 98337->98338 98339 d9a961 22 API calls 98338->98339 98340 d935aa 98339->98340 98341 d93aa2 23 API calls 98340->98341 98342 d935b5 98341->98342 98343 dd32eb 98342->98343 98344 d935c0 98342->98344 98349 dd330d 98343->98349 98387 dace60 41 API calls 98343->98387 98345 d9515f 22 API calls 98344->98345 98347 d935cc 98345->98347 98381 d935f3 98347->98381 98350 d935df 98350->98330 98352 d94ecb 94 API calls 98351->98352 98353 d944cd 98352->98353 98354 dd3833 98353->98354 98355 d94ecb 94 API calls 98353->98355 98356 e02cf9 80 API calls 98354->98356 98357 d944e1 98355->98357 98358 dd3848 98356->98358 98357->98354 98359 d944e9 98357->98359 98360 dd384c 98358->98360 98361 dd3869 98358->98361 98363 dd3854 98359->98363 98364 d944f5 98359->98364 98365 d94f39 68 API calls 98360->98365 98362 dafe0b 22 API calls 98361->98362 98380 dd38ae 98362->98380 98406 dfda5a 82 API calls 98363->98406 98405 d9940c 136 API calls 2 library calls 98364->98405 98365->98363 98368 d92e31 98369 dd3862 98369->98361 98370 dd3a5f 98375 dd3a67 98370->98375 98371 d94f39 68 API calls 98371->98375 98375->98371 98409 df989b 82 API calls __wsopen_s 98375->98409 98377 d99cb3 22 API calls 98377->98380 98380->98370 98380->98375 98380->98377 98388 df967e 98380->98388 98391 d9a4a1 98380->98391 98399 d93ff7 98380->98399 98407 df95ad 42 API calls _wcslen 98380->98407 98408 e00b5a 22 API calls 98380->98408 98382 d93605 98381->98382 98386 d93624 __fread_nolock 98381->98386 98385 dafe0b 22 API calls 98382->98385 98383 dafddb 22 API calls 98384 d9363b 98383->98384 98384->98350 98385->98386 98386->98383 98387->98343 98389 dafe0b 22 API calls 98388->98389 98390 df96ae __fread_nolock 98389->98390 98390->98380 98392 d9a52b 98391->98392 98396 d9a4b1 __fread_nolock 98391->98396 98394 dafe0b 22 API calls 98392->98394 98393 dafddb 22 API calls 98395 d9a4b8 98393->98395 98394->98396 98397 dafddb 22 API calls 98395->98397 98398 d9a4d6 98395->98398 98396->98393 98397->98398 98398->98380 98400 d9400a 98399->98400 98402 d940ae 98399->98402 98401 dafe0b 22 API calls 98400->98401 98404 d9403c 98400->98404 98401->98404 98402->98380 98403 dafddb 22 API calls 98403->98404 98404->98402 98404->98403 98405->98368 98406->98369 98407->98380 98408->98380 98409->98375 98410 d9dee5 98413 d9b710 98410->98413 98414 d9b72b 98413->98414 98415 de00f8 98414->98415 98416 de0146 98414->98416 98443 d9b750 98414->98443 98419 de0102 98415->98419 98422 de010f 98415->98422 98415->98443 98455 e158a2 207 API calls 2 library calls 98416->98455 98453 e15d33 207 API calls 98419->98453 98439 d9ba20 98422->98439 98454 e161d0 207 API calls 2 library calls 98422->98454 98423 dad336 40 API calls 98423->98443 98426 de03d9 98426->98426 98428 d9bbe0 40 API calls 98428->98443 98431 d9ba4e 98432 de0322 98459 e15c0c 82 API calls 98432->98459 98439->98431 98460 e0359c 82 API calls __wsopen_s 98439->98460 98440 d9ec40 207 API calls 98440->98443 98443->98423 98443->98428 98443->98431 98443->98432 98443->98439 98443->98440 98444 d9a81b 41 API calls 98443->98444 98445 dad2f0 40 API calls 98443->98445 98446 daa01b 207 API calls 98443->98446 98447 db0242 5 API calls __Init_thread_wait 98443->98447 98448 daedcd 22 API calls 98443->98448 98449 db00a3 29 API calls __onexit 98443->98449 98450 db01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98443->98450 98451 daee53 82 API calls 98443->98451 98452 dae5ca 207 API calls 98443->98452 98456 d9aceb 23 API calls messages 98443->98456 98457 def6bf 23 API calls 98443->98457 98458 d9a8c7 22 API calls __fread_nolock 98443->98458 98444->98443 98445->98443 98446->98443 98447->98443 98448->98443 98449->98443 98450->98443 98451->98443 98452->98443 98453->98422 98454->98439 98455->98443 98456->98443 98457->98443 98458->98443 98459->98439 98460->98426 98461 d91044 98466 d910f3 98461->98466 98463 d9104a 98502 db00a3 29 API calls __onexit 98463->98502 98465 d91054 98503 d91398 98466->98503 98470 d9116a 98471 d9a961 22 API calls 98470->98471 98472 d91174 98471->98472 98473 d9a961 22 API calls 98472->98473 98474 d9117e 98473->98474 98475 d9a961 22 API calls 98474->98475 98476 d91188 98475->98476 98477 d9a961 22 API calls 98476->98477 98478 d911c6 98477->98478 98479 d9a961 22 API calls 98478->98479 98480 d91292 98479->98480 98513 d9171c 98480->98513 98484 d912c4 98485 d9a961 22 API calls 98484->98485 98486 d912ce 98485->98486 98487 da1940 9 API calls 98486->98487 98488 d912f9 98487->98488 98534 d91aab 98488->98534 98490 d91315 98491 d91325 GetStdHandle 98490->98491 98492 d9137a 98491->98492 98493 dd2485 98491->98493 98496 d91387 OleInitialize 98492->98496 98493->98492 98494 dd248e 98493->98494 98495 dafddb 22 API calls 98494->98495 98497 dd2495 98495->98497 98496->98463 98541 e0011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 98497->98541 98499 dd249e 98542 e00944 CreateThread 98499->98542 98501 dd24aa CloseHandle 98501->98492 98502->98465 98543 d913f1 98503->98543 98506 d913f1 22 API calls 98507 d913d0 98506->98507 98508 d9a961 22 API calls 98507->98508 98509 d913dc 98508->98509 98510 d96b57 22 API calls 98509->98510 98511 d91129 98510->98511 98512 d91bc3 6 API calls 98511->98512 98512->98470 98514 d9a961 22 API calls 98513->98514 98515 d9172c 98514->98515 98516 d9a961 22 API calls 98515->98516 98517 d91734 98516->98517 98518 d9a961 22 API calls 98517->98518 98519 d9174f 98518->98519 98520 dafddb 22 API calls 98519->98520 98521 d9129c 98520->98521 98522 d91b4a 98521->98522 98523 d91b58 98522->98523 98524 d9a961 22 API calls 98523->98524 98525 d91b63 98524->98525 98526 d9a961 22 API calls 98525->98526 98527 d91b6e 98526->98527 98528 d9a961 22 API calls 98527->98528 98529 d91b79 98528->98529 98530 d9a961 22 API calls 98529->98530 98531 d91b84 98530->98531 98532 dafddb 22 API calls 98531->98532 98533 d91b96 RegisterWindowMessageW 98532->98533 98533->98484 98535 dd272d 98534->98535 98536 d91abb 98534->98536 98550 e03209 23 API calls 98535->98550 98538 dafddb 22 API calls 98536->98538 98540 d91ac3 98538->98540 98539 dd2738 98540->98490 98541->98499 98542->98501 98551 e0092a 28 API calls 98542->98551 98544 d9a961 22 API calls 98543->98544 98545 d913fc 98544->98545 98546 d9a961 22 API calls 98545->98546 98547 d91404 98546->98547 98548 d9a961 22 API calls 98547->98548 98549 d913c6 98548->98549 98549->98506 98550->98539 98552 de2a00 98566 d9d7b0 messages 98552->98566 98553 d9db11 PeekMessageW 98553->98566 98554 d9d807 GetInputState 98554->98553 98554->98566 98556 de1cbe TranslateAcceleratorW 98556->98566 98557 d9da04 timeGetTime 98557->98566 98558 d9db8f PeekMessageW 98558->98566 98559 d9db73 TranslateMessage DispatchMessageW 98559->98558 98560 d9dbaf Sleep 98574 d9dbc0 98560->98574 98561 de2b74 Sleep 98561->98574 98562 dae551 timeGetTime 98562->98574 98563 de1dda timeGetTime 98619 dae300 23 API calls 98563->98619 98566->98553 98566->98554 98566->98556 98566->98557 98566->98558 98566->98559 98566->98560 98566->98561 98566->98563 98573 d9d9d5 98566->98573 98580 d9ec40 207 API calls 98566->98580 98581 da1310 207 API calls 98566->98581 98582 d9bf40 207 API calls 98566->98582 98584 d9dd50 98566->98584 98591 d9dfd0 98566->98591 98614 daedf6 98566->98614 98620 e03a2a 23 API calls 98566->98620 98621 e0359c 82 API calls __wsopen_s 98566->98621 98567 de2c0b GetExitCodeProcess 98569 de2c37 CloseHandle 98567->98569 98570 de2c21 WaitForSingleObject 98567->98570 98569->98574 98570->98566 98570->98569 98571 de2a31 98571->98573 98572 e229bf GetForegroundWindow 98572->98574 98574->98562 98574->98566 98574->98567 98574->98571 98574->98572 98574->98573 98575 de2ca9 Sleep 98574->98575 98622 e15658 23 API calls 98574->98622 98623 dfe97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 98574->98623 98624 dfd4dc 47 API calls 98574->98624 98575->98566 98580->98566 98581->98566 98582->98566 98585 d9dd6f 98584->98585 98586 d9dd83 98584->98586 98625 d9d260 98585->98625 98657 e0359c 82 API calls __wsopen_s 98586->98657 98588 d9dd7a 98588->98566 98590 de2f75 98590->98590 98592 d9e010 98591->98592 98603 d9e0dc messages 98592->98603 98668 db0242 5 API calls __Init_thread_wait 98592->98668 98595 de2fca 98597 d9a961 22 API calls 98595->98597 98595->98603 98596 d9a961 22 API calls 98596->98603 98598 de2fe4 98597->98598 98669 db00a3 29 API calls __onexit 98598->98669 98602 de2fee 98670 db01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98602->98670 98603->98596 98606 d9ec40 207 API calls 98603->98606 98607 e0359c 82 API calls 98603->98607 98610 da04f0 22 API calls 98603->98610 98611 d9e3e1 98603->98611 98665 d9a8c7 22 API calls __fread_nolock 98603->98665 98666 d9a81b 41 API calls 98603->98666 98667 daa308 207 API calls 98603->98667 98671 db0242 5 API calls __Init_thread_wait 98603->98671 98672 db00a3 29 API calls __onexit 98603->98672 98673 db01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98603->98673 98674 e147d4 207 API calls 98603->98674 98675 e168c1 207 API calls 98603->98675 98606->98603 98607->98603 98610->98603 98611->98566 98615 daee09 98614->98615 98616 daee12 98614->98616 98615->98566 98616->98615 98617 daee36 IsDialogMessageW 98616->98617 98618 deefaf GetClassLongW 98616->98618 98617->98615 98617->98616 98618->98616 98618->98617 98619->98566 98620->98566 98621->98566 98622->98574 98623->98574 98624->98574 98626 d9ec40 207 API calls 98625->98626 98630 d9d29d 98626->98630 98627 de1bc4 98664 e0359c 82 API calls __wsopen_s 98627->98664 98629 d9d6d5 98632 d9d30b messages 98629->98632 98641 dafe0b 22 API calls 98629->98641 98630->98627 98630->98629 98631 d9d3c3 98630->98631 98630->98632 98637 d9d4b8 98630->98637 98646 dafddb 22 API calls 98630->98646 98652 d9d429 __fread_nolock messages 98630->98652 98631->98629 98634 d9d3ce 98631->98634 98632->98588 98633 d9d5ff 98635 de1bb5 98633->98635 98636 d9d614 98633->98636 98638 dafddb 22 API calls 98634->98638 98663 e15705 23 API calls 98635->98663 98640 dafddb 22 API calls 98636->98640 98643 dafe0b 22 API calls 98637->98643 98642 d9d3d5 __fread_nolock 98638->98642 98650 d9d46a 98640->98650 98641->98642 98644 dafddb 22 API calls 98642->98644 98645 d9d3f6 98642->98645 98643->98652 98644->98645 98645->98652 98658 d9bec0 207 API calls 98645->98658 98646->98630 98648 de1ba4 98662 e0359c 82 API calls __wsopen_s 98648->98662 98650->98588 98652->98633 98652->98648 98652->98650 98653 de1b7f 98652->98653 98655 de1b5d 98652->98655 98659 d91f6f 207 API calls 98652->98659 98661 e0359c 82 API calls __wsopen_s 98653->98661 98660 e0359c 82 API calls __wsopen_s 98655->98660 98657->98590 98658->98652 98659->98652 98660->98650 98661->98650 98662->98650 98663->98627 98664->98632 98665->98603 98666->98603 98667->98603 98668->98595 98669->98602 98670->98603 98671->98603 98672->98603 98673->98603 98674->98603 98675->98603 98676 dc8402 98681 dc81be 98676->98681 98679 dc842a 98686 dc81ef try_get_first_available_module 98681->98686 98683 dc83ee 98700 dc27ec 26 API calls __wsopen_s 98683->98700 98685 dc8343 98685->98679 98693 dd0984 98685->98693 98686->98686 98689 dc8338 98686->98689 98696 db8e0b 40 API calls 2 library calls 98686->98696 98688 dc838c 98688->98689 98697 db8e0b 40 API calls 2 library calls 98688->98697 98689->98685 98699 dbf2d9 20 API calls __dosmaperr 98689->98699 98691 dc83ab 98691->98689 98698 db8e0b 40 API calls 2 library calls 98691->98698 98701 dd0081 98693->98701 98695 dd099f 98695->98679 98696->98688 98697->98691 98698->98689 98699->98683 98700->98685 98704 dd008d ___BuildCatchObject 98701->98704 98702 dd009b 98759 dbf2d9 20 API calls __dosmaperr 98702->98759 98704->98702 98706 dd00d4 98704->98706 98705 dd00a0 98760 dc27ec 26 API calls __wsopen_s 98705->98760 98712 dd065b 98706->98712 98711 dd00aa __wsopen_s 98711->98695 98762 dd042f 98712->98762 98715 dd068d 98794 dbf2c6 20 API calls __dosmaperr 98715->98794 98716 dd06a6 98780 dc5221 98716->98780 98719 dd0692 98795 dbf2d9 20 API calls __dosmaperr 98719->98795 98720 dd06ab 98721 dd06cb 98720->98721 98722 dd06b4 98720->98722 98793 dd039a CreateFileW 98721->98793 98796 dbf2c6 20 API calls __dosmaperr 98722->98796 98726 dd06b9 98797 dbf2d9 20 API calls __dosmaperr 98726->98797 98727 dd00f8 98761 dd0121 LeaveCriticalSection __wsopen_s 98727->98761 98729 dd0781 GetFileType 98730 dd078c GetLastError 98729->98730 98731 dd07d3 98729->98731 98800 dbf2a3 20 API calls __dosmaperr 98730->98800 98802 dc516a 21 API calls 2 library calls 98731->98802 98732 dd0756 GetLastError 98799 dbf2a3 20 API calls __dosmaperr 98732->98799 98734 dd0704 98734->98729 98734->98732 98798 dd039a CreateFileW 98734->98798 98736 dd079a CloseHandle 98736->98719 98738 dd07c3 98736->98738 98801 dbf2d9 20 API calls __dosmaperr 98738->98801 98740 dd0749 98740->98729 98740->98732 98742 dd07f4 98744 dd0840 98742->98744 98803 dd05ab 72 API calls 3 library calls 98742->98803 98743 dd07c8 98743->98719 98748 dd086d 98744->98748 98804 dd014d 72 API calls 4 library calls 98744->98804 98747 dd0866 98747->98748 98749 dd087e 98747->98749 98750 dc86ae __wsopen_s 29 API calls 98748->98750 98749->98727 98751 dd08fc CloseHandle 98749->98751 98750->98727 98805 dd039a CreateFileW 98751->98805 98753 dd0927 98754 dd0931 GetLastError 98753->98754 98758 dd095d 98753->98758 98806 dbf2a3 20 API calls __dosmaperr 98754->98806 98756 dd093d 98807 dc5333 21 API calls 2 library calls 98756->98807 98758->98727 98759->98705 98760->98711 98761->98711 98763 dd046a 98762->98763 98764 dd0450 98762->98764 98808 dd03bf 98763->98808 98764->98763 98815 dbf2d9 20 API calls __dosmaperr 98764->98815 98767 dd045f 98816 dc27ec 26 API calls __wsopen_s 98767->98816 98769 dd04a2 98770 dd04d1 98769->98770 98817 dbf2d9 20 API calls __dosmaperr 98769->98817 98779 dd0524 98770->98779 98819 dbd70d 26 API calls 2 library calls 98770->98819 98773 dd051f 98775 dd059e 98773->98775 98773->98779 98774 dd04c6 98818 dc27ec 26 API calls __wsopen_s 98774->98818 98820 dc27fc 11 API calls _abort 98775->98820 98778 dd05aa 98779->98715 98779->98716 98781 dc522d ___BuildCatchObject 98780->98781 98823 dc2f5e EnterCriticalSection 98781->98823 98783 dc527b 98824 dc532a 98783->98824 98784 dc5259 98827 dc5000 21 API calls 3 library calls 98784->98827 98786 dc52a4 __wsopen_s 98786->98720 98788 dc5234 98788->98783 98788->98784 98790 dc52c7 EnterCriticalSection 98788->98790 98789 dc525e 98789->98783 98828 dc5147 EnterCriticalSection 98789->98828 98790->98783 98791 dc52d4 LeaveCriticalSection 98790->98791 98791->98788 98793->98734 98794->98719 98795->98727 98796->98726 98797->98719 98798->98740 98799->98719 98800->98736 98801->98743 98802->98742 98803->98744 98804->98747 98805->98753 98806->98756 98807->98758 98811 dd03d7 98808->98811 98809 dd03f2 98809->98769 98811->98809 98821 dbf2d9 20 API calls __dosmaperr 98811->98821 98812 dd0416 98822 dc27ec 26 API calls __wsopen_s 98812->98822 98814 dd0421 98814->98769 98815->98767 98816->98763 98817->98774 98818->98770 98819->98773 98820->98778 98821->98812 98822->98814 98823->98788 98829 dc2fa6 LeaveCriticalSection 98824->98829 98826 dc5331 98826->98786 98827->98789 98828->98783 98829->98826 98830 de3a41 98834 e010c0 98830->98834 98832 de3a4c 98833 e010c0 53 API calls 98832->98833 98833->98832 98839 e010fa 98834->98839 98842 e010cd 98834->98842 98835 e010fc 98846 dafa11 53 API calls 98835->98846 98836 e01101 98838 d97510 53 API calls 98836->98838 98840 e01108 98838->98840 98839->98832 98841 d96350 22 API calls 98840->98841 98841->98839 98842->98835 98842->98836 98842->98839 98843 e010f4 98842->98843 98845 d9b270 39 API calls 98843->98845 98845->98839 98846->98836

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 234 d942de-d9434d call d9a961 GetVersionExW call d96b57 239 dd3617-dd362a 234->239 240 d94353 234->240 241 dd362b-dd362f 239->241 242 d94355-d94357 240->242 243 dd3631 241->243 244 dd3632-dd363e 241->244 245 d9435d-d943bc call d993b2 call d937a0 242->245 246 dd3656 242->246 243->244 244->241 247 dd3640-dd3642 244->247 263 dd37df-dd37e6 245->263 264 d943c2-d943c4 245->264 250 dd365d-dd3660 246->250 247->242 249 dd3648-dd364f 247->249 249->239 252 dd3651 249->252 253 d9441b-d94435 GetCurrentProcess IsWow64Process 250->253 254 dd3666-dd36a8 250->254 252->246 256 d94494-d9449a 253->256 257 d94437 253->257 254->253 258 dd36ae-dd36b1 254->258 260 d9443d-d94449 256->260 257->260 261 dd36db-dd36e5 258->261 262 dd36b3-dd36bd 258->262 270 d9444f-d9445e LoadLibraryA 260->270 271 dd3824-dd3828 GetSystemInfo 260->271 266 dd36f8-dd3702 261->266 267 dd36e7-dd36f3 261->267 272 dd36bf-dd36c5 262->272 273 dd36ca-dd36d6 262->273 268 dd37e8 263->268 269 dd3806-dd3809 263->269 264->250 265 d943ca-d943dd 264->265 274 d943e3-d943e5 265->274 275 dd3726-dd372f 265->275 277 dd3715-dd3721 266->277 278 dd3704-dd3710 266->278 267->253 276 dd37ee 268->276 279 dd380b-dd381a 269->279 280 dd37f4-dd37fc 269->280 281 d9449c-d944a6 GetSystemInfo 270->281 282 d94460-d9446e GetProcAddress 270->282 272->253 273->253 284 dd374d-dd3762 274->284 285 d943eb-d943ee 274->285 286 dd373c-dd3748 275->286 287 dd3731-dd3737 275->287 276->280 277->253 278->253 279->276 288 dd381c-dd3822 279->288 280->269 283 d94476-d94478 281->283 282->281 289 d94470-d94474 GetNativeSystemInfo 282->289 294 d9447a-d9447b FreeLibrary 283->294 295 d94481-d94493 283->295 292 dd376f-dd377b 284->292 293 dd3764-dd376a 284->293 290 dd3791-dd3794 285->290 291 d943f4-d9440f 285->291 286->253 287->253 288->280 289->283 290->253 298 dd379a-dd37c1 290->298 296 d94415 291->296 297 dd3780-dd378c 291->297 292->253 293->253 294->295 296->253 297->253 299 dd37ce-dd37da 298->299 300 dd37c3-dd37c9 298->300 299->253 300->253
                        APIs
                        • GetVersionExW.KERNEL32(?), ref: 00D9430D
                          • Part of subcall function 00D96B57: _wcslen.LIBCMT ref: 00D96B6A
                        • GetCurrentProcess.KERNEL32(?,00E2CB64,00000000,?,?), ref: 00D94422
                        • IsWow64Process.KERNEL32(00000000,?,?), ref: 00D94429
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00D94454
                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00D94466
                        • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00D94474
                        • FreeLibrary.KERNEL32(00000000,?,?), ref: 00D9447B
                        • GetSystemInfo.KERNEL32(?,?,?), ref: 00D944A0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                        • String ID: GetNativeSystemInfo$kernel32.dll$|O
                        • API String ID: 3290436268-3101561225
                        • Opcode ID: 498f2d94b338319a58ca42d2731e510082a121daa865ba50726a65b69b1a87a9
                        • Instruction ID: 8b7efe7c50620cea5641a8a75923519c7ec92e9a1032f77eb273ffb531e022b4
                        • Opcode Fuzzy Hash: 498f2d94b338319a58ca42d2731e510082a121daa865ba50726a65b69b1a87a9
                        • Instruction Fuzzy Hash: 06A1656598A6C0DFCB13C76BBC4159A7FA46B36780B1E54E9D083B7722D2E0450DCB72

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1270 d942a2-d942ba CreateStreamOnHGlobal 1271 d942da-d942dd 1270->1271 1272 d942bc-d942d3 FindResourceExW 1270->1272 1273 d942d9 1272->1273 1274 dd35ba-dd35c9 LoadResource 1272->1274 1273->1271 1274->1273 1275 dd35cf-dd35dd SizeofResource 1274->1275 1275->1273 1276 dd35e3-dd35ee LockResource 1275->1276 1276->1273 1277 dd35f4-dd35fc 1276->1277 1278 dd3600-dd3612 1277->1278 1278->1273
                        APIs
                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00D950AA,?,?,00000000,00000000), ref: 00D942B2
                        • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00D950AA,?,?,00000000,00000000), ref: 00D942C9
                        • LoadResource.KERNEL32(?,00000000,?,?,00D950AA,?,?,00000000,00000000,?,?,?,?,?,?,00D94F20), ref: 00DD35BE
                        • SizeofResource.KERNEL32(?,00000000,?,?,00D950AA,?,?,00000000,00000000,?,?,?,?,?,?,00D94F20), ref: 00DD35D3
                        • LockResource.KERNEL32(00D950AA,?,?,00D950AA,?,?,00000000,00000000,?,?,?,?,?,?,00D94F20,?), ref: 00DD35E6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                        • String ID: SCRIPT
                        • API String ID: 3051347437-3967369404
                        • Opcode ID: fee9c0771fa99c0ddd8bdcac556edc56f6460c71fbd0b42127e6058995b0acb0
                        • Instruction ID: 1e4889524f870ed274cae5b03fd3e1e92a8cbfd0f96c8d4858168832311f1573
                        • Opcode Fuzzy Hash: fee9c0771fa99c0ddd8bdcac556edc56f6460c71fbd0b42127e6058995b0acb0
                        • Instruction Fuzzy Hash: 71117071201700BFDB218B66DC48F2B7BB9EFC5B51F244269B40296260DB71D8068630

                        Control-flow Graph

                        APIs
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00D92B6B
                          • Part of subcall function 00D93A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00E61418,?,00D92E7F,?,?,?,00000000), ref: 00D93A78
                          • Part of subcall function 00D99CB3: _wcslen.LIBCMT ref: 00D99CBD
                        • GetForegroundWindow.USER32(runas,?,?,?,?,?,00E52224), ref: 00DD2C10
                        • ShellExecuteW.SHELL32(00000000,?,?,00E52224), ref: 00DD2C17
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                        • String ID: runas
                        • API String ID: 448630720-4000483414
                        • Opcode ID: 58af1fbd55e972d27529cffbee724665fc71b7cafa2b9619bdedb663331611a0
                        • Instruction ID: 97118a0d07b3b099ec8ef15824e54bc0122481ad0fdc74697bbbfa62a88fca76
                        • Opcode Fuzzy Hash: 58af1fbd55e972d27529cffbee724665fc71b7cafa2b9619bdedb663331611a0
                        • Instruction Fuzzy Hash: 1C11B4312083016ECF15FF64E85297EB7A4DBE5345F48182DF596630A2DF61890E8732
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: BuffCharUpper
                        • String ID: p#
                        • API String ID: 3964851224-4182048217
                        • Opcode ID: ae154aeb576ee6abcaca7df2c4d271640281bf18a480358d7e62facb65d5a15f
                        • Instruction ID: 548360dd0f48e1da1eff1f770067596082eb3b7b47f3e66fb23532bb1a64dba8
                        • Opcode Fuzzy Hash: ae154aeb576ee6abcaca7df2c4d271640281bf18a480358d7e62facb65d5a15f
                        • Instruction Fuzzy Hash: 56A25D706183419FDB10DF15C480B2ABBE1FF89304F18996DE99A9B352D771EC85CBA2
                        APIs
                        • GetInputState.USER32 ref: 00D9D807
                        • timeGetTime.WINMM ref: 00D9DA07
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00D9DB28
                        • TranslateMessage.USER32(?), ref: 00D9DB7B
                        • DispatchMessageW.USER32(?), ref: 00D9DB89
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00D9DB9F
                        • Sleep.KERNEL32(0000000A), ref: 00D9DBB1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                        • String ID:
                        • API String ID: 2189390790-0
                        • Opcode ID: 698c31fc11608fd48336591b6a2b470c36a89bef841bdba1fafa16f7a695f394
                        • Instruction ID: ef7bc240ded3af6bd104ce72f91b4c284f0f7d558dcb522ce2923f5953b81f25
                        • Opcode Fuzzy Hash: 698c31fc11608fd48336591b6a2b470c36a89bef841bdba1fafa16f7a695f394
                        • Instruction Fuzzy Hash: 6A42DF30604241EFDB29EF25C884BBAB7E6FF45304F184669E596972A1D770E844CFB2

                        Control-flow Graph

                        APIs
                        • GetSysColorBrush.USER32(0000000F), ref: 00D92D07
                        • RegisterClassExW.USER32(00000030), ref: 00D92D31
                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00D92D42
                        • InitCommonControlsEx.COMCTL32(?), ref: 00D92D5F
                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00D92D6F
                        • LoadIconW.USER32(000000A9), ref: 00D92D85
                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00D92D94
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                        • API String ID: 2914291525-1005189915
                        • Opcode ID: d5ed9d03285894da479e78ea88671f365f6141ab94deb0373fdf0e26c0e667e0
                        • Instruction ID: 8e7872fbee4f9e4f3f78beb80d701589c187e9a4c8d6b657f7ddf71ff6852565
                        • Opcode Fuzzy Hash: d5ed9d03285894da479e78ea88671f365f6141ab94deb0373fdf0e26c0e667e0
                        • Instruction Fuzzy Hash: EB2110B0901318AFDB11DFA6EC89BDEBBB4FB48741F24811AF611B62A0D7B00549CF90

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 302 dd065b-dd068b call dd042f 305 dd068d-dd0698 call dbf2c6 302->305 306 dd06a6-dd06b2 call dc5221 302->306 313 dd069a-dd06a1 call dbf2d9 305->313 311 dd06cb-dd0714 call dd039a 306->311 312 dd06b4-dd06c9 call dbf2c6 call dbf2d9 306->312 321 dd0716-dd071f 311->321 322 dd0781-dd078a GetFileType 311->322 312->313 323 dd097d-dd0983 313->323 327 dd0756-dd077c GetLastError call dbf2a3 321->327 328 dd0721-dd0725 321->328 324 dd078c-dd07bd GetLastError call dbf2a3 CloseHandle 322->324 325 dd07d3-dd07d6 322->325 324->313 339 dd07c3-dd07ce call dbf2d9 324->339 330 dd07df-dd07e5 325->330 331 dd07d8-dd07dd 325->331 327->313 328->327 332 dd0727-dd0754 call dd039a 328->332 335 dd07e9-dd0837 call dc516a 330->335 336 dd07e7 330->336 331->335 332->322 332->327 345 dd0839-dd0845 call dd05ab 335->345 346 dd0847-dd086b call dd014d 335->346 336->335 339->313 345->346 351 dd086f-dd0879 call dc86ae 345->351 352 dd086d 346->352 353 dd087e-dd08c1 346->353 351->323 352->351 355 dd08c3-dd08c7 353->355 356 dd08e2-dd08f0 353->356 355->356 358 dd08c9-dd08dd 355->358 359 dd097b 356->359 360 dd08f6-dd08fa 356->360 358->356 359->323 360->359 361 dd08fc-dd092f CloseHandle call dd039a 360->361 364 dd0931-dd095d GetLastError call dbf2a3 call dc5333 361->364 365 dd0963-dd0977 361->365 364->365 365->359
                        APIs
                          • Part of subcall function 00DD039A: CreateFileW.KERNELBASE(00000000,00000000,?,00DD0704,?,?,00000000,?,00DD0704,00000000,0000000C), ref: 00DD03B7
                        • GetLastError.KERNEL32 ref: 00DD076F
                        • __dosmaperr.LIBCMT ref: 00DD0776
                        • GetFileType.KERNELBASE(00000000), ref: 00DD0782
                        • GetLastError.KERNEL32 ref: 00DD078C
                        • __dosmaperr.LIBCMT ref: 00DD0795
                        • CloseHandle.KERNEL32(00000000), ref: 00DD07B5
                        • CloseHandle.KERNEL32(?), ref: 00DD08FF
                        • GetLastError.KERNEL32 ref: 00DD0931
                        • __dosmaperr.LIBCMT ref: 00DD0938
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                        • String ID: H
                        • API String ID: 4237864984-2852464175
                        • Opcode ID: aa775f4ded2d0af124d492e1d44671a3d830efac629ceaad4c6b2baab36587d1
                        • Instruction ID: 82e03273ddf497cd0a0e33338767004447277434f28f24191ce0102b758b0a56
                        • Opcode Fuzzy Hash: aa775f4ded2d0af124d492e1d44671a3d830efac629ceaad4c6b2baab36587d1
                        • Instruction Fuzzy Hash: A9A1E332A041149FDF19EF68DC51BAE7FA0EB86320F28015AF815AF391D7719916CBB1

                        Control-flow Graph

                        APIs
                          • Part of subcall function 00D93A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00E61418,?,00D92E7F,?,?,?,00000000), ref: 00D93A78
                          • Part of subcall function 00D93357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00D93379
                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00D9356A
                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00DD318D
                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00DD31CE
                        • RegCloseKey.ADVAPI32(?), ref: 00DD3210
                        • _wcslen.LIBCMT ref: 00DD3277
                        • _wcslen.LIBCMT ref: 00DD3286
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                        • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                        • API String ID: 98802146-2727554177
                        • Opcode ID: 3dd3b09f6621644f0e657897fbe905b6df530f9a3523e0e72a0e7d38de0486b4
                        • Instruction ID: 5ffe6a3872663eec5493dcd7b088618fa4111e7ff74185c9ebb11cc3b814e011
                        • Opcode Fuzzy Hash: 3dd3b09f6621644f0e657897fbe905b6df530f9a3523e0e72a0e7d38de0486b4
                        • Instruction Fuzzy Hash: 4D7185715447029EC714EF66EC4295FBBE8FF95380F50042EF645A32A1EB709A49CB72

                        Control-flow Graph

                        APIs
                        • GetSysColorBrush.USER32(0000000F), ref: 00D92B8E
                        • LoadCursorW.USER32(00000000,00007F00), ref: 00D92B9D
                        • LoadIconW.USER32(00000063), ref: 00D92BB3
                        • LoadIconW.USER32(000000A4), ref: 00D92BC5
                        • LoadIconW.USER32(000000A2), ref: 00D92BD7
                        • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00D92BEF
                        • RegisterClassExW.USER32(?), ref: 00D92C40
                          • Part of subcall function 00D92CD4: GetSysColorBrush.USER32(0000000F), ref: 00D92D07
                          • Part of subcall function 00D92CD4: RegisterClassExW.USER32(00000030), ref: 00D92D31
                          • Part of subcall function 00D92CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00D92D42
                          • Part of subcall function 00D92CD4: InitCommonControlsEx.COMCTL32(?), ref: 00D92D5F
                          • Part of subcall function 00D92CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00D92D6F
                          • Part of subcall function 00D92CD4: LoadIconW.USER32(000000A9), ref: 00D92D85
                          • Part of subcall function 00D92CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00D92D94
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                        • String ID: #$0$AutoIt v3
                        • API String ID: 423443420-4155596026
                        • Opcode ID: 7e34eeeb796c5639f8dc704cce9ea73405bf8fda1b9410b22391cd5d71fd72d2
                        • Instruction ID: 49c5c71e5375543cd6dbbec3962a6ea1402cb814deec5d8d83ef2bc125372e5c
                        • Opcode Fuzzy Hash: 7e34eeeb796c5639f8dc704cce9ea73405bf8fda1b9410b22391cd5d71fd72d2
                        • Instruction Fuzzy Hash: 20213670A90314AFCB119FA6FC45BAE7FB4EB48B80F19009BE501B27A0D7B105599F90
                        APIs
                        • __Init_thread_footer.LIBCMT ref: 00D9BB4E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Init_thread_footer
                        • String ID: p#$p#$p#$p#$p%$p%$x#$x#
                        • API String ID: 1385522511-4136154834
                        • Opcode ID: 9c5d78aa2fb9856827d1043d064144fb6e5bd6051993c9f0199507e4437a5289
                        • Instruction ID: 2868e5f247a92a57631aef18bb5cd8e5883b973867788e9500aaa666693d96c0
                        • Opcode Fuzzy Hash: 9c5d78aa2fb9856827d1043d064144fb6e5bd6051993c9f0199507e4437a5289
                        • Instruction Fuzzy Hash: 6A32D130A00209EFCF10DF55D984ABE7BB9EF44364F19805AEA45AB251C7B4ED81CBB1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 650 d93170-d93185 651 d931e5-d931e7 650->651 652 d93187-d9318a 650->652 651->652 653 d931e9 651->653 654 d931eb 652->654 655 d9318c-d93193 652->655 656 d931d0-d931d8 DefWindowProcW 653->656 657 dd2dfb-dd2e23 call d918e2 call dae499 654->657 658 d931f1-d931f6 654->658 659 d93199-d9319e 655->659 660 d93265-d9326d PostQuitMessage 655->660 661 d931de-d931e4 656->661 693 dd2e28-dd2e2f 657->693 663 d931f8-d931fb 658->663 664 d9321d-d93244 SetTimer RegisterWindowMessageW 658->664 666 dd2e7c-dd2e90 call dfbf30 659->666 667 d931a4-d931a8 659->667 662 d93219-d9321b 660->662 662->661 669 dd2d9c-dd2d9f 663->669 670 d93201-d93214 KillTimer call d930f2 call d93c50 663->670 664->662 672 d93246-d93251 CreatePopupMenu 664->672 666->662 686 dd2e96 666->686 673 dd2e68-dd2e72 call dfc161 667->673 674 d931ae-d931b3 667->674 678 dd2dd7-dd2df6 MoveWindow 669->678 679 dd2da1-dd2da5 669->679 670->662 672->662 691 dd2e77 673->691 675 dd2e4d-dd2e54 674->675 676 d931b9-d931be 674->676 675->656 689 dd2e5a-dd2e63 call df0ad7 675->689 684 d93253-d93263 call d9326f 676->684 685 d931c4-d931ca 676->685 678->662 687 dd2da7-dd2daa 679->687 688 dd2dc6-dd2dd2 SetFocus 679->688 684->662 685->656 685->693 686->656 687->685 694 dd2db0-dd2dc1 call d918e2 687->694 688->662 689->656 691->662 693->656 698 dd2e35-dd2e48 call d930f2 call d93837 693->698 694->662 698->656
                        APIs
                        • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00D9316A,?,?), ref: 00D931D8
                        • KillTimer.USER32(?,00000001,?,?,?,?,?,00D9316A,?,?), ref: 00D93204
                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00D93227
                        • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00D9316A,?,?), ref: 00D93232
                        • CreatePopupMenu.USER32 ref: 00D93246
                        • PostQuitMessage.USER32(00000000), ref: 00D93267
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                        • String ID: TaskbarCreated
                        • API String ID: 129472671-2362178303
                        • Opcode ID: ed679f5f7bbf6ee43963f1f4016d8c7e23183df2b30741718d6f0378cc1c58dc
                        • Instruction ID: b3f83885f78ce6a1594c47e52df99a7767133022c61db6d1122aec5dfeb93134
                        • Opcode Fuzzy Hash: ed679f5f7bbf6ee43963f1f4016d8c7e23183df2b30741718d6f0378cc1c58dc
                        • Instruction Fuzzy Hash: 0C412531284304AFDF251BB8ED0AB7E3A1AEB45380F1C0166F556F62B1CBA1CA45D7B5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID:
                        • String ID: D%$D%$D%$D%$D%$Variable must be of type 'Object'.
                        • API String ID: 0-2799515523
                        • Opcode ID: d3cccc1fb2d46807072f0933a8fe4db92bc7e27fc30610bca3fa4bdd82a35b62
                        • Instruction ID: ae8fee02c3d7e33b0658818f563f2f4bc4054be03676c4634178f7c0ad4f5f8e
                        • Opcode Fuzzy Hash: d3cccc1fb2d46807072f0933a8fe4db92bc7e27fc30610bca3fa4bdd82a35b62
                        • Instruction Fuzzy Hash: 62C26971A00215DFCF24DFA9C884AADB7B1FB09310F288569E946AB391D375ED41CBB1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1216 3702698-3702746 call 3700048 1219 370274d-3702773 call 37035a8 CreateFileW 1216->1219 1222 3702775 1219->1222 1223 370277a-370278a 1219->1223 1224 37028c5-37028c9 1222->1224 1228 3702791-37027ab VirtualAlloc 1223->1228 1229 370278c 1223->1229 1226 370290b-370290e 1224->1226 1227 37028cb-37028cf 1224->1227 1230 3702911-3702918 1226->1230 1231 37028d1-37028d4 1227->1231 1232 37028db-37028df 1227->1232 1235 37027b2-37027c9 ReadFile 1228->1235 1236 37027ad 1228->1236 1229->1224 1237 370291a-3702925 1230->1237 1238 370296d-3702982 1230->1238 1231->1232 1233 37028e1-37028eb 1232->1233 1234 37028ef-37028f3 1232->1234 1233->1234 1241 3702903 1234->1241 1242 37028f5-37028ff 1234->1242 1243 37027d0-3702810 VirtualAlloc 1235->1243 1244 37027cb 1235->1244 1236->1224 1245 3702927 1237->1245 1246 3702929-3702935 1237->1246 1239 3702992-370299a 1238->1239 1240 3702984-370298f VirtualFree 1238->1240 1240->1239 1241->1226 1242->1241 1247 3702812 1243->1247 1248 3702817-3702832 call 37037f8 1243->1248 1244->1224 1245->1238 1249 3702937-3702947 1246->1249 1250 3702949-3702955 1246->1250 1247->1224 1256 370283d-3702847 1248->1256 1252 370296b 1249->1252 1253 3702962-3702968 1250->1253 1254 3702957-3702960 1250->1254 1252->1230 1253->1252 1254->1252 1257 3702849-3702878 call 37037f8 1256->1257 1258 370287a-370288e call 3703608 1256->1258 1257->1256 1264 3702890 1258->1264 1265 3702892-3702896 1258->1265 1264->1224 1266 37028a2-37028a6 1265->1266 1267 3702898-370289c CloseHandle 1265->1267 1268 37028b6-37028bf 1266->1268 1269 37028a8-37028b3 VirtualFree 1266->1269 1267->1266 1268->1219 1268->1224 1269->1268
                        APIs
                        • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 03702769
                        • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0370298F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2224909717.0000000003700000.00000040.00000020.00020000.00000000.sdmp, Offset: 03700000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_3700000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CreateFileFreeVirtual
                        • String ID:
                        • API String ID: 204039940-0
                        • Opcode ID: 1376b1c019e97a58b345df4903236ecb5f0b8c205347a8d20aa61bd2a2b0f564
                        • Instruction ID: ed3a70a429df348e6d06614385132ae8522eacc91944dafdb1100719f4ed3155
                        • Opcode Fuzzy Hash: 1376b1c019e97a58b345df4903236ecb5f0b8c205347a8d20aa61bd2a2b0f564
                        • Instruction Fuzzy Hash: F9A11875E00208EBDB14CFA4C898BEEBBB5BF48304F248599E511BB2C1D7759A80DF64

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1280 d92c63-d92cd3 CreateWindowExW * 2 ShowWindow * 2
                        APIs
                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00D92C91
                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00D92CB2
                        • ShowWindow.USER32(00000000,?,?,?,?,?,?,00D91CAD,?), ref: 00D92CC6
                        • ShowWindow.USER32(00000000,?,?,?,?,?,?,00D91CAD,?), ref: 00D92CCF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Window$CreateShow
                        • String ID: AutoIt v3$edit
                        • API String ID: 1584632944-3779509399
                        • Opcode ID: ebfb8abdf8dfe920f88b423d36e48a81b42f0ee84e17a9ef3d3e6b77a89585b7
                        • Instruction ID: d861a2c08f264bac2296851895fe9d99da5c5afbe454ce0e71eb74a802602af4
                        • Opcode Fuzzy Hash: ebfb8abdf8dfe920f88b423d36e48a81b42f0ee84e17a9ef3d3e6b77a89585b7
                        • Instruction Fuzzy Hash: 82F030755802907EE7320723BC08E7B2E7DD7CAFA0B15009AF901B2260C2A10849DAB0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1395 37023f8-3702587 call 3700048 call 37022e8 CreateFileW 1402 3702589 1395->1402 1403 370258e-37025a1 1395->1403 1404 3702644-3702649 1402->1404 1406 37025a3 1403->1406 1407 37025a8-37025c2 VirtualAlloc 1403->1407 1406->1404 1408 37025c4 1407->1408 1409 37025c6-37025e0 ReadFile 1407->1409 1408->1404 1410 37025e2 1409->1410 1411 37025e4-370261e call 3702328 call 37012e8 1409->1411 1410->1404 1416 3702620-3702635 call 3702378 1411->1416 1417 370263a-3702642 ExitProcess 1411->1417 1416->1417 1417->1404
                        APIs
                          • Part of subcall function 037022E8: Sleep.KERNELBASE(000001F4), ref: 037022F9
                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0370257A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2224909717.0000000003700000.00000040.00000020.00020000.00000000.sdmp, Offset: 03700000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_3700000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CreateFileSleep
                        • String ID: HIYUBK5D4A5C42RGIY3DADQ6LRDNR
                        • API String ID: 2694422964-3721692760
                        • Opcode ID: 5a208bd431edb6dbc499df6c0424f46982f434a84a4446ad73c99d9dc0f3822d
                        • Instruction ID: af960874ba26d586aca79c0d58dd99f296a84b07040a8a5d4095410d394538e4
                        • Opcode Fuzzy Hash: 5a208bd431edb6dbc499df6c0424f46982f434a84a4446ad73c99d9dc0f3822d
                        • Instruction Fuzzy Hash: A071B771D0428CDAEF11D7F4C8487EEBBB5AF15304F044599D248BB2C1D7B90A45CB6A

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1729 d93b1c-d93b27 1730 d93b99-d93b9b 1729->1730 1731 d93b29-d93b2e 1729->1731 1732 d93b8c-d93b8f 1730->1732 1731->1730 1733 d93b30-d93b48 RegOpenKeyExW 1731->1733 1733->1730 1734 d93b4a-d93b69 RegQueryValueExW 1733->1734 1735 d93b6b-d93b76 1734->1735 1736 d93b80-d93b8b RegCloseKey 1734->1736 1737 d93b78-d93b7a 1735->1737 1738 d93b90-d93b97 1735->1738 1736->1732 1739 d93b7e 1737->1739 1738->1739 1739->1736
                        APIs
                        • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00D93B0F,SwapMouseButtons,00000004,?), ref: 00D93B40
                        • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00D93B0F,SwapMouseButtons,00000004,?), ref: 00D93B61
                        • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00D93B0F,SwapMouseButtons,00000004,?), ref: 00D93B83
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CloseOpenQueryValue
                        • String ID: Control Panel\Mouse
                        • API String ID: 3677997916-824357125
                        • Opcode ID: 6953d570efecba46510bb7499ddf8d4328af92f5bd910c3bcdc23e695bd04dd2
                        • Instruction ID: 742f3e35709110ceaf8776b54073854302015d7217c72444b591a0b7db79e898
                        • Opcode Fuzzy Hash: 6953d570efecba46510bb7499ddf8d4328af92f5bd910c3bcdc23e695bd04dd2
                        • Instruction Fuzzy Hash: C6112AB5510208FFDF208FA5DC44EAEB7B8EF04748B144459A805E7210D2719E4597A0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1740 37012e8-3701388 call 37037d8 * 3 1747 370138a-3701394 1740->1747 1748 370139f 1740->1748 1747->1748 1749 3701396-370139d 1747->1749 1750 37013a6-37013af 1748->1750 1749->1750 1751 37013b6-3701a68 1750->1751 1752 3701a6a-3701a6e 1751->1752 1753 3701a7b-3701aa8 1751->1753 1754 3701a70-3701a74 1752->1754 1755 3701ab4-3701ae1 1752->1755 1768 3701ab2 1753->1768 1769 3701aaa-3701aad 1753->1769 1756 3701a76 1754->1756 1757 3701aed-3701b1a CreateProcessW 1754->1757 1777 3701ae3-3701ae6 1755->1777 1778 3701aeb 1755->1778 1760 3701b24-3701b3e Wow64GetThreadContext 1756->1760 1757->1760 1771 3701b1c-3701b1f 1757->1771 1761 3701b40 1760->1761 1762 3701b45-3701b60 ReadProcessMemory 1760->1762 1765 3701e52-3701e56 1761->1765 1766 3701b62 1762->1766 1767 3701b67-3701b70 1762->1767 1772 3701ea7 1765->1772 1773 3701e58-3701e5c 1765->1773 1766->1765 1774 3701b72-3701b81 1767->1774 1775 3701b99-3701bb8 call 3702e58 1767->1775 1768->1760 1776 3701ea9-3701eab 1769->1776 1771->1760 1771->1776 1772->1776 1779 3701e71-3701e75 1773->1779 1780 3701e5e-3701e6a 1773->1780 1774->1775 1781 3701b83-3701b92 call 3702da8 1774->1781 1791 3701bba 1775->1791 1792 3701bbf-3701be2 call 3702f98 1775->1792 1777->1776 1778->1760 1784 3701e81-3701e85 1779->1784 1785 3701e77-3701e7a 1779->1785 1780->1779 1781->1775 1793 3701b94 1781->1793 1789 3701e91-3701e95 1784->1789 1790 3701e87-3701e8a 1784->1790 1785->1784 1795 3701ea2-3701ea5 1789->1795 1796 3701e97-3701e9d call 3702da8 1789->1796 1790->1789 1791->1765 1799 3701be4-3701beb 1792->1799 1800 3701c2c-3701c4d call 3702f98 1792->1800 1793->1765 1795->1776 1796->1795 1801 3701c27 1799->1801 1802 3701bed-3701c1e call 3702f98 1799->1802 1807 3701c54-3701c72 call 37037f8 1800->1807 1808 3701c4f 1800->1808 1801->1765 1809 3701c20 1802->1809 1810 3701c25 1802->1810 1813 3701c7d-3701c87 1807->1813 1808->1765 1809->1765 1810->1800 1814 3701c89-3701cbb call 37037f8 1813->1814 1815 3701cbd-3701cc1 1813->1815 1814->1813 1817 3701cc7-3701cd7 1815->1817 1818 3701dac-3701dc9 call 37029a8 1815->1818 1817->1818 1820 3701cdd-3701ced 1817->1820 1825 3701dd0-3701def Wow64SetThreadContext 1818->1825 1826 3701dcb 1818->1826 1820->1818 1824 3701cf3-3701d17 1820->1824 1827 3701d1a-3701d1e 1824->1827 1828 3701df1 1825->1828 1829 3701df3-3701dfe call 3702cd8 1825->1829 1826->1765 1827->1818 1830 3701d24-3701d39 1827->1830 1828->1765 1836 3701e00 1829->1836 1837 3701e02-3701e06 1829->1837 1832 3701d4d-3701d51 1830->1832 1834 3701d53-3701d5f 1832->1834 1835 3701d8f-3701da7 1832->1835 1838 3701d61-3701d8b 1834->1838 1839 3701d8d 1834->1839 1835->1827 1836->1765 1840 3701e12-3701e16 1837->1840 1841 3701e08-3701e0b 1837->1841 1838->1839 1839->1832 1843 3701e22-3701e26 1840->1843 1844 3701e18-3701e1b 1840->1844 1841->1840 1845 3701e32-3701e36 1843->1845 1846 3701e28-3701e2b 1843->1846 1844->1843 1847 3701e43-3701e4c 1845->1847 1848 3701e38-3701e3e call 3702da8 1845->1848 1846->1845 1847->1751 1847->1765 1848->1847
                        APIs
                        • CreateProcessW.KERNELBASE(?,00000000), ref: 03701B15
                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03701B39
                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03701B5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2224909717.0000000003700000.00000040.00000020.00020000.00000000.sdmp, Offset: 03700000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_3700000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                        • String ID:
                        • API String ID: 2438371351-0
                        • Opcode ID: fc8f1a43d92b409a9fc3443f05f08a35b7dbde12cca23af92c4c83ca62f6b31d
                        • Instruction ID: 2920d326e574f0d01f871c999c7b3a73a52c98b2b92e4b450a94ff63fe5535d6
                        • Opcode Fuzzy Hash: fc8f1a43d92b409a9fc3443f05f08a35b7dbde12cca23af92c4c83ca62f6b31d
                        • Instruction Fuzzy Hash: A162F934A14258DBEB24CBA4C854BEEB3B6EF58300F5091A9D10DEB2D0E7759E81CB59

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1850 d92de3-d92e03 call dd1f50 1853 d92e09-d92e2c call d93aa2 call d92da5 call d93598 call d944a8 1850->1853 1854 dd2c2b-dd2c94 call db2340 GetOpenFileNameW 1850->1854 1868 d92e31-d92e34 1853->1868 1859 dd2c9d-dd2ca6 call d96b57 1854->1859 1860 dd2c96 1854->1860 1864 dd2cab 1859->1864 1860->1859 1864->1864
                        APIs
                        • GetOpenFileNameW.COMDLG32(?), ref: 00DD2C8C
                          • Part of subcall function 00D93AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00D93A97,?,?,00D92E7F,?,?,?,00000000), ref: 00D93AC2
                          • Part of subcall function 00D92DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00D92DC4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Name$Path$FileFullLongOpen
                        • String ID: X$`e
                        • API String ID: 779396738-4036142377
                        • Opcode ID: a24c9248e0a8b8e16b3ff3fa2947b9b682894b5957b84d9c49b3e3486422f2f5
                        • Instruction ID: 3527de91a1528ce46310f199fe47b286570b4b5796be8513fd8fc5e94ced9b33
                        • Opcode Fuzzy Hash: a24c9248e0a8b8e16b3ff3fa2947b9b682894b5957b84d9c49b3e3486422f2f5
                        • Instruction Fuzzy Hash: BD218171A10258AEDF419F94C845BEE7BF8EF48305F40405AE445B7241EBB49A498BB1
                        APIs
                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00DB0668
                          • Part of subcall function 00DB32A4: RaiseException.KERNEL32(?,?,?,00DB068A,?,00E61444,?,?,?,?,?,?,00DB068A,00D91129,00E58738,00D91129), ref: 00DB3304
                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00DB0685
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Exception@8Throw$ExceptionRaise
                        • String ID: Unknown exception
                        • API String ID: 3476068407-410509341
                        • Opcode ID: ef0d3e8ca6e74b28c6d1e5518b4af4d18f2692080c480638d2a7e815acfe7959
                        • Instruction ID: 8649ec8ba3c0d985349a73fd3db1b4971ea3d25abb87899cce75895f4fed9cb1
                        • Opcode Fuzzy Hash: ef0d3e8ca6e74b28c6d1e5518b4af4d18f2692080c480638d2a7e815acfe7959
                        • Instruction Fuzzy Hash: 29F0AF2490020DF7CF10B6A4D846CDE7B6C9E40350B604571B816A6592EF71DA2986B0
                        APIs
                        • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 00E182F5
                        • TerminateProcess.KERNEL32(00000000), ref: 00E182FC
                        • FreeLibrary.KERNEL32(?,?,?,?), ref: 00E184DD
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Process$CurrentFreeLibraryTerminate
                        • String ID:
                        • API String ID: 146820519-0
                        • Opcode ID: 663bcdfab01fa918813ebc662ece75643a7421c121629e6f76fdb34bf2888080
                        • Instruction ID: c737669cc689e936b0a8a5076422c76a4d7f591f85639beecb3ee23a2ee17649
                        • Opcode Fuzzy Hash: 663bcdfab01fa918813ebc662ece75643a7421c121629e6f76fdb34bf2888080
                        • Instruction Fuzzy Hash: 21128C71A083019FC710DF28C584B6ABBE1FF89318F14995DE8999B252DB30ED85CF92
                        APIs
                          • Part of subcall function 00D91BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00D91BF4
                          • Part of subcall function 00D91BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00D91BFC
                          • Part of subcall function 00D91BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00D91C07
                          • Part of subcall function 00D91BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00D91C12
                          • Part of subcall function 00D91BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00D91C1A
                          • Part of subcall function 00D91BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00D91C22
                          • Part of subcall function 00D91B4A: RegisterWindowMessageW.USER32(00000004,?,00D912C4), ref: 00D91BA2
                        • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00D9136A
                        • OleInitialize.OLE32 ref: 00D91388
                        • CloseHandle.KERNEL32(00000000,00000000), ref: 00DD24AB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                        • String ID:
                        • API String ID: 1986988660-0
                        • Opcode ID: c7267d5dce0e8f14e66f0a5ccacbb6fc48aab86cd45ad8d7c9c5a42c010030d6
                        • Instruction ID: 3e44907a3ec98b24cebb2d7c1b61b0151cdfde9804b67f9b5be70e3a5d65f1a6
                        • Opcode Fuzzy Hash: c7267d5dce0e8f14e66f0a5ccacbb6fc48aab86cd45ad8d7c9c5a42c010030d6
                        • Instruction Fuzzy Hash: 9971BFB49012408EC786DF7BF84665ABAE0FBC93C435C51AAD01BF7261EBB04449CF61
                        APIs
                          • Part of subcall function 00D93923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00D93A04
                        • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00DFC259
                        • KillTimer.USER32(?,00000001,?,?), ref: 00DFC261
                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00DFC270
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: IconNotifyShell_Timer$Kill
                        • String ID:
                        • API String ID: 3500052701-0
                        • Opcode ID: dcea3f058d37f100f2ae96344a127538331ce3d09a10a84f06af4b8b6de9f500
                        • Instruction ID: 2744dbb6ab528e3c244d0da30afefdcfb9445e0ff8d8e61fde258857097fe8e2
                        • Opcode Fuzzy Hash: dcea3f058d37f100f2ae96344a127538331ce3d09a10a84f06af4b8b6de9f500
                        • Instruction Fuzzy Hash: 0731D470900348AFEB328B648945BEBBBECDF02308F04549AD2DAA3241C7745A88CB65
                        APIs
                        • CloseHandle.KERNELBASE(00000000,00000000,?,?,00DC85CC,?,00E58CC8,0000000C), ref: 00DC8704
                        • GetLastError.KERNEL32(?,00DC85CC,?,00E58CC8,0000000C), ref: 00DC870E
                        • __dosmaperr.LIBCMT ref: 00DC8739
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CloseErrorHandleLast__dosmaperr
                        • String ID:
                        • API String ID: 2583163307-0
                        • Opcode ID: 213b1a742fb7ee955f41ef51d0e5e2c063df7f97ab636159e19ad5eb6676de03
                        • Instruction ID: 9d1d0f02f89deea5415332870396ff72ed889ffc657e7bd93f06ca2358f0ffd9
                        • Opcode Fuzzy Hash: 213b1a742fb7ee955f41ef51d0e5e2c063df7f97ab636159e19ad5eb6676de03
                        • Instruction Fuzzy Hash: 6D01DB326456622ADA646334B845F7F67498B817B8F3D025DF8149B1D2DEA1ECC1A1B0
                        APIs
                        • TranslateMessage.USER32(?), ref: 00D9DB7B
                        • DispatchMessageW.USER32(?), ref: 00D9DB89
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00D9DB9F
                        • Sleep.KERNEL32(0000000A), ref: 00D9DBB1
                        • TranslateAcceleratorW.USER32(?,?,?), ref: 00DE1CC9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                        • String ID:
                        • API String ID: 3288985973-0
                        • Opcode ID: d5733da887792fd6352b9818de180a7c927c0b0c0106d62b39fdf6307607edbd
                        • Instruction ID: 54f23267ed01a4beae6950852c69b1a9682fff3fec8b0873696e12208e3c2b25
                        • Opcode Fuzzy Hash: d5733da887792fd6352b9818de180a7c927c0b0c0106d62b39fdf6307607edbd
                        • Instruction Fuzzy Hash: ACF05E306443809BEB34DB71DC49FAA73B9EB85350F244A19E64AE30C0DB309489CB35
                        APIs
                        • __Init_thread_footer.LIBCMT ref: 00DA17F6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Init_thread_footer
                        • String ID: CALL
                        • API String ID: 1385522511-4196123274
                        • Opcode ID: 4aa3e70af66b9d40e598c2a398c4baddf1282306642242d0f09cb71b43a64336
                        • Instruction ID: 36468170ab788e53b47764f07d3219b8e71d2cb32812d024f216c313dd25629c
                        • Opcode Fuzzy Hash: 4aa3e70af66b9d40e598c2a398c4baddf1282306642242d0f09cb71b43a64336
                        • Instruction Fuzzy Hash: 0C2289746083419FC714DF25C480A2ABBF1FF9A354F28895DF4968B3A1D771E845CBA2
                        APIs
                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00D9949C,?,00008000), ref: 00D95773
                        • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,?,?,00D9949C,?,00008000), ref: 00DD4052
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CreateFile
                        • String ID:
                        • API String ID: 823142352-0
                        • Opcode ID: c0d45655b74d6fc83369deca47b5d3e645c47eb00950f5b529c60c2042bcaee9
                        • Instruction ID: daf4c509468705040bb6798d244b2f4f735a11ed0fc31389159ac4d38652f734
                        • Opcode Fuzzy Hash: c0d45655b74d6fc83369deca47b5d3e645c47eb00950f5b529c60c2042bcaee9
                        • Instruction Fuzzy Hash: 47019230145225BAE7310A6ADC0FF977F98EF027B4F148311BA9C6A1E0C7B45955CBA0
                        APIs
                        • CreateProcessW.KERNELBASE(?,00000000), ref: 03701B15
                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03701B39
                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03701B5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2224909717.0000000003700000.00000040.00000020.00020000.00000000.sdmp, Offset: 03700000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_3700000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                        • String ID:
                        • API String ID: 2438371351-0
                        • Opcode ID: aa5ac5a3be62539e190cb66ef3a7ce968b32dbbeab3f01f3ced4961a16edbae6
                        • Instruction ID: e8d8369358df192531fb594914c0f251c408172f35840a6baec66e9c83d7e190
                        • Opcode Fuzzy Hash: aa5ac5a3be62539e190cb66ef3a7ce968b32dbbeab3f01f3ced4961a16edbae6
                        • Instruction Fuzzy Hash: EE12CD24E24658C6EB24DF64D8507DEB272EF68300F1090E9910DEB7A5E77A4F81CF5A
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID:
                        • API String ID: 544645111-0
                        • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                        • Instruction ID: 418346b3d5677c4690153272b40fd6cf12ec1b2c052f04f69fce12cf9e1042b6
                        • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                        • Instruction Fuzzy Hash: C731F575A00109DBCB19DF9AD4C0969F7A2FF4A310B2886E5E809CB655D731EDC1CBE0
                        APIs
                          • Part of subcall function 00D94E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00D94EDD,?,00E61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D94E9C
                          • Part of subcall function 00D94E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00D94EAE
                          • Part of subcall function 00D94E90: FreeLibrary.KERNEL32(00000000,?,?,00D94EDD,?,00E61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D94EC0
                        • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00E61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D94EFD
                          • Part of subcall function 00D94E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00DD3CDE,?,00E61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D94E62
                          • Part of subcall function 00D94E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00D94E74
                          • Part of subcall function 00D94E59: FreeLibrary.KERNEL32(00000000,?,?,00DD3CDE,?,00E61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D94E87
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Library$Load$AddressFreeProc
                        • String ID:
                        • API String ID: 2632591731-0
                        • Opcode ID: 1d7d598db187ae3271adf8a5b0ae1d9646a0a7330a3dad47c7c9effd65ef176e
                        • Instruction ID: 0e20053a8ef20bf12ca0c8ceafbdf04fd5606263f93f2f485543da02c44424be
                        • Opcode Fuzzy Hash: 1d7d598db187ae3271adf8a5b0ae1d9646a0a7330a3dad47c7c9effd65ef176e
                        • Instruction Fuzzy Hash: 0011E332610306AACF24EF64DC12FAD77A5EF40750F20842EF582B61D2EE709A4A9770
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: __wsopen_s
                        • String ID:
                        • API String ID: 3347428461-0
                        • Opcode ID: ce35fe2cb9752933f15647687646b8c28bf32bbbdb915cefd9fcdda81d045d8d
                        • Instruction ID: c1c80caf170b436a3889c7b79e2b90f5b83d5c1f43356573c463079ceb09f556
                        • Opcode Fuzzy Hash: ce35fe2cb9752933f15647687646b8c28bf32bbbdb915cefd9fcdda81d045d8d
                        • Instruction Fuzzy Hash: FE11187590820AAFCB0ADF58E941E9B7BF5EF48314F154069F808AB312DA31DA11DBA5
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                        • Instruction ID: ef8e9f35ede400175943f7bdbcd4708958aae0bc001c1312dd458793edfcde9c
                        • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                        • Instruction Fuzzy Hash: 13F0F432511A14DACA313A698C05FDA3799DF52334F140B19F822931D2DB70D8028AB5
                        APIs
                        • RtlAllocateHeap.NTDLL(00000000,?,00E61444,?,00DAFDF5,?,?,00D9A976,00000010,00E61440,00D913FC,?,00D913C6,?,00D91129), ref: 00DC3852
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: c57de611b4100a7fc9213eb38fddf32521f4e25e301ff00e06cb262f0fcc2766
                        • Instruction ID: 206f6080e72a8ceef8462d1285c8d85a8e157d528c26286ee1c0c1e2cc4b8738
                        • Opcode Fuzzy Hash: c57de611b4100a7fc9213eb38fddf32521f4e25e301ff00e06cb262f0fcc2766
                        • Instruction Fuzzy Hash: 18E0E5311063269AE6312A679C01FDB3658EF427B0F1D8028BC46A3581CB10DD0185F4
                        APIs
                        • FreeLibrary.KERNEL32(?,?,00E61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D94F6D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: FreeLibrary
                        • String ID:
                        • API String ID: 3664257935-0
                        • Opcode ID: 18e620bb92a5fb032ed5b244fc69be7228c799f8afd1a1929701ddd8db542ea8
                        • Instruction ID: 86f76f4454e993a4cf37014283030964b73f1265cb423e212b8aabcee4042a93
                        • Opcode Fuzzy Hash: 18e620bb92a5fb032ed5b244fc69be7228c799f8afd1a1929701ddd8db542ea8
                        • Instruction Fuzzy Hash: 99F01571109752CFDB349FA4D494C66BBE4EF143293248A6EE1EA82622C7319849DB20
                        APIs
                        • WriteFile.KERNELBASE(?,?,?,00000000,00000000,?,?,?,?,00DDEE51,00E53630,00000002), ref: 00DFCD26
                          • Part of subcall function 00DFCC37: SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,00000000,?,00000000,?,?,?,00DFCD19,?,?,?), ref: 00DFCC59
                          • Part of subcall function 00DFCC37: SetFilePointerEx.KERNEL32(?,?,00000000,00000000,00000001,?,00DFCD19,?,?,?,?,00DDEE51,00E53630,00000002), ref: 00DFCC6E
                          • Part of subcall function 00DFCC37: SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,?,00DFCD19,?,?,?,?,00DDEE51,00E53630,00000002), ref: 00DFCC7A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: File$Pointer$Write
                        • String ID:
                        • API String ID: 3847668363-0
                        • Opcode ID: 1be76d238f96b99a199589b3b2071143107839554ae6cde5bdf30613491577b5
                        • Instruction ID: 865066d4801472e5bebde5753ed5a24ffa433bf8d03221a10f553be7e0d9d9b8
                        • Opcode Fuzzy Hash: 1be76d238f96b99a199589b3b2071143107839554ae6cde5bdf30613491577b5
                        • Instruction Fuzzy Hash: 4CE06576400708FFD7219F46DD018AABBF8FF84354710852FE955D2110D371AA54DB60
                        APIs
                        • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00D92DC4
                          • Part of subcall function 00D96B57: _wcslen.LIBCMT ref: 00D96B6A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: LongNamePath_wcslen
                        • String ID:
                        • API String ID: 541455249-0
                        • Opcode ID: e34b47be70cb127988a7516c38323de2037afd0169cac5d5ef978bca6a602650
                        • Instruction ID: 26dab998d619714240ed1211e73f909390cdef5d0e1dcbca13460756a682baac
                        • Opcode Fuzzy Hash: e34b47be70cb127988a7516c38323de2037afd0169cac5d5ef978bca6a602650
                        • Instruction Fuzzy Hash: B6E0CD776041245BCB209398DC05FDA77DDDFC8790F040071FD09E7258E960ED848670
                        APIs
                          • Part of subcall function 00D93837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00D93908
                          • Part of subcall function 00D9D730: GetInputState.USER32 ref: 00D9D807
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00D92B6B
                          • Part of subcall function 00D930F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 00D9314E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: IconNotifyShell_$CurrentDirectoryInputState
                        • String ID:
                        • API String ID: 3667716007-0
                        • Opcode ID: 0e15c79f3793da9682699eed827ed7e148f77cb4552d55acfaba58eae622d027
                        • Instruction ID: bebb1ba3b22443d41588970c3767edf8e75b2744f18fd830c2cffd95ab33b04c
                        • Opcode Fuzzy Hash: 0e15c79f3793da9682699eed827ed7e148f77cb4552d55acfaba58eae622d027
                        • Instruction Fuzzy Hash: B0E07D213002040BCF08BBB6A82247DF389CFE1391F44147EF15793163CF2049494332
                        APIs
                        • CreateFileW.KERNELBASE(00000000,00000000,?,00DD0704,?,?,00000000,?,00DD0704,00000000,0000000C), ref: 00DD03B7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CreateFile
                        • String ID:
                        • API String ID: 823142352-0
                        • Opcode ID: 42d1e1b54ae9f35fae064a78b2826bef95411fa505b287d3efbf1db0395921e0
                        • Instruction ID: a23bfe727560cd8118e7b5dfc1678c411630af44769f3a68eab3a7669d403137
                        • Opcode Fuzzy Hash: 42d1e1b54ae9f35fae064a78b2826bef95411fa505b287d3efbf1db0395921e0
                        • Instruction Fuzzy Hash: 2ED06C3204010DBFDF128F85DD06EDA3BAAFB48714F114000BE5866020C732E832AB90
                        APIs
                        • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00D91CBC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: InfoParametersSystem
                        • String ID:
                        • API String ID: 3098949447-0
                        • Opcode ID: e8a468372071c408d8a05c4b64fbbc70d4cd520e54a83f723aa6f583bf5739b5
                        • Instruction ID: b5abe07cebc57d6a12655c3448528f4abede55a10d1fd90c6e3edfa8b4d5e9fd
                        • Opcode Fuzzy Hash: e8a468372071c408d8a05c4b64fbbc70d4cd520e54a83f723aa6f583bf5739b5
                        • Instruction Fuzzy Hash: 36C09B352C03049FF2254781FC4AF157754A75CB40F144001F70A755E3C3E15414D651
                        APIs
                          • Part of subcall function 00D95745: CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00D9949C,?,00008000), ref: 00D95773
                        • GetLastError.KERNEL32(00000002,00000000), ref: 00E076DE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CreateErrorFileLast
                        • String ID:
                        • API String ID: 1214770103-0
                        • Opcode ID: c457655b43d467da15f9f030a9fc6342a9f4bec0e5ff888adf197cb9a40e1ab2
                        • Instruction ID: 16ef3c62566575d26fc38b5fe65bcd9f7b0620676f36359312d6521fa6e8b95c
                        • Opcode Fuzzy Hash: c457655b43d467da15f9f030a9fc6342a9f4bec0e5ff888adf197cb9a40e1ab2
                        • Instruction Fuzzy Hash: 1D819E306087019FCB15EF28C491AA9B7E1FF89314F04556DF8966B292DB30ED85CBB2
                        APIs
                        • Sleep.KERNELBASE(000001F4), ref: 037022F9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2224909717.0000000003700000.00000040.00000020.00020000.00000000.sdmp, Offset: 03700000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_3700000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Sleep
                        • String ID:
                        • API String ID: 3472027048-0
                        • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                        • Instruction ID: 91f1dbc3ea40b8dbdf0066cd64e6d656ad1b90e286ed006209280e2f1999ba2c
                        • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                        • Instruction Fuzzy Hash: FCE09A7594010DEFDB00DFA8D54969D7BB4EF04301F1005A1FD0596681DA309A548A62
                        APIs
                        • CloseHandle.KERNELBASE(?,?,00000000,00DD24E0), ref: 00D96266
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CloseHandle
                        • String ID:
                        • API String ID: 2962429428-0
                        • Opcode ID: cf0a72e026c277c62992af37c62c36ea92dbbfe3a86ec2bd2dccedb92a9e5b63
                        • Instruction ID: ce45f279014421a029f8e100178db4a0d1b02f73a5ef6fb54033d78ead4c7575
                        • Opcode Fuzzy Hash: cf0a72e026c277c62992af37c62c36ea92dbbfe3a86ec2bd2dccedb92a9e5b63
                        • Instruction Fuzzy Hash: C0E0B675400B01CFC7318F5AE804412FBF5FFE13653244A2ED0E592660E3B0988A8F64
                        APIs
                        • Sleep.KERNELBASE(000001F4), ref: 037022F9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2224909717.0000000003700000.00000040.00000020.00020000.00000000.sdmp, Offset: 03700000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_3700000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Sleep
                        • String ID:
                        • API String ID: 3472027048-0
                        • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                        • Instruction ID: a3fc82a482c5b544e4b0fbc503cb0d981f98d9be7a3ac944ac6b228be376d7b5
                        • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                        • Instruction Fuzzy Hash: 15E0E67594010DDFDB00DFB8D54D69D7BF4EF04301F1005A1FD01D2281D6309D508A72
                        APIs
                          • Part of subcall function 00DA9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DA9BB2
                        • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00E2961A
                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00E2965B
                        • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00E2969F
                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00E296C9
                        • SendMessageW.USER32 ref: 00E296F2
                        • GetKeyState.USER32(00000011), ref: 00E2978B
                        • GetKeyState.USER32(00000009), ref: 00E29798
                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00E297AE
                        • GetKeyState.USER32(00000010), ref: 00E297B8
                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00E297E9
                        • SendMessageW.USER32 ref: 00E29810
                        • SendMessageW.USER32(?,00001030,?,00E27E95), ref: 00E29918
                        • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00E2992E
                        • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00E29941
                        • SetCapture.USER32(?), ref: 00E2994A
                        • ClientToScreen.USER32(?,?), ref: 00E299AF
                        • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00E299BC
                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00E299D6
                        • ReleaseCapture.USER32 ref: 00E299E1
                        • GetCursorPos.USER32(?), ref: 00E29A19
                        • ScreenToClient.USER32(?,?), ref: 00E29A26
                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00E29A80
                        • SendMessageW.USER32 ref: 00E29AAE
                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00E29AEB
                        • SendMessageW.USER32 ref: 00E29B1A
                        • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00E29B3B
                        • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00E29B4A
                        • GetCursorPos.USER32(?), ref: 00E29B68
                        • ScreenToClient.USER32(?,?), ref: 00E29B75
                        • GetParent.USER32(?), ref: 00E29B93
                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00E29BFA
                        • SendMessageW.USER32 ref: 00E29C2B
                        • ClientToScreen.USER32(?,?), ref: 00E29C84
                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00E29CB4
                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00E29CDE
                        • SendMessageW.USER32 ref: 00E29D01
                        • ClientToScreen.USER32(?,?), ref: 00E29D4E
                        • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00E29D82
                          • Part of subcall function 00DA9944: GetWindowLongW.USER32(?,000000EB), ref: 00DA9952
                        • GetWindowLongW.USER32(?,000000F0), ref: 00E29E05
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                        • String ID: @GUI_DRAGID$F$p#
                        • API String ID: 3429851547-638943876
                        • Opcode ID: 62822cb140f0b89af664d4f6f4d0cee64f0cbe7667438fdeea91248972cf6267
                        • Instruction ID: 6f4dea17a3f6e13dddac7d3554a0784631d0b097bcbd97abd3357ef523dfea13
                        • Opcode Fuzzy Hash: 62822cb140f0b89af664d4f6f4d0cee64f0cbe7667438fdeea91248972cf6267
                        • Instruction Fuzzy Hash: F642E130204210AFDB25CF24EC44EAABBE5FF88714F14261DF699A72A2D771E855CF52
                        APIs
                        • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00E248F3
                        • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00E24908
                        • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00E24927
                        • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00E2494B
                        • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00E2495C
                        • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00E2497B
                        • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00E249AE
                        • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00E249D4
                        • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00E24A0F
                        • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00E24A56
                        • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00E24A7E
                        • IsMenu.USER32(?), ref: 00E24A97
                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00E24AF2
                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00E24B20
                        • GetWindowLongW.USER32(?,000000F0), ref: 00E24B94
                        • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00E24BE3
                        • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00E24C82
                        • wsprintfW.USER32 ref: 00E24CAE
                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00E24CC9
                        • GetWindowTextW.USER32(?,00000000,00000001), ref: 00E24CF1
                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00E24D13
                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00E24D33
                        • GetWindowTextW.USER32(?,00000000,00000001), ref: 00E24D5A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                        • String ID: %d/%02d/%02d
                        • API String ID: 4054740463-328681919
                        • Opcode ID: 327db1e5995666971e5057447d1c787c6b65b27f56b8918b2ac0b117f71f9eb0
                        • Instruction ID: 551ba2af735cd14ae6803bee46ac01ad09dd900fff9fa6b425e315030b30dfd9
                        • Opcode Fuzzy Hash: 327db1e5995666971e5057447d1c787c6b65b27f56b8918b2ac0b117f71f9eb0
                        • Instruction Fuzzy Hash: 821202B1600224AFEB248F29EC49FAE7BF8EF85714F105119F515FA2E1D7749A41CB60
                        APIs
                        • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 00DAF998
                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00DEF474
                        • IsIconic.USER32(00000000), ref: 00DEF47D
                        • ShowWindow.USER32(00000000,00000009), ref: 00DEF48A
                        • SetForegroundWindow.USER32(00000000), ref: 00DEF494
                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00DEF4AA
                        • GetCurrentThreadId.KERNEL32 ref: 00DEF4B1
                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00DEF4BD
                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 00DEF4CE
                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 00DEF4D6
                        • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 00DEF4DE
                        • SetForegroundWindow.USER32(00000000), ref: 00DEF4E1
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DEF4F6
                        • keybd_event.USER32(00000012,00000000), ref: 00DEF501
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DEF50B
                        • keybd_event.USER32(00000012,00000000), ref: 00DEF510
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DEF519
                        • keybd_event.USER32(00000012,00000000), ref: 00DEF51E
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DEF528
                        • keybd_event.USER32(00000012,00000000), ref: 00DEF52D
                        • SetForegroundWindow.USER32(00000000), ref: 00DEF530
                        • AttachThreadInput.USER32(?,000000FF,00000000), ref: 00DEF557
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                        • String ID: Shell_TrayWnd
                        • API String ID: 4125248594-2988720461
                        • Opcode ID: ea1d3075a8fce2f4ae87ac229cbad676c2c1e2eeb65458b8fa5be01a89e12711
                        • Instruction ID: 442b33c876a40e7c0663304982daa58b2f730c07a13e22ed1ca45398a298d918
                        • Opcode Fuzzy Hash: ea1d3075a8fce2f4ae87ac229cbad676c2c1e2eeb65458b8fa5be01a89e12711
                        • Instruction Fuzzy Hash: FD315871A402187FEB316BB69C49FBF7E6CEB44B50F240065F601F61D1C6B19D01AAB1
                        APIs
                          • Part of subcall function 00DF16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00DF170D
                          • Part of subcall function 00DF16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00DF173A
                          • Part of subcall function 00DF16C3: GetLastError.KERNEL32 ref: 00DF174A
                        • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00DF1286
                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00DF12A8
                        • CloseHandle.KERNEL32(?), ref: 00DF12B9
                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00DF12D1
                        • GetProcessWindowStation.USER32 ref: 00DF12EA
                        • SetProcessWindowStation.USER32(00000000), ref: 00DF12F4
                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00DF1310
                          • Part of subcall function 00DF10BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00DF11FC), ref: 00DF10D4
                          • Part of subcall function 00DF10BF: CloseHandle.KERNEL32(?,?,00DF11FC), ref: 00DF10E9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                        • String ID: $default$winsta0$Z
                        • API String ID: 22674027-1808616255
                        • Opcode ID: c89463ecd642bee9c8b55e18a3304a33603e4e5a28d7547b954b8f5393373bdb
                        • Instruction ID: 08260320790b712f9c3f45e9795bff5969fcbbbe495d53ae46647917b622c331
                        • Opcode Fuzzy Hash: c89463ecd642bee9c8b55e18a3304a33603e4e5a28d7547b954b8f5393373bdb
                        • Instruction Fuzzy Hash: C0816775900209EFDF249FA5DC49BFE7BB9EF44704F298129FA11B61A0C7318A49CB60
                        APIs
                          • Part of subcall function 00DF10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00DF1114
                          • Part of subcall function 00DF10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00DF0B9B,?,?,?), ref: 00DF1120
                          • Part of subcall function 00DF10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00DF0B9B,?,?,?), ref: 00DF112F
                          • Part of subcall function 00DF10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00DF0B9B,?,?,?), ref: 00DF1136
                          • Part of subcall function 00DF10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00DF114D
                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00DF0BCC
                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00DF0C00
                        • GetLengthSid.ADVAPI32(?), ref: 00DF0C17
                        • GetAce.ADVAPI32(?,00000000,?), ref: 00DF0C51
                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00DF0C6D
                        • GetLengthSid.ADVAPI32(?), ref: 00DF0C84
                        • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00DF0C8C
                        • HeapAlloc.KERNEL32(00000000), ref: 00DF0C93
                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00DF0CB4
                        • CopySid.ADVAPI32(00000000), ref: 00DF0CBB
                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00DF0CEA
                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00DF0D0C
                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00DF0D1E
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00DF0D45
                        • HeapFree.KERNEL32(00000000), ref: 00DF0D4C
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00DF0D55
                        • HeapFree.KERNEL32(00000000), ref: 00DF0D5C
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00DF0D65
                        • HeapFree.KERNEL32(00000000), ref: 00DF0D6C
                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00DF0D78
                        • HeapFree.KERNEL32(00000000), ref: 00DF0D7F
                          • Part of subcall function 00DF1193: GetProcessHeap.KERNEL32(00000008,00DF0BB1,?,00000000,?,00DF0BB1,?), ref: 00DF11A1
                          • Part of subcall function 00DF1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00DF0BB1,?), ref: 00DF11A8
                          • Part of subcall function 00DF1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00DF0BB1,?), ref: 00DF11B7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                        • String ID:
                        • API String ID: 4175595110-0
                        • Opcode ID: 8a0a8b3c18ee2414a2694721ee7c8f1751e7fc16bf752ad0f1c515f07dc48b15
                        • Instruction ID: d5ef4e1d20f4a81ffdea16b2221c7e9d81d673fc9977406d820ac27dae1224a6
                        • Opcode Fuzzy Hash: 8a0a8b3c18ee2414a2694721ee7c8f1751e7fc16bf752ad0f1c515f07dc48b15
                        • Instruction Fuzzy Hash: CA716B7590020AAFDF209FA5DC45FFEBBBDAF04300F198515EA14A7192D771A949CB70
                        APIs
                        • OpenClipboard.USER32(00E2CC08), ref: 00E0EB29
                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 00E0EB37
                        • GetClipboardData.USER32(0000000D), ref: 00E0EB43
                        • CloseClipboard.USER32 ref: 00E0EB4F
                        • GlobalLock.KERNEL32(00000000), ref: 00E0EB87
                        • CloseClipboard.USER32 ref: 00E0EB91
                        • GlobalUnlock.KERNEL32(00000000), ref: 00E0EBBC
                        • IsClipboardFormatAvailable.USER32(00000001), ref: 00E0EBC9
                        • GetClipboardData.USER32(00000001), ref: 00E0EBD1
                        • GlobalLock.KERNEL32(00000000), ref: 00E0EBE2
                        • GlobalUnlock.KERNEL32(00000000), ref: 00E0EC22
                        • IsClipboardFormatAvailable.USER32(0000000F), ref: 00E0EC38
                        • GetClipboardData.USER32(0000000F), ref: 00E0EC44
                        • GlobalLock.KERNEL32(00000000), ref: 00E0EC55
                        • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00E0EC77
                        • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00E0EC94
                        • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00E0ECD2
                        • GlobalUnlock.KERNEL32(00000000), ref: 00E0ECF3
                        • CountClipboardFormats.USER32 ref: 00E0ED14
                        • CloseClipboard.USER32 ref: 00E0ED59
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                        • String ID:
                        • API String ID: 420908878-0
                        • Opcode ID: 8b26635bf52d13dee212ecb1c1e38befc8d624b35508bae6a0bb945f6dcba73a
                        • Instruction ID: b456c7ebc9961c465c68ea71504512c20bfed7af86240dc90bc9fd1bcee01d24
                        • Opcode Fuzzy Hash: 8b26635bf52d13dee212ecb1c1e38befc8d624b35508bae6a0bb945f6dcba73a
                        • Instruction Fuzzy Hash: 3461BF35204201AFD720EF25D895F6EB7A4EF84708F14592DF456A72E1CB31D98ACBA2
                        APIs
                        • FindFirstFileW.KERNEL32(?,?), ref: 00E069BE
                        • FindClose.KERNEL32(00000000), ref: 00E06A12
                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00E06A4E
                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00E06A75
                          • Part of subcall function 00D99CB3: _wcslen.LIBCMT ref: 00D99CBD
                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00E06AB2
                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00E06ADF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                        • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                        • API String ID: 3830820486-3289030164
                        • Opcode ID: 32b7131f0fb2ef00b744f6deb3b4042d8787c8ec20d143c4dac52969386f26b2
                        • Instruction ID: 2d138888cd9732b123d93ad95d52555cfc185804a4e1f8522049f68bc0b4f8fe
                        • Opcode Fuzzy Hash: 32b7131f0fb2ef00b744f6deb3b4042d8787c8ec20d143c4dac52969386f26b2
                        • Instruction Fuzzy Hash: 05D13CB2508300AEC710EBA4C891EABB7FCEF98704F44491DF599D6191EB74DA48CB72
                        APIs
                        • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00E09663
                        • GetFileAttributesW.KERNEL32(?), ref: 00E096A1
                        • SetFileAttributesW.KERNEL32(?,?), ref: 00E096BB
                        • FindNextFileW.KERNEL32(00000000,?), ref: 00E096D3
                        • FindClose.KERNEL32(00000000), ref: 00E096DE
                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00E096FA
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00E0974A
                        • SetCurrentDirectoryW.KERNEL32(00E56B7C), ref: 00E09768
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E09772
                        • FindClose.KERNEL32(00000000), ref: 00E0977F
                        • FindClose.KERNEL32(00000000), ref: 00E0978F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                        • String ID: *.*
                        • API String ID: 1409584000-438819550
                        • Opcode ID: 0f722bad5f7992dd8c552554f4509816aa62845d0659a47e8647b407a0e28e8f
                        • Instruction ID: 3368cb5cf5062011d98c215a602601f6bf80cb24d92d84bdaadf6ada9a626127
                        • Opcode Fuzzy Hash: 0f722bad5f7992dd8c552554f4509816aa62845d0659a47e8647b407a0e28e8f
                        • Instruction Fuzzy Hash: 4B31E232541619AECB20EFB5EC09ADE77AC9F09324F245156F805F30E2DB70DA898A64
                        APIs
                        • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00E097BE
                        • FindNextFileW.KERNEL32(00000000,?), ref: 00E09819
                        • FindClose.KERNEL32(00000000), ref: 00E09824
                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00E09840
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00E09890
                        • SetCurrentDirectoryW.KERNEL32(00E56B7C), ref: 00E098AE
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E098B8
                        • FindClose.KERNEL32(00000000), ref: 00E098C5
                        • FindClose.KERNEL32(00000000), ref: 00E098D5
                          • Part of subcall function 00DFDAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00DFDB00
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                        • String ID: *.*
                        • API String ID: 2640511053-438819550
                        • Opcode ID: 654126eadf1630a64df6a15cb6c6f9708043358c5044f551aa7ce095e311cea5
                        • Instruction ID: 3785e233d90a291fdf59a58b6cc5c0388fae1f7473be2efce3f9027c4dc27518
                        • Opcode Fuzzy Hash: 654126eadf1630a64df6a15cb6c6f9708043358c5044f551aa7ce095e311cea5
                        • Instruction Fuzzy Hash: 85310332501619AEDB24EFB5EC48ADE73ACDF06324F209155E810B32E2DB30D989CB34
                        APIs
                        • GetLocalTime.KERNEL32(?), ref: 00E08257
                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00E08267
                        • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00E08273
                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00E08310
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00E08324
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00E08356
                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00E0838C
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00E08395
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CurrentDirectoryTime$File$Local$System
                        • String ID: *.*
                        • API String ID: 1464919966-438819550
                        • Opcode ID: 31be88afa7f4af116f8246e4ab2aca69ac65d938a9446e5f1e64eb523457bee1
                        • Instruction ID: 89e5784a3aceb9b366b94fd25203a6e8d0c63e1aba939acabb6c8aceeccd9c86
                        • Opcode Fuzzy Hash: 31be88afa7f4af116f8246e4ab2aca69ac65d938a9446e5f1e64eb523457bee1
                        • Instruction Fuzzy Hash: 7F6181725083459FCB10EF60C9409AEB3E8FF89314F04491EF989E7261EB35E945CBA2
                        APIs
                          • Part of subcall function 00D93AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00D93A97,?,?,00D92E7F,?,?,?,00000000), ref: 00D93AC2
                          • Part of subcall function 00DFE199: GetFileAttributesW.KERNEL32(?,00DFCF95), ref: 00DFE19A
                        • FindFirstFileW.KERNEL32(?,?), ref: 00DFD122
                        • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00DFD1DD
                        • MoveFileW.KERNEL32(?,?), ref: 00DFD1F0
                        • DeleteFileW.KERNEL32(?,?,?,?), ref: 00DFD20D
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00DFD237
                          • Part of subcall function 00DFD29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00DFD21C,?,?), ref: 00DFD2B2
                        • FindClose.KERNEL32(00000000,?,?,?), ref: 00DFD253
                        • FindClose.KERNEL32(00000000), ref: 00DFD264
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                        • String ID: \*.*
                        • API String ID: 1946585618-1173974218
                        • Opcode ID: e18d9624acc6647e3c301474bd85d0f421df14b18704599b9910f482e988e93c
                        • Instruction ID: d24d51247ea389ff5d9c87663f9ae9b87baefca5d80fa2ab2af03e1e70b59ce6
                        • Opcode Fuzzy Hash: e18d9624acc6647e3c301474bd85d0f421df14b18704599b9910f482e988e93c
                        • Instruction Fuzzy Hash: D4615A3180120DAECF15EBA4CA929FDB776EF15304F258169E502771A1EB31AF09CBB1
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                        • String ID:
                        • API String ID: 1737998785-0
                        • Opcode ID: d1b8a7b3379c02959d49c380420d4cf846a68b83b1d48d42d354d891c866ddb5
                        • Instruction ID: dcea4793fff5ba687547ad069de1b3aa9fc4d965bae93c800bcdd22a0f5c094e
                        • Opcode Fuzzy Hash: d1b8a7b3379c02959d49c380420d4cf846a68b83b1d48d42d354d891c866ddb5
                        • Instruction Fuzzy Hash: F641B1352046119FD720DF26D848F19BBE1EF44318F14D4A9E41AAB7A2C735FC86CB90
                        APIs
                          • Part of subcall function 00DF16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00DF170D
                          • Part of subcall function 00DF16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00DF173A
                          • Part of subcall function 00DF16C3: GetLastError.KERNEL32 ref: 00DF174A
                        • ExitWindowsEx.USER32(?,00000000), ref: 00DFE932
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                        • String ID: $ $@$SeShutdownPrivilege
                        • API String ID: 2234035333-3163812486
                        • Opcode ID: 1bd0a4e85924fe358c2c7d95ae416a6b135eaaa3a88e516d3d61f2484c227233
                        • Instruction ID: 09df135572b92b3c8f97248229607e35def014a7e8430148b2a68a5586fe05e0
                        • Opcode Fuzzy Hash: 1bd0a4e85924fe358c2c7d95ae416a6b135eaaa3a88e516d3d61f2484c227233
                        • Instruction Fuzzy Hash: 8F01D672610319AFEB6467B59C86FBF739C9B14751F1A8921FE02F21E2D9E09C4489F0
                        APIs
                        • socket.WSOCK32(00000002,00000001,00000006), ref: 00E11276
                        • WSAGetLastError.WSOCK32 ref: 00E11283
                        • bind.WSOCK32(00000000,?,00000010), ref: 00E112BA
                        • WSAGetLastError.WSOCK32 ref: 00E112C5
                        • closesocket.WSOCK32(00000000), ref: 00E112F4
                        • listen.WSOCK32(00000000,00000005), ref: 00E11303
                        • WSAGetLastError.WSOCK32 ref: 00E1130D
                        • closesocket.WSOCK32(00000000), ref: 00E1133C
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ErrorLast$closesocket$bindlistensocket
                        • String ID:
                        • API String ID: 540024437-0
                        • Opcode ID: e57368f7f6a05dbce7bc2d8922f74d7df6a7c509eeda1a06c95a55d7e1980036
                        • Instruction ID: d1a2ef6ce8959ef55580709c735873fbd824e6deaa0a1556f6d27c7ed186b068
                        • Opcode Fuzzy Hash: e57368f7f6a05dbce7bc2d8922f74d7df6a7c509eeda1a06c95a55d7e1980036
                        • Instruction Fuzzy Hash: 3741A2316001409FD724DF24C484BA9BBE5AF46318F2980C8D956AF2A6C771EC86CBE1
                        APIs
                        • _free.LIBCMT ref: 00DCB9D4
                        • _free.LIBCMT ref: 00DCB9F8
                        • _free.LIBCMT ref: 00DCBB7F
                        • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00E33700), ref: 00DCBB91
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00E6121C,000000FF,00000000,0000003F,00000000,?,?), ref: 00DCBC09
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00E61270,000000FF,?,0000003F,00000000,?), ref: 00DCBC36
                        • _free.LIBCMT ref: 00DCBD4B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _free$ByteCharMultiWide$InformationTimeZone
                        • String ID:
                        • API String ID: 314583886-0
                        • Opcode ID: aea3e9877b7c12cb12accabedee3dbe8670afe8ed434fb79f749f5f6bfeb66eb
                        • Instruction ID: 512993c5f8418a2715e702dcb7f5bb44e67c37b09c3b7db45692d1965cc04362
                        • Opcode Fuzzy Hash: aea3e9877b7c12cb12accabedee3dbe8670afe8ed434fb79f749f5f6bfeb66eb
                        • Instruction Fuzzy Hash: DFC12371900246AECB219F799C52FAA7BA9EF41370F18419FE491E7251EB70CE01CB70
                        APIs
                          • Part of subcall function 00D93AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00D93A97,?,?,00D92E7F,?,?,?,00000000), ref: 00D93AC2
                          • Part of subcall function 00DFE199: GetFileAttributesW.KERNEL32(?,00DFCF95), ref: 00DFE19A
                        • FindFirstFileW.KERNEL32(?,?), ref: 00DFD420
                        • DeleteFileW.KERNEL32(?,?,?,?), ref: 00DFD470
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00DFD481
                        • FindClose.KERNEL32(00000000), ref: 00DFD498
                        • FindClose.KERNEL32(00000000), ref: 00DFD4A1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                        • String ID: \*.*
                        • API String ID: 2649000838-1173974218
                        • Opcode ID: 4eaaf3abe3126ca65f9e61aa5604ccf5fa1b7bc86edff0be345b373a9d3307ac
                        • Instruction ID: d8fb897ce627d2b1c362692282b376c2a1f7a1cf65c0fdb32ff28d97a94bbb5e
                        • Opcode Fuzzy Hash: 4eaaf3abe3126ca65f9e61aa5604ccf5fa1b7bc86edff0be345b373a9d3307ac
                        • Instruction Fuzzy Hash: 59315C32008345AFC714EF64D8918AFB7A9EEA1304F448A1DF5D5921A1EB30AA099B72
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: __floor_pentium4
                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                        • API String ID: 4168288129-2761157908
                        • Opcode ID: 00e6c15cb37904da047399a3976b5d9b7eb29531c7c30ae6cd93150de18d0714
                        • Instruction ID: 0b2398345367870345c2ac97f124251c41284caf813d7dfc9c19b5302618a493
                        • Opcode Fuzzy Hash: 00e6c15cb37904da047399a3976b5d9b7eb29531c7c30ae6cd93150de18d0714
                        • Instruction Fuzzy Hash: ECC20AB1E046298FDB25CF289D40BE9B7B6EB48305F1941EED44DE7241E774AE818F60
                        APIs
                        • _wcslen.LIBCMT ref: 00E064DC
                        • CoInitialize.OLE32(00000000), ref: 00E06639
                        • CoCreateInstance.OLE32(00E2FCF8,00000000,00000001,00E2FB68,?), ref: 00E06650
                        • CoUninitialize.OLE32 ref: 00E068D4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                        • String ID: .lnk
                        • API String ID: 886957087-24824748
                        • Opcode ID: 9da74021911473652a10d45dc687a38062598e5635560c1a22514b5bdd317ac4
                        • Instruction ID: f6f570dc5e817c26c051b2e9b62f30b12b162263b585228c5712dd948e55185c
                        • Opcode Fuzzy Hash: 9da74021911473652a10d45dc687a38062598e5635560c1a22514b5bdd317ac4
                        • Instruction Fuzzy Hash: 55D15871508301AFC714EF24C891A6BB7E9FF98304F10496DF5959B2A1EB70E949CBA2
                        APIs
                        • GetForegroundWindow.USER32(?,?,00000000), ref: 00E122E8
                          • Part of subcall function 00E0E4EC: GetWindowRect.USER32(?,?), ref: 00E0E504
                        • GetDesktopWindow.USER32 ref: 00E12312
                        • GetWindowRect.USER32(00000000), ref: 00E12319
                        • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00E12355
                        • GetCursorPos.USER32(?), ref: 00E12381
                        • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00E123DF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Window$Rectmouse_event$CursorDesktopForeground
                        • String ID:
                        • API String ID: 2387181109-0
                        • Opcode ID: be9dfb3e9f1bbadbb01c3265ea693747d52fe13dbb8e9c437576d7e06dc7c8ec
                        • Instruction ID: d3921e0e9741de712e87e614c6ff7ad088a702b6c1d82145819ccf7277b09546
                        • Opcode Fuzzy Hash: be9dfb3e9f1bbadbb01c3265ea693747d52fe13dbb8e9c437576d7e06dc7c8ec
                        • Instruction Fuzzy Hash: 9D310272104316AFCB20DF15CC44B9BB7A9FF84714F10191DFA94A7191DB34EA59CBA2
                        APIs
                          • Part of subcall function 00D99CB3: _wcslen.LIBCMT ref: 00D99CBD
                        • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00E09B78
                        • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00E09C8B
                          • Part of subcall function 00E03874: GetInputState.USER32 ref: 00E038CB
                          • Part of subcall function 00E03874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E03966
                        • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00E09BA8
                        • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00E09C75
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                        • String ID: *.*
                        • API String ID: 1972594611-438819550
                        • Opcode ID: 4bebd625828f711061f2a9bc85075e677a27950f8782b3c1b864627bcba44efa
                        • Instruction ID: ee64b4879e59562253e28c5641898dd85019bc9be1aa3204e09a0dfa1a0ca85a
                        • Opcode Fuzzy Hash: 4bebd625828f711061f2a9bc85075e677a27950f8782b3c1b864627bcba44efa
                        • Instruction Fuzzy Hash: 4D417F71D0020A9FDF14EF64C885AEEBBB8EF05314F24515AE805B21D2EB309E84CF60
                        Strings
                        • VUUU, xrefs: 00DD5DF0
                        • VUUU, xrefs: 00D983FA
                        • 2d0ad0c99b0571a9d88dce1e6d4708399fafc10ea6855658149b5f6881f0ff2e82be4b48bc761deee85fa51f2ac5e3cf88bcfa89e727da99342ec30e974523a852, xrefs: 00DD5D0F
                        • VUUU, xrefs: 00D983E8
                        • VUUU, xrefs: 00D9843C
                        • ERCP, xrefs: 00D9813C
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID:
                        • String ID: 2d0ad0c99b0571a9d88dce1e6d4708399fafc10ea6855658149b5f6881f0ff2e82be4b48bc761deee85fa51f2ac5e3cf88bcfa89e727da99342ec30e974523a852$ERCP$VUUU$VUUU$VUUU$VUUU
                        • API String ID: 0-2439842941
                        • Opcode ID: 88f88d2861974fe8a04457afe553d56468fd0d30cdbdecbe7b8c87ff63de44b4
                        • Instruction ID: 56fdd0d5b4c655da896e9b9549409475af24fa429daaed537210a357178467db
                        • Opcode Fuzzy Hash: 88f88d2861974fe8a04457afe553d56468fd0d30cdbdecbe7b8c87ff63de44b4
                        • Instruction Fuzzy Hash: B6A27071E0061ACBDF24CF58C8407AEB7B1BF55710F2881AAE855AB385DB70DD81DBA0
                        APIs
                          • Part of subcall function 00DA9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DA9BB2
                        • DefDlgProcW.USER32(?,?,?,?,?), ref: 00DA9A4E
                        • GetSysColor.USER32(0000000F), ref: 00DA9B23
                        • SetBkColor.GDI32(?,00000000), ref: 00DA9B36
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Color$LongProcWindow
                        • String ID:
                        • API String ID: 3131106179-0
                        • Opcode ID: 56fe563b1fb71db1972576ec5cb720363faa42ba2f884ae93218c17c69603826
                        • Instruction ID: cdff226fb3feaece7ed6de4ca9d3e40344e3d68a9fad3e56c6ca483c8e54846c
                        • Opcode Fuzzy Hash: 56fe563b1fb71db1972576ec5cb720363faa42ba2f884ae93218c17c69603826
                        • Instruction Fuzzy Hash: 11A17D71208494BEE769BA3E9CA8E7FB6DDEB83350F1C010AF442E6592CA25DD01D371
                        APIs
                          • Part of subcall function 00E1304E: inet_addr.WSOCK32(?), ref: 00E1307A
                          • Part of subcall function 00E1304E: _wcslen.LIBCMT ref: 00E1309B
                        • socket.WSOCK32(00000002,00000002,00000011), ref: 00E1185D
                        • WSAGetLastError.WSOCK32 ref: 00E11884
                        • bind.WSOCK32(00000000,?,00000010), ref: 00E118DB
                        • WSAGetLastError.WSOCK32 ref: 00E118E6
                        • closesocket.WSOCK32(00000000), ref: 00E11915
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                        • String ID:
                        • API String ID: 1601658205-0
                        • Opcode ID: 9f80c334879c6a1c8bf71f8c2cebf8045bf868a02104c096e58a228c226ff6d7
                        • Instruction ID: 2c6f51aee57018778ff97c618f8fa0a65e79a675671515369aa529abc817cc27
                        • Opcode Fuzzy Hash: 9f80c334879c6a1c8bf71f8c2cebf8045bf868a02104c096e58a228c226ff6d7
                        • Instruction Fuzzy Hash: 51519271A002109FDB14AF24C886F6A7BE5EB89718F588098F9196F2D3D771ED418BB1
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                        • String ID:
                        • API String ID: 292994002-0
                        • Opcode ID: a990258b7e71d39a69fe05a756f9ea6584f30801895b50e96fdfc058521ba7d7
                        • Instruction ID: 7f0492301f004bd575267a74298045c0fb924f3a035a6260ce6ffd37254ff56b
                        • Opcode Fuzzy Hash: a990258b7e71d39a69fe05a756f9ea6584f30801895b50e96fdfc058521ba7d7
                        • Instruction Fuzzy Hash: 862129357402205FD7248F1AE845B6ABBE5FFA4315F1990ACE846EB351C771EE42CB90
                        APIs
                        • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00DF82AA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: lstrlen
                        • String ID: ($tb$|
                        • API String ID: 1659193697-1968160224
                        • Opcode ID: f6d12516ce9db60c3bb4f099683536c5a27931c54307c99d166b5d42826248f1
                        • Instruction ID: f0fce36f5b2e777f036e39a714077a8333cbdb85b5be3d648f2b1542c55184e3
                        • Opcode Fuzzy Hash: f6d12516ce9db60c3bb4f099683536c5a27931c54307c99d166b5d42826248f1
                        • Instruction Fuzzy Hash: 88324775A007059FCB28CF59C081A6AB7F0FF48710B16C56EE59ADB3A1EB70E941CB50
                        APIs
                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00E1A6AC
                        • Process32FirstW.KERNEL32(00000000,?), ref: 00E1A6BA
                          • Part of subcall function 00D99CB3: _wcslen.LIBCMT ref: 00D99CBD
                        • Process32NextW.KERNEL32(00000000,?), ref: 00E1A79C
                        • CloseHandle.KERNEL32(00000000), ref: 00E1A7AB
                          • Part of subcall function 00DACE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00DD3303,?), ref: 00DACE8A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                        • String ID:
                        • API String ID: 1991900642-0
                        • Opcode ID: c37a473784471a598f6ea019b3f072220606337391c15f2e6fc0dade844a38b0
                        • Instruction ID: 07e98c31dd2a56a027402304f55f18b42dfdcdcdc45a7d381bc9801f029c5383
                        • Opcode Fuzzy Hash: c37a473784471a598f6ea019b3f072220606337391c15f2e6fc0dade844a38b0
                        • Instruction Fuzzy Hash: C9515C71508300AFD710EF25C886A6FBBE8FF89754F44492DF599A7291EB30D904CBA2
                        APIs
                        • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00DFAAAC
                        • SetKeyboardState.USER32(00000080), ref: 00DFAAC8
                        • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00DFAB36
                        • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00DFAB88
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: KeyboardState$InputMessagePostSend
                        • String ID:
                        • API String ID: 432972143-0
                        • Opcode ID: bb36a03f838be9ab6e6bd8d63e098294bc3785544c411f0da254949313a9c587
                        • Instruction ID: 4d5ae611746d1380fa46daccff4fa979343a41eea2a7c741b8db21237dd225d8
                        • Opcode Fuzzy Hash: bb36a03f838be9ab6e6bd8d63e098294bc3785544c411f0da254949313a9c587
                        • Instruction Fuzzy Hash: DD3116B0A4034CAEFB358B6DCC05BFA7BA6AB44310F19C21AF699561D0D374C985C772
                        APIs
                        • InternetReadFile.WININET(?,?,00000400,?), ref: 00E0CE89
                        • GetLastError.KERNEL32(?,00000000), ref: 00E0CEEA
                        • SetEvent.KERNEL32(?,?,00000000), ref: 00E0CEFE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ErrorEventFileInternetLastRead
                        • String ID:
                        • API String ID: 234945975-0
                        • Opcode ID: 28ed2428d187476a153a3c74d30a308951b9a5221a4c607f946dcd1838ec7689
                        • Instruction ID: 456910fbc273c960698c2c74a0e19608bace06cd2743378ba862bd5ea0ee708b
                        • Opcode Fuzzy Hash: 28ed2428d187476a153a3c74d30a308951b9a5221a4c607f946dcd1838ec7689
                        • Instruction Fuzzy Hash: 27218E71500705DFD730DFA5C944BAB77F8EB40358F20451AE646E2191E770E98A8B64
                        APIs
                        • lstrlenW.KERNEL32(?,00DD5222), ref: 00DFDBCE
                        • GetFileAttributesW.KERNEL32(?), ref: 00DFDBDD
                        • FindFirstFileW.KERNEL32(?,?), ref: 00DFDBEE
                        • FindClose.KERNEL32(00000000), ref: 00DFDBFA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: FileFind$AttributesCloseFirstlstrlen
                        • String ID:
                        • API String ID: 2695905019-0
                        • Opcode ID: 621a68884707cc5199bdd68f5f4f7134783ea88abc3f7580b91b9ee5ca16a426
                        • Instruction ID: c382d692ac998e95902a0fc751325cb17060e5fe28f063574be8be1843ffc30d
                        • Opcode Fuzzy Hash: 621a68884707cc5199bdd68f5f4f7134783ea88abc3f7580b91b9ee5ca16a426
                        • Instruction Fuzzy Hash: 07F0A7314109149B82306B78DC0D47E377E9F05334B288702F576D20F0EBF0595985E5
                        APIs
                        • FindFirstFileW.KERNEL32(?,?), ref: 00E05CC1
                        • FindNextFileW.KERNEL32(00000000,?), ref: 00E05D17
                        • FindClose.KERNEL32(?), ref: 00E05D5F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Find$File$CloseFirstNext
                        • String ID:
                        • API String ID: 3541575487-0
                        • Opcode ID: 7fac8058c03fa46bd0e9213b35a7f2ea474e07612db33380d95b7122130f1365
                        • Instruction ID: 8219632c04cd413031d3a15e49c1e18b906d18d19a3b7d8eff60869d372ba931
                        • Opcode Fuzzy Hash: 7fac8058c03fa46bd0e9213b35a7f2ea474e07612db33380d95b7122130f1365
                        • Instruction Fuzzy Hash: 3151A936604A019FC714CF28C494E9AB7E4FF49318F14855EE99A9B3A1DB30EC44CFA1
                        APIs
                        • IsDebuggerPresent.KERNEL32 ref: 00DC271A
                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00DC2724
                        • UnhandledExceptionFilter.KERNEL32(?), ref: 00DC2731
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                        • String ID:
                        • API String ID: 3906539128-0
                        • Opcode ID: 966932f6ef9ed801f3fdfc73ef6490b0af477cb2c99f966dc003d8f014aa3321
                        • Instruction ID: 5d17944d56b8d8d98a7e7ab4665a3f508e05947534898bf816b7c56e2163460b
                        • Opcode Fuzzy Hash: 966932f6ef9ed801f3fdfc73ef6490b0af477cb2c99f966dc003d8f014aa3321
                        • Instruction Fuzzy Hash: 0431C4759412189BCB21DF64DC88BDDBBB8EF08310F5045EAE41CA72A1E7309F858F54
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 00E051DA
                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00E05238
                        • SetErrorMode.KERNEL32(00000000), ref: 00E052A1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ErrorMode$DiskFreeSpace
                        • String ID:
                        • API String ID: 1682464887-0
                        • Opcode ID: 5f0cf488e538fbad737d61421b7bad8d39be5adb0b55821d3c6a040598c1a542
                        • Instruction ID: bcca707add3812ef2940a063a42a4957c12d1ec6baf18832e40dd8e7afc266f4
                        • Opcode Fuzzy Hash: 5f0cf488e538fbad737d61421b7bad8d39be5adb0b55821d3c6a040598c1a542
                        • Instruction Fuzzy Hash: 86316175A00518DFDB00DF55D885EAEBBB5FF49318F148099E805AB3A2DB31EC56CB60
                        APIs
                          • Part of subcall function 00DAFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00DB0668
                          • Part of subcall function 00DAFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00DB0685
                        • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00DF170D
                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00DF173A
                        • GetLastError.KERNEL32 ref: 00DF174A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                        • String ID:
                        • API String ID: 577356006-0
                        • Opcode ID: a9fa17a27275fb858b0d316e660318468910442f454f8c8fd23b4be4cf3b2a2e
                        • Instruction ID: 6c3e3857b9cd9d813af389f8cd1b5dbc5c660b199fc45320ac9496f4f5a39bfc
                        • Opcode Fuzzy Hash: a9fa17a27275fb858b0d316e660318468910442f454f8c8fd23b4be4cf3b2a2e
                        • Instruction Fuzzy Hash: 4F11CEB2400308EFE728AF64DC86D6AB7B9EB04714B20C56EE45693241EB70FC428A70
                        APIs
                        • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00DFD608
                        • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00DFD645
                        • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00DFD650
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CloseControlCreateDeviceFileHandle
                        • String ID:
                        • API String ID: 33631002-0
                        • Opcode ID: b395b2864d4f0bc7ae65ec77d385edfd5ec347e2a55b6931ec2a8f3b53c46b5a
                        • Instruction ID: 49289a9b332555ea78918c0184dc31106b3896ec4c0b10926df99723fdbb4446
                        • Opcode Fuzzy Hash: b395b2864d4f0bc7ae65ec77d385edfd5ec347e2a55b6931ec2a8f3b53c46b5a
                        • Instruction Fuzzy Hash: 8B115E75E05228BFDB208F95DC45FAFBBBDEB45B60F108155F904F7290D6704A058BA1
                        APIs
                        • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00DF168C
                        • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00DF16A1
                        • FreeSid.ADVAPI32(?), ref: 00DF16B1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: AllocateCheckFreeInitializeMembershipToken
                        • String ID:
                        • API String ID: 3429775523-0
                        • Opcode ID: 2a9a66e1248ffa9e827e6cfab08a5f55cb4f5e4c3786de01ee6428ad926e5463
                        • Instruction ID: e35e1511f47c3a56ccea43d33c1e69952bab92242a62b0bb81d2c6ffbd4dfc04
                        • Opcode Fuzzy Hash: 2a9a66e1248ffa9e827e6cfab08a5f55cb4f5e4c3786de01ee6428ad926e5463
                        • Instruction Fuzzy Hash: 0CF0447194030CFFDB00CFE0CC89EAEBBBCFB08240F204460E500E2180E330AA088A60
                        APIs
                        • GetCurrentProcess.KERNEL32(00DC28E9,?,00DB4CBE,00DC28E9,00E588B8,0000000C,00DB4E15,00DC28E9,00000002,00000000,?,00DC28E9), ref: 00DB4D09
                        • TerminateProcess.KERNEL32(00000000,?,00DB4CBE,00DC28E9,00E588B8,0000000C,00DB4E15,00DC28E9,00000002,00000000,?,00DC28E9), ref: 00DB4D10
                        • ExitProcess.KERNEL32 ref: 00DB4D22
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Process$CurrentExitTerminate
                        • String ID:
                        • API String ID: 1703294689-0
                        • Opcode ID: a70ad30c28958eb840798f80aed47d310543f17987318f64677b3a47d938a918
                        • Instruction ID: 425b566dae1bfe7b773ade39aa4d0525fb347219b363a1b59b23654d0db91b0e
                        • Opcode Fuzzy Hash: a70ad30c28958eb840798f80aed47d310543f17987318f64677b3a47d938a918
                        • Instruction Fuzzy Hash: 57E0B631000548EFCF21EF55DD0AA9C3B69FB41795B248458FC069B123CB35DD56DBA4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID:
                        • String ID: /
                        • API String ID: 0-2043925204
                        • Opcode ID: e5b9240d4ef2c59873a2cf72fb6d45cb64bba693f833e92e2d8d4ba9ebe34f57
                        • Instruction ID: 01a48e2b9cf5269194d578ec784621d095813b1d040369cd9c49555d7b42fdda
                        • Opcode Fuzzy Hash: e5b9240d4ef2c59873a2cf72fb6d45cb64bba693f833e92e2d8d4ba9ebe34f57
                        • Instruction Fuzzy Hash: EC41387250021AAFCB249FB9DC88EBB77B8EB84314F14826DFA09D7180E6309D41CB74
                        APIs
                        • GetUserNameW.ADVAPI32(?,?), ref: 00DED28C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: NameUser
                        • String ID: X64
                        • API String ID: 2645101109-893830106
                        • Opcode ID: b6af898b02bc29bda7e1a0ac7173b6189935813091f5cc2a902af05a1bfa552a
                        • Instruction ID: 2b3450039ccf088b694e31956149cec40812d5adda3d9d6af013bc2d8d06f538
                        • Opcode Fuzzy Hash: b6af898b02bc29bda7e1a0ac7173b6189935813091f5cc2a902af05a1bfa552a
                        • Instruction Fuzzy Hash: 19D0CAB480112DEECBA0DBA0EC88DDEB3BCBB04305F200292F246A2000DB3496898F20
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                        • Instruction ID: 7434fd61c2505fdf254a132aae5cd03f258e51c44303af7dcdf83ee5817755d8
                        • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                        • Instruction Fuzzy Hash: 7E021D71E11119DBDF14CFA9C8806EEBBF1FF58314F29516AE81AEB340D731A9418BA4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID:
                        • String ID: Variable is not of type 'Object'.$p#
                        • API String ID: 0-1086706999
                        • Opcode ID: bbfbb234d74bb2667fd9eecb0cd960ca10fa0df938c4b5164ba19ad9bc6f04a0
                        • Instruction ID: 83341e8b87469319a7fc5d11449f9e9ea4430a7cf33bf3560874335966d5e6c8
                        • Opcode Fuzzy Hash: bbfbb234d74bb2667fd9eecb0cd960ca10fa0df938c4b5164ba19ad9bc6f04a0
                        • Instruction Fuzzy Hash: A932AC70910218DBCF14EF94C885BEDBBB5FF05304F689069E846AB292D775AE85CB70
                        APIs
                        • FindFirstFileW.KERNEL32(?,?), ref: 00E06918
                        • FindClose.KERNEL32(00000000), ref: 00E06961
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Find$CloseFileFirst
                        • String ID:
                        • API String ID: 2295610775-0
                        • Opcode ID: 3d00e982a5193079fac4a84e52ec740d3af89a579f46357d60f85e3a4a5deb0f
                        • Instruction ID: 9622614db4a83be6a40f5d0ff616abd17565e70eb14dfc566c62199ac53a0583
                        • Opcode Fuzzy Hash: 3d00e982a5193079fac4a84e52ec740d3af89a579f46357d60f85e3a4a5deb0f
                        • Instruction Fuzzy Hash: 8F1190326146019FC710DF29D484A1ABBE5FF85328F54C699F4699F6A2CB30EC45CBA1
                        APIs
                        • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00E14891,?,?,00000035,?), ref: 00E037E4
                        • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00E14891,?,?,00000035,?), ref: 00E037F4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ErrorFormatLastMessage
                        • String ID:
                        • API String ID: 3479602957-0
                        • Opcode ID: 3176dd394cc83af704f073bffdf12bbe509dad2f1ec9a6f9826a8298330d551e
                        • Instruction ID: 31f567ca3c05ec0eb04ca7f3355f79128f478f91389674a70ee06d133c22202d
                        • Opcode Fuzzy Hash: 3176dd394cc83af704f073bffdf12bbe509dad2f1ec9a6f9826a8298330d551e
                        • Instruction Fuzzy Hash: B1F0E5B16042286AEB2057B68C4DFEB7AAEEFC8761F000266F509E22D5D9609945C6B0
                        APIs
                        • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00DFB25D
                        • keybd_event.USER32(?,75A8C0D0,?,00000000), ref: 00DFB270
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: InputSendkeybd_event
                        • String ID:
                        • API String ID: 3536248340-0
                        • Opcode ID: d49bf3874ca39ddd78f2f13b0ab21d1e813d586993ddc762ac8d8b8c212287bf
                        • Instruction ID: 3165c2a00f33cfa441c0d344c6561d1ec3a4dfb96448064fa57d83e1721d121f
                        • Opcode Fuzzy Hash: d49bf3874ca39ddd78f2f13b0ab21d1e813d586993ddc762ac8d8b8c212287bf
                        • Instruction Fuzzy Hash: D1F01D7180424DAFDF159FA1C805BBE7BB4FF08315F14800AF955A5191C379C6159FA4
                        APIs
                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00DF11FC), ref: 00DF10D4
                        • CloseHandle.KERNEL32(?,?,00DF11FC), ref: 00DF10E9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: AdjustCloseHandlePrivilegesToken
                        • String ID:
                        • API String ID: 81990902-0
                        • Opcode ID: 33eb70891049664708882c80f34d5d7b60a76d5fd06c112e8e5d70181cfe3ba3
                        • Instruction ID: 9b52297fe2e99e040800dd7b7d17bd7431afcb8087a7d45329f50ff7bbbb92d2
                        • Opcode Fuzzy Hash: 33eb70891049664708882c80f34d5d7b60a76d5fd06c112e8e5d70181cfe3ba3
                        • Instruction Fuzzy Hash: 27E04F32004600EEE7352B61FC05E7777E9EB04320B24886DF5A5804B1DB626CA1DB64
                        APIs
                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00DC6766,?,?,00000008,?,?,00DCFEFE,00000000), ref: 00DC6998
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ExceptionRaise
                        • String ID:
                        • API String ID: 3997070919-0
                        • Opcode ID: 87c17d407ffb6e1dc9e7febcef1e84d276bb0cacf897856fc2f0b7fe385540f5
                        • Instruction ID: 4f0325b3b67a16c4ac40476194513d215ca7cd7b4b28de5051bbcdb8fe15464d
                        • Opcode Fuzzy Hash: 87c17d407ffb6e1dc9e7febcef1e84d276bb0cacf897856fc2f0b7fe385540f5
                        • Instruction Fuzzy Hash: EBB1193161060A9FDB15CF28C486B657BA0FF45364F29865CE89ACF2E2C735E991CB50
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID: 0-3916222277
                        • Opcode ID: 1b78d1e1176ddcdb9d499572ef6ee050b6a93472d59b4b509003db6cbe8cc1e1
                        • Instruction ID: 4b47212f96fc2fbebe8d40d07dc52e07d270d6ec2c3325fa9c298c35a300757c
                        • Opcode Fuzzy Hash: 1b78d1e1176ddcdb9d499572ef6ee050b6a93472d59b4b509003db6cbe8cc1e1
                        • Instruction Fuzzy Hash: A41261719002299FCB14DF59C8806EEB7F5FF49710F14819AE849EB256DB709E81DFA0
                        APIs
                        • BlockInput.USER32(00000001), ref: 00E0EABD
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: BlockInput
                        • String ID:
                        • API String ID: 3456056419-0
                        • Opcode ID: 9a9fcb87924f767b155ddbe2c93449e7cfe16e43fb56acae019c9cbbd5975af7
                        • Instruction ID: 33c7653a582834c3566fb8bbbe9e75ea9285c7ed3c09e4db33adae2176f248bf
                        • Opcode Fuzzy Hash: 9a9fcb87924f767b155ddbe2c93449e7cfe16e43fb56acae019c9cbbd5975af7
                        • Instruction Fuzzy Hash: CBE01A322102049FC710EF5AD804E9AB7E9EF987A0F018426FC49D73A1DA70A8818BA0
                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,00DB03EE), ref: 00DB09DA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: 8c6fe2ebac8181b4a5ac6ace3d270f1e7a225fa2131357f43effa1dd485e2d6d
                        • Instruction ID: 94e2c70edaec0fbd3504cf6e1a98b998680e5728b4f411c9fbe036d41437bcaf
                        • Opcode Fuzzy Hash: 8c6fe2ebac8181b4a5ac6ace3d270f1e7a225fa2131357f43effa1dd485e2d6d
                        • Instruction Fuzzy Hash:
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0
                        • API String ID: 0-4108050209
                        • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                        • Instruction ID: 0290c3186d872deb68145c63c1780b57f0c640221cfc4f3dfc16b7a5b5af4c86
                        • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                        • Instruction Fuzzy Hash: 9451567960C705DBDF388968885ABFE6799DBC2340F1C050AD8C7D7282CA15DE01E776
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0&
                        • API String ID: 0-2523485602
                        • Opcode ID: b7ba3beda5157eaba8b842830eead4d690e94bf06e20e8ae23493e3606df0e0b
                        • Instruction ID: a9ea56fd93bf81095e4404e390349e53f9f95c916f02304aad37a619b9097462
                        • Opcode Fuzzy Hash: b7ba3beda5157eaba8b842830eead4d690e94bf06e20e8ae23493e3606df0e0b
                        • Instruction Fuzzy Hash: 3521E7327206118BDB28CF79C82367E73E5A764310F14862EE5A7E37D0DE76A944CB90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ad9577e35232dd8a26845f1d1004e7fc43a101dcbfdf29d691cf79d3e0de248f
                        • Instruction ID: a5a0bb3158c87baaae5b4515dbd8676b6a8b9ede75da41fce73da3a3e6b0e8f8
                        • Opcode Fuzzy Hash: ad9577e35232dd8a26845f1d1004e7fc43a101dcbfdf29d691cf79d3e0de248f
                        • Instruction Fuzzy Hash: 18324631D28F064DD7239636DC26335A689AFB73C5F25C73BF81AB69A5EB29C4834100
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 20a8fb1383ca11f3a850022e356d110c53d9f390753d0b4683451e7b52be77f7
                        • Instruction ID: 35e7b50b07cdf6800e47889e2d0f948c94e73a2e48dabd3e52a3a7302972f94a
                        • Opcode Fuzzy Hash: 20a8fb1383ca11f3a850022e356d110c53d9f390753d0b4683451e7b52be77f7
                        • Instruction Fuzzy Hash: 14323A31A241958FCF28EF2AC49067D77A1EF46324F2CA56AD499DB291D230DD83DB70
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 15a17b05d0b73f0f757ad25a3e637ccff820e4eed17484b383894a516af61135
                        • Instruction ID: 3a3a571c784cab1638243e03eac41e460cc5c9f328c735d50dcdf8b4c3224837
                        • Opcode Fuzzy Hash: 15a17b05d0b73f0f757ad25a3e637ccff820e4eed17484b383894a516af61135
                        • Instruction Fuzzy Hash: 94229D70A00609DFDF14CFA8D881AAEB7B5FF44304F14462AE856A7395EB36E914CB70
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 98e3569a037f9d3d1af31aadd05140ab8b85c17088d6fc4639d91fc7a05b5131
                        • Instruction ID: 0aef184cd338fc2125e33999a70b024d743a9e2bd49fb4dd701e2d10198e2a62
                        • Opcode Fuzzy Hash: 98e3569a037f9d3d1af31aadd05140ab8b85c17088d6fc4639d91fc7a05b5131
                        • Instruction Fuzzy Hash: 1202C7B1A00205EFDF05EF64D881AAEB7B1FF44300F558169E8569B391EB31EA14CBB5
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                        • Instruction ID: 059eaa716d7b4c2b6979842729011f06523d0fe54fbe86c97dc4153ae4ef7ba9
                        • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                        • Instruction Fuzzy Hash: 7D91B43A2090E38ADB2D427A84740BEFFE15A923A139E079DD4F3CA1C5FE14D569D630
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 58fcb1bf78fb8f34be3b3b544c28523ffa9fc97f464bd6df51ac0e7594d5b01a
                        • Instruction ID: e29f8f24ed1eff493c36524c43688f8d6a4a887a5ff3ce925521ddda2cfd5035
                        • Opcode Fuzzy Hash: 58fcb1bf78fb8f34be3b3b544c28523ffa9fc97f464bd6df51ac0e7594d5b01a
                        • Instruction Fuzzy Hash: 77614871608709E7DE749A288D95BFE2398DFC1700F18091DE887DB2D1DA11DE42DB79
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 99b5b89e4e05cb5e4854819ae961dc4519d5fba01db963791503789964134a83
                        • Instruction ID: 0e03dc5de443822f9a6e87486c751ee88563ad391f44e24acccae335e2b3f205
                        • Opcode Fuzzy Hash: 99b5b89e4e05cb5e4854819ae961dc4519d5fba01db963791503789964134a83
                        • Instruction Fuzzy Hash: CF61377160870AD7DE385A2888A5BFE2398EFC2780F18095DF983DF681DA12DD42D375
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                        • Instruction ID: 6d4aadd49476e7b2620a955c5fce9b1c0f5b8c0959070551ef987401b03a7657
                        • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                        • Instruction Fuzzy Hash: F581523A6090E389DB6D463A85344BEFFE16A923A135E079DD4F3CB1C1EE24C558DA30
                        Memory Dump Source
                        • Source File: 00000000.00000002.2224909717.0000000003700000.00000040.00000020.00020000.00000000.sdmp, Offset: 03700000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_3700000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                        • Instruction ID: c8266a1c0e85b95c9b1f1d5540097c61f262e1afe82a7903898bd7e65e3f594d
                        • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                        • Instruction Fuzzy Hash: 9E41C471D1051CDBDF48CFADC991AAEBBF1AF88201F548299D516AB345D730AB41DB80
                        Memory Dump Source
                        • Source File: 00000000.00000002.2224909717.0000000003700000.00000040.00000020.00020000.00000000.sdmp, Offset: 03700000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_3700000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                        • Instruction ID: 6027d447bd40d867170f031e2945b53daeb87cd3a9e5570d1c75f722b1d5cd92
                        • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                        • Instruction Fuzzy Hash: 0F019278A10209EFDB45DFA8C5909AEF7F5FB48310F208599E819A7351D730EE41DB80
                        Memory Dump Source
                        • Source File: 00000000.00000002.2224909717.0000000003700000.00000040.00000020.00020000.00000000.sdmp, Offset: 03700000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_3700000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                        • Instruction ID: 34a7a7d3f50dba4a27088644b7d790e64a90ac5dcab67fb49f299efe7ccb3045
                        • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                        • Instruction Fuzzy Hash: D1019278A00209EFDB44DF98C5909AEF7F5FB48310F208699E819AB341D730AE51DB80
                        Memory Dump Source
                        • Source File: 00000000.00000002.2224909717.0000000003700000.00000040.00000020.00020000.00000000.sdmp, Offset: 03700000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_3700000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                        • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                        • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                        • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                        APIs
                        • DeleteObject.GDI32(00000000), ref: 00E12B30
                        • DeleteObject.GDI32(00000000), ref: 00E12B43
                        • DestroyWindow.USER32 ref: 00E12B52
                        • GetDesktopWindow.USER32 ref: 00E12B6D
                        • GetWindowRect.USER32(00000000), ref: 00E12B74
                        • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00E12CA3
                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00E12CB1
                        • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E12CF8
                        • GetClientRect.USER32(00000000,?), ref: 00E12D04
                        • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00E12D40
                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E12D62
                        • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E12D75
                        • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E12D80
                        • GlobalLock.KERNEL32(00000000), ref: 00E12D89
                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E12D98
                        • GlobalUnlock.KERNEL32(00000000), ref: 00E12DA1
                        • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E12DA8
                        • GlobalFree.KERNEL32(00000000), ref: 00E12DB3
                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E12DC5
                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,00E2FC38,00000000), ref: 00E12DDB
                        • GlobalFree.KERNEL32(00000000), ref: 00E12DEB
                        • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00E12E11
                        • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00E12E30
                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E12E52
                        • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E1303F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                        • String ID: $AutoIt v3$DISPLAY$static
                        • API String ID: 2211948467-2373415609
                        • Opcode ID: a5166176753f4acfb4c073ac4729f3232804c23eb908d1a46ec4257fae393995
                        • Instruction ID: cd2ecdaaae906e7b21116536878fddb7f21b0fa90e871c1cd4d97a4b49c942ad
                        • Opcode Fuzzy Hash: a5166176753f4acfb4c073ac4729f3232804c23eb908d1a46ec4257fae393995
                        • Instruction Fuzzy Hash: D0026A71A00204EFDB24DF65DC89EAE7BB9EF48714F148158F915BB2A1CB70AD46CB60
                        APIs
                        • SetTextColor.GDI32(?,00000000), ref: 00E2712F
                        • GetSysColorBrush.USER32(0000000F), ref: 00E27160
                        • GetSysColor.USER32(0000000F), ref: 00E2716C
                        • SetBkColor.GDI32(?,000000FF), ref: 00E27186
                        • SelectObject.GDI32(?,?), ref: 00E27195
                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00E271C0
                        • GetSysColor.USER32(00000010), ref: 00E271C8
                        • CreateSolidBrush.GDI32(00000000), ref: 00E271CF
                        • FrameRect.USER32(?,?,00000000), ref: 00E271DE
                        • DeleteObject.GDI32(00000000), ref: 00E271E5
                        • InflateRect.USER32(?,000000FE,000000FE), ref: 00E27230
                        • FillRect.USER32(?,?,?), ref: 00E27262
                        • GetWindowLongW.USER32(?,000000F0), ref: 00E27284
                          • Part of subcall function 00E273E8: GetSysColor.USER32(00000012), ref: 00E27421
                          • Part of subcall function 00E273E8: SetTextColor.GDI32(?,?), ref: 00E27425
                          • Part of subcall function 00E273E8: GetSysColorBrush.USER32(0000000F), ref: 00E2743B
                          • Part of subcall function 00E273E8: GetSysColor.USER32(0000000F), ref: 00E27446
                          • Part of subcall function 00E273E8: GetSysColor.USER32(00000011), ref: 00E27463
                          • Part of subcall function 00E273E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00E27471
                          • Part of subcall function 00E273E8: SelectObject.GDI32(?,00000000), ref: 00E27482
                          • Part of subcall function 00E273E8: SetBkColor.GDI32(?,00000000), ref: 00E2748B
                          • Part of subcall function 00E273E8: SelectObject.GDI32(?,?), ref: 00E27498
                          • Part of subcall function 00E273E8: InflateRect.USER32(?,000000FF,000000FF), ref: 00E274B7
                          • Part of subcall function 00E273E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00E274CE
                          • Part of subcall function 00E273E8: GetWindowLongW.USER32(00000000,000000F0), ref: 00E274DB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                        • String ID:
                        • API String ID: 4124339563-0
                        • Opcode ID: 771973f6d2ea8b768e408d4eb263baaebd5c9dc21f5d3cfea61dbfd7ce6602f2
                        • Instruction ID: 8af636d69f584d4cf54c5494d590ecd940c68158129812742963e1e8cc3cf33b
                        • Opcode Fuzzy Hash: 771973f6d2ea8b768e408d4eb263baaebd5c9dc21f5d3cfea61dbfd7ce6602f2
                        • Instruction Fuzzy Hash: 52A1A072009311EFD7209F61DC49E5F7BA9FF49320F201A19F9A2A61E1D770E949CB92
                        APIs
                        • DestroyWindow.USER32(?,?), ref: 00DA8E14
                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 00DE6AC5
                        • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00DE6AFE
                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00DE6F43
                          • Part of subcall function 00DA8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00DA8BE8,?,00000000,?,?,?,?,00DA8BBA,00000000,?), ref: 00DA8FC5
                        • SendMessageW.USER32(?,00001053), ref: 00DE6F7F
                        • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00DE6F96
                        • ImageList_Destroy.COMCTL32(00000000,?), ref: 00DE6FAC
                        • ImageList_Destroy.COMCTL32(00000000,?), ref: 00DE6FB7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                        • String ID: 0
                        • API String ID: 2760611726-4108050209
                        • Opcode ID: 722e14de7f748e488b76bc31da6c7b46a4529b7812a036c988f922276782d240
                        • Instruction ID: d0aef254a816b79c73a77119a1fff2e9f0fad22d5f8b9632635d0216a87200cf
                        • Opcode Fuzzy Hash: 722e14de7f748e488b76bc31da6c7b46a4529b7812a036c988f922276782d240
                        • Instruction Fuzzy Hash: D612BF30200281DFC725EF16D844BAABBE1FF65340F284469F4859B2A1CB72ED56DF61
                        APIs
                        • DestroyWindow.USER32(00000000), ref: 00E1273E
                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00E1286A
                        • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00E128A9
                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00E128B9
                        • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00E12900
                        • GetClientRect.USER32(00000000,?), ref: 00E1290C
                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00E12955
                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00E12964
                        • GetStockObject.GDI32(00000011), ref: 00E12974
                        • SelectObject.GDI32(00000000,00000000), ref: 00E12978
                        • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00E12988
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E12991
                        • DeleteDC.GDI32(00000000), ref: 00E1299A
                        • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00E129C6
                        • SendMessageW.USER32(00000030,00000000,00000001), ref: 00E129DD
                        • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00E12A1D
                        • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00E12A31
                        • SendMessageW.USER32(00000404,00000001,00000000), ref: 00E12A42
                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00E12A77
                        • GetStockObject.GDI32(00000011), ref: 00E12A82
                        • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00E12A8D
                        • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00E12A97
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                        • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                        • API String ID: 2910397461-517079104
                        • Opcode ID: 767490c58be4178713c291e347cb9d466c08f12288b134368339f54cd02c3711
                        • Instruction ID: 6950b37bd49822706fb05ca9739266006355c89c00aa3b029cd9469433d7a4ef
                        • Opcode Fuzzy Hash: 767490c58be4178713c291e347cb9d466c08f12288b134368339f54cd02c3711
                        • Instruction Fuzzy Hash: 0BB18B71A40205AFEB24DF69DC4AEAF7BB9EB08710F114159FA15E7290D770ED40CBA4
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 00E04AED
                        • GetDriveTypeW.KERNEL32(?,00E2CB68,?,\\.\,00E2CC08), ref: 00E04BCA
                        • SetErrorMode.KERNEL32(00000000,00E2CB68,?,\\.\,00E2CC08), ref: 00E04D36
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ErrorMode$DriveType
                        • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                        • API String ID: 2907320926-4222207086
                        • Opcode ID: 0f176adf6bf0613bb86569415eea402164518c2862b5bfc2ebbc83edfaba7172
                        • Instruction ID: 4bbbaf2d50160a1ca6031d6f40adf2d87d0ae6e1e7576970b2a40c90fed50d2f
                        • Opcode Fuzzy Hash: 0f176adf6bf0613bb86569415eea402164518c2862b5bfc2ebbc83edfaba7172
                        • Instruction Fuzzy Hash: 8761B2F1605205EBEB04EF14CBC2AA8F7B1EB44305B646815FA06BB2D1DA31DD85DB61
                        APIs
                        • GetSysColor.USER32(00000012), ref: 00E27421
                        • SetTextColor.GDI32(?,?), ref: 00E27425
                        • GetSysColorBrush.USER32(0000000F), ref: 00E2743B
                        • GetSysColor.USER32(0000000F), ref: 00E27446
                        • CreateSolidBrush.GDI32(?), ref: 00E2744B
                        • GetSysColor.USER32(00000011), ref: 00E27463
                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00E27471
                        • SelectObject.GDI32(?,00000000), ref: 00E27482
                        • SetBkColor.GDI32(?,00000000), ref: 00E2748B
                        • SelectObject.GDI32(?,?), ref: 00E27498
                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00E274B7
                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00E274CE
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00E274DB
                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00E2752A
                        • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00E27554
                        • InflateRect.USER32(?,000000FD,000000FD), ref: 00E27572
                        • DrawFocusRect.USER32(?,?), ref: 00E2757D
                        • GetSysColor.USER32(00000011), ref: 00E2758E
                        • SetTextColor.GDI32(?,00000000), ref: 00E27596
                        • DrawTextW.USER32(?,00E270F5,000000FF,?,00000000), ref: 00E275A8
                        • SelectObject.GDI32(?,?), ref: 00E275BF
                        • DeleteObject.GDI32(?), ref: 00E275CA
                        • SelectObject.GDI32(?,?), ref: 00E275D0
                        • DeleteObject.GDI32(?), ref: 00E275D5
                        • SetTextColor.GDI32(?,?), ref: 00E275DB
                        • SetBkColor.GDI32(?,?), ref: 00E275E5
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                        • String ID:
                        • API String ID: 1996641542-0
                        • Opcode ID: 91f31cdb4a65e90cfcde86efbf9c7337cd09ee04767e2b6251176e8cafbc376b
                        • Instruction ID: 2b5bf580dfd7d0568088f4265c73dd33228ea621a953a38ed34cc8f01696f82f
                        • Opcode Fuzzy Hash: 91f31cdb4a65e90cfcde86efbf9c7337cd09ee04767e2b6251176e8cafbc376b
                        • Instruction Fuzzy Hash: A1616B72901228AFDF119FA5DC49EEEBFB9EF08320F244115F915BB2A1D7749941CBA0
                        APIs
                        • GetCursorPos.USER32(?), ref: 00E21128
                        • GetDesktopWindow.USER32 ref: 00E2113D
                        • GetWindowRect.USER32(00000000), ref: 00E21144
                        • GetWindowLongW.USER32(?,000000F0), ref: 00E21199
                        • DestroyWindow.USER32(?), ref: 00E211B9
                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00E211ED
                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E2120B
                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00E2121D
                        • SendMessageW.USER32(00000000,00000421,?,?), ref: 00E21232
                        • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00E21245
                        • IsWindowVisible.USER32(00000000), ref: 00E212A1
                        • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00E212BC
                        • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00E212D0
                        • GetWindowRect.USER32(00000000,?), ref: 00E212E8
                        • MonitorFromPoint.USER32(?,?,00000002), ref: 00E2130E
                        • GetMonitorInfoW.USER32(00000000,?), ref: 00E21328
                        • CopyRect.USER32(?,?), ref: 00E2133F
                        • SendMessageW.USER32(00000000,00000412,00000000), ref: 00E213AA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                        • String ID: ($0$tooltips_class32
                        • API String ID: 698492251-4156429822
                        • Opcode ID: 9fe849a9551346bec63720b9d1c8ca4026665b8ea9b1280b71e5dfc90753e08d
                        • Instruction ID: 5f352b9422da7bfedbf49b3e9ce0374c9456980c81306312152fb47ba1c5534b
                        • Opcode Fuzzy Hash: 9fe849a9551346bec63720b9d1c8ca4026665b8ea9b1280b71e5dfc90753e08d
                        • Instruction Fuzzy Hash: 5CB1CD71604350AFDB10DF25D884B6EBBE5FF98354F00895CF989AB261C731E945CBA2
                        APIs
                        • CharUpperBuffW.USER32(?,?), ref: 00E202E5
                        • _wcslen.LIBCMT ref: 00E2031F
                        • _wcslen.LIBCMT ref: 00E20389
                        • _wcslen.LIBCMT ref: 00E203F1
                        • _wcslen.LIBCMT ref: 00E20475
                        • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00E204C5
                        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00E20504
                          • Part of subcall function 00DAF9F2: _wcslen.LIBCMT ref: 00DAF9FD
                          • Part of subcall function 00DF223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00DF2258
                          • Part of subcall function 00DF223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00DF228A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _wcslen$MessageSend$BuffCharUpper
                        • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                        • API String ID: 1103490817-719923060
                        • Opcode ID: 36f1c57d81ef02385d207cf288f5feefe7d827d4e4f9cb54368c8b547eb0a38a
                        • Instruction ID: 198dea98142e2e0f8048caefce1b46d528cf96da123bcd4ee30e64c733c2aafe
                        • Opcode Fuzzy Hash: 36f1c57d81ef02385d207cf288f5feefe7d827d4e4f9cb54368c8b547eb0a38a
                        • Instruction Fuzzy Hash: FCE1BF312082118FCB14DF24E95187EB3E6FFC8318B15995DF896AB6A2DB30ED45CB61
                        APIs
                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00DA8968
                        • GetSystemMetrics.USER32(00000007), ref: 00DA8970
                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00DA899B
                        • GetSystemMetrics.USER32(00000008), ref: 00DA89A3
                        • GetSystemMetrics.USER32(00000004), ref: 00DA89C8
                        • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00DA89E5
                        • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00DA89F5
                        • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00DA8A28
                        • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00DA8A3C
                        • GetClientRect.USER32(00000000,000000FF), ref: 00DA8A5A
                        • GetStockObject.GDI32(00000011), ref: 00DA8A76
                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 00DA8A81
                          • Part of subcall function 00DA912D: GetCursorPos.USER32(?), ref: 00DA9141
                          • Part of subcall function 00DA912D: ScreenToClient.USER32(00000000,?), ref: 00DA915E
                          • Part of subcall function 00DA912D: GetAsyncKeyState.USER32(00000001), ref: 00DA9183
                          • Part of subcall function 00DA912D: GetAsyncKeyState.USER32(00000002), ref: 00DA919D
                        • SetTimer.USER32(00000000,00000000,00000028,00DA90FC), ref: 00DA8AA8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                        • String ID: AutoIt v3 GUI
                        • API String ID: 1458621304-248962490
                        • Opcode ID: 6efb46a44880b6b419cb5485ec7fff1dd2d49403e5fa25e2e4419da56ce5a5ac
                        • Instruction ID: c62fe3e1c0bfb11f4f123292e0f38954cc7e9be8853885f134235a4aa1e9db2f
                        • Opcode Fuzzy Hash: 6efb46a44880b6b419cb5485ec7fff1dd2d49403e5fa25e2e4419da56ce5a5ac
                        • Instruction Fuzzy Hash: D3B18C31A002099FDB14EFA9DC89BAE3BB5FB48354F144229FA15E7290DB74E845CF61
                        APIs
                          • Part of subcall function 00DF10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00DF1114
                          • Part of subcall function 00DF10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00DF0B9B,?,?,?), ref: 00DF1120
                          • Part of subcall function 00DF10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00DF0B9B,?,?,?), ref: 00DF112F
                          • Part of subcall function 00DF10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00DF0B9B,?,?,?), ref: 00DF1136
                          • Part of subcall function 00DF10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00DF114D
                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00DF0DF5
                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00DF0E29
                        • GetLengthSid.ADVAPI32(?), ref: 00DF0E40
                        • GetAce.ADVAPI32(?,00000000,?), ref: 00DF0E7A
                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00DF0E96
                        • GetLengthSid.ADVAPI32(?), ref: 00DF0EAD
                        • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00DF0EB5
                        • HeapAlloc.KERNEL32(00000000), ref: 00DF0EBC
                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00DF0EDD
                        • CopySid.ADVAPI32(00000000), ref: 00DF0EE4
                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00DF0F13
                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00DF0F35
                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00DF0F47
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00DF0F6E
                        • HeapFree.KERNEL32(00000000), ref: 00DF0F75
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00DF0F7E
                        • HeapFree.KERNEL32(00000000), ref: 00DF0F85
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00DF0F8E
                        • HeapFree.KERNEL32(00000000), ref: 00DF0F95
                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00DF0FA1
                        • HeapFree.KERNEL32(00000000), ref: 00DF0FA8
                          • Part of subcall function 00DF1193: GetProcessHeap.KERNEL32(00000008,00DF0BB1,?,00000000,?,00DF0BB1,?), ref: 00DF11A1
                          • Part of subcall function 00DF1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00DF0BB1,?), ref: 00DF11A8
                          • Part of subcall function 00DF1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00DF0BB1,?), ref: 00DF11B7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                        • String ID:
                        • API String ID: 4175595110-0
                        • Opcode ID: 69d899dc21c2dee4d9bf9d654cfb0e11af56120d0409414096a9d614e855512b
                        • Instruction ID: afdfd7d0b257fc5ff01813e5322072cf7055455712e814143c9d1f7d526f6f20
                        • Opcode Fuzzy Hash: 69d899dc21c2dee4d9bf9d654cfb0e11af56120d0409414096a9d614e855512b
                        • Instruction Fuzzy Hash: 78714A7290420AAFDB209FA5DC45FBEBBB8BF04300F198115FA19B7192D771991ACB70
                        APIs
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E1C4BD
                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00E2CC08,00000000,?,00000000,?,?), ref: 00E1C544
                        • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00E1C5A4
                        • _wcslen.LIBCMT ref: 00E1C5F4
                        • _wcslen.LIBCMT ref: 00E1C66F
                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00E1C6B2
                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00E1C7C1
                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00E1C84D
                        • RegCloseKey.ADVAPI32(?), ref: 00E1C881
                        • RegCloseKey.ADVAPI32(00000000), ref: 00E1C88E
                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00E1C960
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                        • API String ID: 9721498-966354055
                        • Opcode ID: 1b71b44c8767840465fa2eaf3ef45a180e328b47395cec0e9a6c78b545c7a7da
                        • Instruction ID: 6ab775d4763daaf33fc86a1d44554ecd6b3200ffc43c81b76778a3cee0d1ee32
                        • Opcode Fuzzy Hash: 1b71b44c8767840465fa2eaf3ef45a180e328b47395cec0e9a6c78b545c7a7da
                        • Instruction Fuzzy Hash: B3126C356082019FDB14DF24C881A6AB7E5FF88714F15885DF85AAB3A2DB31FD41CBA1
                        APIs
                        • CharUpperBuffW.USER32(?,?), ref: 00E209C6
                        • _wcslen.LIBCMT ref: 00E20A01
                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00E20A54
                        • _wcslen.LIBCMT ref: 00E20A8A
                        • _wcslen.LIBCMT ref: 00E20B06
                        • _wcslen.LIBCMT ref: 00E20B81
                          • Part of subcall function 00DAF9F2: _wcslen.LIBCMT ref: 00DAF9FD
                          • Part of subcall function 00DF2BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00DF2BFA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _wcslen$MessageSend$BuffCharUpper
                        • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                        • API String ID: 1103490817-4258414348
                        • Opcode ID: 765ed3ca327b623ae1c658bac0f348ce46d6d9e33b635449b1e213acf152403f
                        • Instruction ID: 2163606be80d57a9ea6e7093d301c092cc0560a5d585f30c24d8fd2789399955
                        • Opcode Fuzzy Hash: 765ed3ca327b623ae1c658bac0f348ce46d6d9e33b635449b1e213acf152403f
                        • Instruction Fuzzy Hash: 1DE1BB312083118FCB14DF24D45196AB7E2FF98318B55995CF896AB3A2DB30ED49CBA1
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _wcslen$BuffCharUpper
                        • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                        • API String ID: 1256254125-909552448
                        • Opcode ID: 1723a148d8b5a1446f1f9f46884440972982f28c171b88dba0b64e3c57daf78d
                        • Instruction ID: f3d1db9047076b4863f3a2765ac8e3973f16ec7165ca3b94551dde022f72def1
                        • Opcode Fuzzy Hash: 1723a148d8b5a1446f1f9f46884440972982f28c171b88dba0b64e3c57daf78d
                        • Instruction Fuzzy Hash: B971E63268412A8BCB20DE6CD9519FF3391AFA5758B352929FC56F7284E631CDC4C7A0
                        APIs
                        • _wcslen.LIBCMT ref: 00E2835A
                        • _wcslen.LIBCMT ref: 00E2836E
                        • _wcslen.LIBCMT ref: 00E28391
                        • _wcslen.LIBCMT ref: 00E283B4
                        • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00E283F2
                        • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00E25BF2), ref: 00E2844E
                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00E28487
                        • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00E284CA
                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00E28501
                        • FreeLibrary.KERNEL32(?), ref: 00E2850D
                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00E2851D
                        • DestroyIcon.USER32(?,?,?,?,?,00E25BF2), ref: 00E2852C
                        • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00E28549
                        • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00E28555
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                        • String ID: .dll$.exe$.icl
                        • API String ID: 799131459-1154884017
                        • Opcode ID: f139f57354685e97b9897db7aa1bfdb6b149707b25c612b4158de68f32c07b67
                        • Instruction ID: 5dac3f30bbb850ffcf9f67f49a23449e80bf4d36e5ee5e797fecbd926219a60a
                        • Opcode Fuzzy Hash: f139f57354685e97b9897db7aa1bfdb6b149707b25c612b4158de68f32c07b67
                        • Instruction Fuzzy Hash: A261AC71540225BEEB24DF64ED41BFE77A8FF08B21F105609F815E60D1DB74AA94CBA0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID:
                        • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                        • API String ID: 0-1645009161
                        • Opcode ID: ef93653fe9b3716d97c5ad887296ff892ce60fde88bae07b665157bea1b02c43
                        • Instruction ID: 079aeb467ee2429c85e8070d4ca579b5c3073c67b4163e8a4decbcc0f1f3e068
                        • Opcode Fuzzy Hash: ef93653fe9b3716d97c5ad887296ff892ce60fde88bae07b665157bea1b02c43
                        • Instruction Fuzzy Hash: DB81F471A54705BBDF20AFA0EC43FAE77A9EF15300F044029F905AA296EB71DA15C7B1
                        APIs
                        • LoadIconW.USER32(00000063), ref: 00DF5A2E
                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00DF5A40
                        • SetWindowTextW.USER32(?,?), ref: 00DF5A57
                        • GetDlgItem.USER32(?,000003EA), ref: 00DF5A6C
                        • SetWindowTextW.USER32(00000000,?), ref: 00DF5A72
                        • GetDlgItem.USER32(?,000003E9), ref: 00DF5A82
                        • SetWindowTextW.USER32(00000000,?), ref: 00DF5A88
                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00DF5AA9
                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00DF5AC3
                        • GetWindowRect.USER32(?,?), ref: 00DF5ACC
                        • _wcslen.LIBCMT ref: 00DF5B33
                        • SetWindowTextW.USER32(?,?), ref: 00DF5B6F
                        • GetDesktopWindow.USER32 ref: 00DF5B75
                        • GetWindowRect.USER32(00000000), ref: 00DF5B7C
                        • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00DF5BD3
                        • GetClientRect.USER32(?,?), ref: 00DF5BE0
                        • PostMessageW.USER32(?,00000005,00000000,?), ref: 00DF5C05
                        • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00DF5C2F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                        • String ID:
                        • API String ID: 895679908-0
                        • Opcode ID: 797f5c12b9e2c7bc5ed1bbb3aa2bafc83216ccbf3f2dfa9f91ab26961147e354
                        • Instruction ID: 4803f7462e7aa29ce482988e7c6335bf885f422d40f492b3b4fd431e66389277
                        • Opcode Fuzzy Hash: 797f5c12b9e2c7bc5ed1bbb3aa2bafc83216ccbf3f2dfa9f91ab26961147e354
                        • Instruction Fuzzy Hash: F6719E31900B09AFCB20DFA9DE85B7EBBF5FF48704F158518E682A25A4D771E944CB60
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _wcslen
                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[
                        • API String ID: 176396367-1901692981
                        • Opcode ID: 30a0aa3f389a888c287dceb1b4b578a2c13ec6bc109c0415689ecb701c5342e3
                        • Instruction ID: dab867fe31a596715ccb8e41439d0011a33b74d4a46ae84ed971d321b53a5bc9
                        • Opcode Fuzzy Hash: 30a0aa3f389a888c287dceb1b4b578a2c13ec6bc109c0415689ecb701c5342e3
                        • Instruction Fuzzy Hash: 61E19532A0061A9BCB14DFB8C4516FDB7A4FF54750F5BC119EA56B7240DB30AE858BB0
                        APIs
                        • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00DB00C6
                          • Part of subcall function 00DB00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(00E6070C,00000FA0,4690D606,?,?,?,?,00DD23B3,000000FF), ref: 00DB011C
                          • Part of subcall function 00DB00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00DD23B3,000000FF), ref: 00DB0127
                          • Part of subcall function 00DB00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00DD23B3,000000FF), ref: 00DB0138
                          • Part of subcall function 00DB00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00DB014E
                          • Part of subcall function 00DB00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00DB015C
                          • Part of subcall function 00DB00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00DB016A
                          • Part of subcall function 00DB00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00DB0195
                          • Part of subcall function 00DB00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00DB01A0
                        • ___scrt_fastfail.LIBCMT ref: 00DB00E7
                          • Part of subcall function 00DB00A3: __onexit.LIBCMT ref: 00DB00A9
                        Strings
                        • InitializeConditionVariable, xrefs: 00DB0148
                        • WakeAllConditionVariable, xrefs: 00DB0162
                        • SleepConditionVariableCS, xrefs: 00DB0154
                        • kernel32.dll, xrefs: 00DB0133
                        • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00DB0122
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                        • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                        • API String ID: 66158676-1714406822
                        • Opcode ID: 0470c1339baecc23ad6561d4587cb3fcba0cbeab2400118f68c430b2ee50c2eb
                        • Instruction ID: 04748c7b31d7d6f44e0968d48b832f667b5f29767c92a0c7bac0929586cee6e8
                        • Opcode Fuzzy Hash: 0470c1339baecc23ad6561d4587cb3fcba0cbeab2400118f68c430b2ee50c2eb
                        • Instruction Fuzzy Hash: 1C21AD32945711AFD7246B65FC06B6F77A4EB05B91F140536F903F7291DAA0980489B0
                        APIs
                        • CharLowerBuffW.USER32(00000000,00000000,00E2CC08), ref: 00E04527
                        • _wcslen.LIBCMT ref: 00E0453B
                        • _wcslen.LIBCMT ref: 00E04599
                        • _wcslen.LIBCMT ref: 00E045F4
                        • _wcslen.LIBCMT ref: 00E0463F
                        • _wcslen.LIBCMT ref: 00E046A7
                          • Part of subcall function 00DAF9F2: _wcslen.LIBCMT ref: 00DAF9FD
                        • GetDriveTypeW.KERNEL32(?,00E56BF0,00000061), ref: 00E04743
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _wcslen$BuffCharDriveLowerType
                        • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                        • API String ID: 2055661098-1000479233
                        • Opcode ID: ad2792e6cdcc513ceb99b2cb9274a36cafa14a7ba3f5a29b0e06a0673bf19631
                        • Instruction ID: a77ae5143e0bef538cfc1d8a5a357dd6f7ea39a40883050c84d126f1f0d7817c
                        • Opcode Fuzzy Hash: ad2792e6cdcc513ceb99b2cb9274a36cafa14a7ba3f5a29b0e06a0673bf19631
                        • Instruction Fuzzy Hash: 17B101F16083029BC710DF28DA90A6EB3E4EFA5724F50591DF696E32D1E730D884CB62
                        APIs
                          • Part of subcall function 00DA9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DA9BB2
                        • DragQueryPoint.SHELL32(?,?), ref: 00E29147
                          • Part of subcall function 00E27674: ClientToScreen.USER32(?,?), ref: 00E2769A
                          • Part of subcall function 00E27674: GetWindowRect.USER32(?,?), ref: 00E27710
                          • Part of subcall function 00E27674: PtInRect.USER32(?,?,00E28B89), ref: 00E27720
                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00E291B0
                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00E291BB
                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00E291DE
                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00E29225
                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00E2923E
                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00E29255
                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00E29277
                        • DragFinish.SHELL32(?), ref: 00E2927E
                        • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00E29371
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$p#
                        • API String ID: 221274066-136824727
                        • Opcode ID: c97c7bbe6bc5e1429e439b490093f700d25bbb8e50d4e1c945fb83194e054694
                        • Instruction ID: 58383856d3b28dcb1f8fe0538428536006da3bed373912beb8b47fad341f5b94
                        • Opcode Fuzzy Hash: c97c7bbe6bc5e1429e439b490093f700d25bbb8e50d4e1c945fb83194e054694
                        • Instruction Fuzzy Hash: 2D617972108301AFC701EF65EC85DAFBBE8FF88750F50191EF595A21A1DB709A49CB62
                        APIs
                        • _wcslen.LIBCMT ref: 00E1B198
                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00E1B1B0
                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00E1B1D4
                        • _wcslen.LIBCMT ref: 00E1B200
                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00E1B214
                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00E1B236
                        • _wcslen.LIBCMT ref: 00E1B332
                          • Part of subcall function 00E005A7: GetStdHandle.KERNEL32(000000F6), ref: 00E005C6
                        • _wcslen.LIBCMT ref: 00E1B34B
                        • _wcslen.LIBCMT ref: 00E1B366
                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00E1B3B6
                        • GetLastError.KERNEL32(00000000), ref: 00E1B407
                        • CloseHandle.KERNEL32(?), ref: 00E1B439
                        • CloseHandle.KERNEL32(00000000), ref: 00E1B44A
                        • CloseHandle.KERNEL32(00000000), ref: 00E1B45C
                        • CloseHandle.KERNEL32(00000000), ref: 00E1B46E
                        • CloseHandle.KERNEL32(?), ref: 00E1B4E3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                        • String ID:
                        • API String ID: 2178637699-0
                        • Opcode ID: a8972d8f2970a8fec1ef5e4ffc1f7fefd131ee9acd6d9c5f18fb389560535b81
                        • Instruction ID: 6285ee3f17778b6a77d58b2a36ea24866cbb03936e67407a553122668bbc4e6a
                        • Opcode Fuzzy Hash: a8972d8f2970a8fec1ef5e4ffc1f7fefd131ee9acd6d9c5f18fb389560535b81
                        • Instruction Fuzzy Hash: 60F16B31508240DFCB14EF24C891BAEBBE5EF85314F14955DF495AB2A2DB31EC84CB62
                        APIs
                        • GetMenuItemCount.USER32(00E61990), ref: 00DD2F8D
                        • GetMenuItemCount.USER32(00E61990), ref: 00DD303D
                        • GetCursorPos.USER32(?), ref: 00DD3081
                        • SetForegroundWindow.USER32(00000000), ref: 00DD308A
                        • TrackPopupMenuEx.USER32(00E61990,00000000,?,00000000,00000000,00000000), ref: 00DD309D
                        • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00DD30A9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                        • String ID: 0
                        • API String ID: 36266755-4108050209
                        • Opcode ID: 4336e6d48e4dc0131612c55ae3ca5579ba7baaea7318cb4457c995ff3337254b
                        • Instruction ID: 578260cbba0ff194c75dc3d266ae2870446695cfaa995e98b9dfa44a9f36d59e
                        • Opcode Fuzzy Hash: 4336e6d48e4dc0131612c55ae3ca5579ba7baaea7318cb4457c995ff3337254b
                        • Instruction Fuzzy Hash: BF712731644205BEEB218F25CC49FBABF68FF05364F244207F5246A2E0C7B1A914CBB1
                        APIs
                        • DestroyWindow.USER32(?,?), ref: 00E26DEB
                          • Part of subcall function 00D96B57: _wcslen.LIBCMT ref: 00D96B6A
                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00E26E5F
                        • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00E26E81
                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E26E94
                        • DestroyWindow.USER32(?), ref: 00E26EB5
                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00D90000,00000000), ref: 00E26EE4
                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E26EFD
                        • GetDesktopWindow.USER32 ref: 00E26F16
                        • GetWindowRect.USER32(00000000), ref: 00E26F1D
                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00E26F35
                        • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00E26F4D
                          • Part of subcall function 00DA9944: GetWindowLongW.USER32(?,000000EB), ref: 00DA9952
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                        • String ID: 0$tooltips_class32
                        • API String ID: 2429346358-3619404913
                        • Opcode ID: 269f20651cd183ab5e424b26d602a3847c3ca364cd7c5743bcab54c7c8f82141
                        • Instruction ID: a069283ca59ef09558bd80170e0f787802903041fa609e5f2d9a39f734a8b5ba
                        • Opcode Fuzzy Hash: 269f20651cd183ab5e424b26d602a3847c3ca364cd7c5743bcab54c7c8f82141
                        • Instruction Fuzzy Hash: 7D714C74104244AFEB21CF19EC44AABBBF9FB89708F14151DF999A7261D770E90ACB12
                        APIs
                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00E0C4B0
                        • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00E0C4C3
                        • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00E0C4D7
                        • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00E0C4F0
                        • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00E0C533
                        • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00E0C549
                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00E0C554
                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00E0C584
                        • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00E0C5DC
                        • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00E0C5F0
                        • InternetCloseHandle.WININET(00000000), ref: 00E0C5FB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                        • String ID:
                        • API String ID: 3800310941-3916222277
                        • Opcode ID: ad902ac6a4e1a748766453aee6f4d8bb44f1e7f7b4eff2c02e9e76c3c36b001c
                        • Instruction ID: b8c89e5256cd1b3a5b537dc303ee31bf99f48f58f5eafea06236c149cecec7d6
                        • Opcode Fuzzy Hash: ad902ac6a4e1a748766453aee6f4d8bb44f1e7f7b4eff2c02e9e76c3c36b001c
                        • Instruction Fuzzy Hash: 675151B5500604BFDB318F61CD48AAB7BFCFF08758F20551AF945A6190DB34E989DB60
                        APIs
                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00E28592
                        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00E285A2
                        • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00E285AD
                        • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00E285BA
                        • GlobalLock.KERNEL32(00000000), ref: 00E285C8
                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00E285D7
                        • GlobalUnlock.KERNEL32(00000000), ref: 00E285E0
                        • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00E285E7
                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00E285F8
                        • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,00E2FC38,?), ref: 00E28611
                        • GlobalFree.KERNEL32(00000000), ref: 00E28621
                        • GetObjectW.GDI32(?,00000018,?), ref: 00E28641
                        • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00E28671
                        • DeleteObject.GDI32(?), ref: 00E28699
                        • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00E286AF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                        • String ID:
                        • API String ID: 3840717409-0
                        • Opcode ID: 32e1e371ce41b23ed267d9dae8f5fb87e37d063330f32b9bb23c32d0779c3345
                        • Instruction ID: 4ab4bb4be19449812542b9a7f086da1f54f7d400b7b7c12db32115a36732dfe1
                        • Opcode Fuzzy Hash: 32e1e371ce41b23ed267d9dae8f5fb87e37d063330f32b9bb23c32d0779c3345
                        • Instruction Fuzzy Hash: F641FC75601218AFDB21DF65DD48EAE7BB8FF89715F204058F905E7260DB70A905CB60
                        APIs
                        • VariantInit.OLEAUT32(00000000), ref: 00E01502
                        • VariantCopy.OLEAUT32(?,?), ref: 00E0150B
                        • VariantClear.OLEAUT32(?), ref: 00E01517
                        • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00E015FB
                        • VarR8FromDec.OLEAUT32(?,?), ref: 00E01657
                        • VariantInit.OLEAUT32(?), ref: 00E01708
                        • SysFreeString.OLEAUT32(?), ref: 00E0178C
                        • VariantClear.OLEAUT32(?), ref: 00E017D8
                        • VariantClear.OLEAUT32(?), ref: 00E017E7
                        • VariantInit.OLEAUT32(00000000), ref: 00E01823
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                        • String ID: %4d%02d%02d%02d%02d%02d$Default
                        • API String ID: 1234038744-3931177956
                        • Opcode ID: 02925b24178cecabb3bbf41b1f4205bb58b7b4a7528726e4b8cd4717cd64b0b8
                        • Instruction ID: daaa98dbe95fbe9381d9bbb1ea60c1357eb2eab961da6b464a1eae5c7994787b
                        • Opcode Fuzzy Hash: 02925b24178cecabb3bbf41b1f4205bb58b7b4a7528726e4b8cd4717cd64b0b8
                        • Instruction Fuzzy Hash: 01D1AE72A00615DBDB10AFA5E885BBDB7B5FF45700F24809AE446BF1C0DB30E985DBA1
                        APIs
                          • Part of subcall function 00D99CB3: _wcslen.LIBCMT ref: 00D99CBD
                          • Part of subcall function 00E1C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E1B6AE,?,?), ref: 00E1C9B5
                          • Part of subcall function 00E1C998: _wcslen.LIBCMT ref: 00E1C9F1
                          • Part of subcall function 00E1C998: _wcslen.LIBCMT ref: 00E1CA68
                          • Part of subcall function 00E1C998: _wcslen.LIBCMT ref: 00E1CA9E
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E1B6F4
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00E1B772
                        • RegDeleteValueW.ADVAPI32(?,?), ref: 00E1B80A
                        • RegCloseKey.ADVAPI32(?), ref: 00E1B87E
                        • RegCloseKey.ADVAPI32(?), ref: 00E1B89C
                        • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00E1B8F2
                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00E1B904
                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00E1B922
                        • FreeLibrary.KERNEL32(00000000), ref: 00E1B983
                        • RegCloseKey.ADVAPI32(00000000), ref: 00E1B994
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                        • String ID: RegDeleteKeyExW$advapi32.dll
                        • API String ID: 146587525-4033151799
                        • Opcode ID: 9c1d5c2c6aacdeffc988cb1f6db8dbb7f826a5597d804545c900d24b042fa1e9
                        • Instruction ID: 242e2b834c6ffae5e8fbcbb78ba5344f1a3707f3e3b2b7574bdc77ea5c1f927d
                        • Opcode Fuzzy Hash: 9c1d5c2c6aacdeffc988cb1f6db8dbb7f826a5597d804545c900d24b042fa1e9
                        • Instruction Fuzzy Hash: 08C19F31208201AFD714DF24C495F6ABBE5FF84318F54955CF49A9B2A2CB71EC86CBA1
                        APIs
                        • GetDC.USER32(00000000), ref: 00E125D8
                        • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00E125E8
                        • CreateCompatibleDC.GDI32(?), ref: 00E125F4
                        • SelectObject.GDI32(00000000,?), ref: 00E12601
                        • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00E1266D
                        • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00E126AC
                        • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00E126D0
                        • SelectObject.GDI32(?,?), ref: 00E126D8
                        • DeleteObject.GDI32(?), ref: 00E126E1
                        • DeleteDC.GDI32(?), ref: 00E126E8
                        • ReleaseDC.USER32(00000000,?), ref: 00E126F3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                        • String ID: (
                        • API String ID: 2598888154-3887548279
                        • Opcode ID: d19001e0e8b891adeda49419f49eb9b84aeb6a7f19cf12a78aa47734779ad95a
                        • Instruction ID: 136561429ed685095cf76b7c82f03fe747c0be99936b07b7936e1bcd8f642c6c
                        • Opcode Fuzzy Hash: d19001e0e8b891adeda49419f49eb9b84aeb6a7f19cf12a78aa47734779ad95a
                        • Instruction Fuzzy Hash: 2161D175D00219EFCF14CFA4D885AAEBBF6FF48310F208529EA55B7250D770A9518FA0
                        APIs
                        • ___free_lconv_mon.LIBCMT ref: 00DCDAA1
                          • Part of subcall function 00DCD63C: _free.LIBCMT ref: 00DCD659
                          • Part of subcall function 00DCD63C: _free.LIBCMT ref: 00DCD66B
                          • Part of subcall function 00DCD63C: _free.LIBCMT ref: 00DCD67D
                          • Part of subcall function 00DCD63C: _free.LIBCMT ref: 00DCD68F
                          • Part of subcall function 00DCD63C: _free.LIBCMT ref: 00DCD6A1
                          • Part of subcall function 00DCD63C: _free.LIBCMT ref: 00DCD6B3
                          • Part of subcall function 00DCD63C: _free.LIBCMT ref: 00DCD6C5
                          • Part of subcall function 00DCD63C: _free.LIBCMT ref: 00DCD6D7
                          • Part of subcall function 00DCD63C: _free.LIBCMT ref: 00DCD6E9
                          • Part of subcall function 00DCD63C: _free.LIBCMT ref: 00DCD6FB
                          • Part of subcall function 00DCD63C: _free.LIBCMT ref: 00DCD70D
                          • Part of subcall function 00DCD63C: _free.LIBCMT ref: 00DCD71F
                          • Part of subcall function 00DCD63C: _free.LIBCMT ref: 00DCD731
                        • _free.LIBCMT ref: 00DCDA96
                          • Part of subcall function 00DC29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00DCD7D1,00000000,00000000,00000000,00000000,?,00DCD7F8,00000000,00000007,00000000,?,00DCDBF5,00000000), ref: 00DC29DE
                          • Part of subcall function 00DC29C8: GetLastError.KERNEL32(00000000,?,00DCD7D1,00000000,00000000,00000000,00000000,?,00DCD7F8,00000000,00000007,00000000,?,00DCDBF5,00000000,00000000), ref: 00DC29F0
                        • _free.LIBCMT ref: 00DCDAB8
                        • _free.LIBCMT ref: 00DCDACD
                        • _free.LIBCMT ref: 00DCDAD8
                        • _free.LIBCMT ref: 00DCDAFA
                        • _free.LIBCMT ref: 00DCDB0D
                        • _free.LIBCMT ref: 00DCDB1B
                        • _free.LIBCMT ref: 00DCDB26
                        • _free.LIBCMT ref: 00DCDB5E
                        • _free.LIBCMT ref: 00DCDB65
                        • _free.LIBCMT ref: 00DCDB82
                        • _free.LIBCMT ref: 00DCDB9A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                        • String ID:
                        • API String ID: 161543041-0
                        • Opcode ID: fdf65e0d6b597c0c27aa5959c800aa928b3409b637f93e104c2e93eccd7f6bb9
                        • Instruction ID: fab81179f256653396f7f41fe86042ba8f70162b7c8128b5d57814e5cceee0c5
                        • Opcode Fuzzy Hash: fdf65e0d6b597c0c27aa5959c800aa928b3409b637f93e104c2e93eccd7f6bb9
                        • Instruction Fuzzy Hash: 693137316446069FEB22AA79EC45F6AB7EAFF10311F29492DE459D7191DF31AC808B30
                        APIs
                        • GetClassNameW.USER32(?,?,00000100), ref: 00DF369C
                        • _wcslen.LIBCMT ref: 00DF36A7
                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00DF3797
                        • GetClassNameW.USER32(?,?,00000400), ref: 00DF380C
                        • GetDlgCtrlID.USER32(?), ref: 00DF385D
                        • GetWindowRect.USER32(?,?), ref: 00DF3882
                        • GetParent.USER32(?), ref: 00DF38A0
                        • ScreenToClient.USER32(00000000), ref: 00DF38A7
                        • GetClassNameW.USER32(?,?,00000100), ref: 00DF3921
                        • GetWindowTextW.USER32(?,?,00000400), ref: 00DF395D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                        • String ID: %s%u
                        • API String ID: 4010501982-679674701
                        • Opcode ID: a15c4eab3a33c76edbcc142d56436ee34e1d024de3a63faa07bcd5ed3d530904
                        • Instruction ID: 9052a657aabfbfd30af5ec41f86cc4a5ab2cc5e66f7f649e354c9ae0041fd45a
                        • Opcode Fuzzy Hash: a15c4eab3a33c76edbcc142d56436ee34e1d024de3a63faa07bcd5ed3d530904
                        • Instruction Fuzzy Hash: 4B91C37120460AAFD714DF24C885BBAF7A8FF44350F068619FA9AD2150DB70EA49CBB1
                        APIs
                        • GetClassNameW.USER32(?,?,00000400), ref: 00DF4994
                        • GetWindowTextW.USER32(?,?,00000400), ref: 00DF49DA
                        • _wcslen.LIBCMT ref: 00DF49EB
                        • CharUpperBuffW.USER32(?,00000000), ref: 00DF49F7
                        • _wcsstr.LIBVCRUNTIME ref: 00DF4A2C
                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00DF4A64
                        • GetWindowTextW.USER32(?,?,00000400), ref: 00DF4A9D
                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00DF4AE6
                        • GetClassNameW.USER32(?,?,00000400), ref: 00DF4B20
                        • GetWindowRect.USER32(?,?), ref: 00DF4B8B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                        • String ID: ThumbnailClass
                        • API String ID: 1311036022-1241985126
                        • Opcode ID: bb863af492a679a19919ce9bc1255d35337961d9e74a3be7e82986f4493f0929
                        • Instruction ID: 9d1fb88b830a3127edb83436a8735d90ed208e3135be43c8e1208adc785963cc
                        • Opcode Fuzzy Hash: bb863af492a679a19919ce9bc1255d35337961d9e74a3be7e82986f4493f0929
                        • Instruction Fuzzy Hash: EF919C711042099FDB14CF14C985BBBB7A8FF84714F098469FE8A9A196DB30ED49CBB1
                        APIs
                          • Part of subcall function 00DA9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DA9BB2
                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00E28D5A
                        • GetFocus.USER32 ref: 00E28D6A
                        • GetDlgCtrlID.USER32(00000000), ref: 00E28D75
                        • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00E28E1D
                        • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00E28ECF
                        • GetMenuItemCount.USER32(?), ref: 00E28EEC
                        • GetMenuItemID.USER32(?,00000000), ref: 00E28EFC
                        • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00E28F2E
                        • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00E28F70
                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00E28FA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                        • String ID: 0
                        • API String ID: 1026556194-4108050209
                        • Opcode ID: 6f7f38fed642194eaf75d5c8bea5014f17a18ea8c952351a91c3779f4237d01d
                        • Instruction ID: 6380965959538eba7fc2208b1f9f688b8dcbe9cb784bc18532647d82e653e2a8
                        • Opcode Fuzzy Hash: 6f7f38fed642194eaf75d5c8bea5014f17a18ea8c952351a91c3779f4237d01d
                        • Instruction Fuzzy Hash: D181E0716053249FE720CF14EE84AAB77E9FF88318F141919F985B7291CB70D905CBA2
                        APIs
                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00E1CC64
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00E1CC8D
                        • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00E1CD48
                          • Part of subcall function 00E1CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00E1CCAA
                          • Part of subcall function 00E1CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00E1CCBD
                          • Part of subcall function 00E1CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00E1CCCF
                          • Part of subcall function 00E1CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00E1CD05
                          • Part of subcall function 00E1CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00E1CD28
                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00E1CCF3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                        • String ID: RegDeleteKeyExW$advapi32.dll
                        • API String ID: 2734957052-4033151799
                        • Opcode ID: 01725dd869f273f45892a89e8c7bbe40e0546618ceb28040c3455f03e2b82556
                        • Instruction ID: baad7633b5dda743a094eb9f992ff88e9b0abe206ccc287684455980da8d2b70
                        • Opcode Fuzzy Hash: 01725dd869f273f45892a89e8c7bbe40e0546618ceb28040c3455f03e2b82556
                        • Instruction Fuzzy Hash: 9C318E71941129BFDB308B51EC88EFFBB7CEF05744F201165A905F2240DA709E8ADAE0
                        APIs
                        • timeGetTime.WINMM ref: 00DFE6B4
                          • Part of subcall function 00DAE551: timeGetTime.WINMM(?,?,00DFE6D4), ref: 00DAE555
                        • Sleep.KERNEL32(0000000A), ref: 00DFE6E1
                        • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 00DFE705
                        • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00DFE727
                        • SetActiveWindow.USER32 ref: 00DFE746
                        • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00DFE754
                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 00DFE773
                        • Sleep.KERNEL32(000000FA), ref: 00DFE77E
                        • IsWindow.USER32 ref: 00DFE78A
                        • EndDialog.USER32(00000000), ref: 00DFE79B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                        • String ID: BUTTON
                        • API String ID: 1194449130-3405671355
                        • Opcode ID: 0ef09177c3d97b1bb247753eb394c41b5ac436136209f99834434d20f04e60ab
                        • Instruction ID: 534a2029f63c85fb5dab4657b72925d58179f2e9ec1327a101618218a63383ac
                        • Opcode Fuzzy Hash: 0ef09177c3d97b1bb247753eb394c41b5ac436136209f99834434d20f04e60ab
                        • Instruction Fuzzy Hash: 6021C570200608AFEB106F27FC8DA3E3B69F754788B154825F702A1171DBB19C199B30
                        APIs
                          • Part of subcall function 00D99CB3: _wcslen.LIBCMT ref: 00D99CBD
                        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00DFEA5D
                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00DFEA73
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00DFEA84
                        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00DFEA96
                        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00DFEAA7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: SendString$_wcslen
                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                        • API String ID: 2420728520-1007645807
                        • Opcode ID: 1d53d8afaa19dc445a8317c61a75709297d5f492bf0eda8e2063bf6a87afbc48
                        • Instruction ID: 13cb855b6c43e0ff05731dd5a3e719cd0b886a7ae26fda7fc28373907be651d7
                        • Opcode Fuzzy Hash: 1d53d8afaa19dc445a8317c61a75709297d5f492bf0eda8e2063bf6a87afbc48
                        • Instruction Fuzzy Hash: 05119171A9025979DB20A7A6DC4ADFF7B7CEBD1F00F444829B801A30E1EE700909C5B0
                        APIs
                        • GetDlgItem.USER32(?,00000001), ref: 00DF5CE2
                        • GetWindowRect.USER32(00000000,?), ref: 00DF5CFB
                        • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00DF5D59
                        • GetDlgItem.USER32(?,00000002), ref: 00DF5D69
                        • GetWindowRect.USER32(00000000,?), ref: 00DF5D7B
                        • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00DF5DCF
                        • GetDlgItem.USER32(?,000003E9), ref: 00DF5DDD
                        • GetWindowRect.USER32(00000000,?), ref: 00DF5DEF
                        • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00DF5E31
                        • GetDlgItem.USER32(?,000003EA), ref: 00DF5E44
                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00DF5E5A
                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00DF5E67
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Window$ItemMoveRect$Invalidate
                        • String ID:
                        • API String ID: 3096461208-0
                        • Opcode ID: c2165f24ef3f12433ac90eacc1ada9df39d2ddac6e994d0fc904ea070a34382d
                        • Instruction ID: 3a944f04b345dc244c6c0c74570b653e9bee23fe174841a10f34cf187aa20181
                        • Opcode Fuzzy Hash: c2165f24ef3f12433ac90eacc1ada9df39d2ddac6e994d0fc904ea070a34382d
                        • Instruction Fuzzy Hash: 81512F70A00609AFDB18CF69DD89AAE7BB5FB48700F258129F615E7294D7709E05CB60
                        APIs
                          • Part of subcall function 00DA8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00DA8BE8,?,00000000,?,?,?,?,00DA8BBA,00000000,?), ref: 00DA8FC5
                        • DestroyWindow.USER32(?), ref: 00DA8C81
                        • KillTimer.USER32(00000000,?,?,?,?,00DA8BBA,00000000,?), ref: 00DA8D1B
                        • DestroyAcceleratorTable.USER32(00000000), ref: 00DE6973
                        • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00DA8BBA,00000000,?), ref: 00DE69A1
                        • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00DA8BBA,00000000,?), ref: 00DE69B8
                        • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00DA8BBA,00000000), ref: 00DE69D4
                        • DeleteObject.GDI32(00000000), ref: 00DE69E6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                        • String ID:
                        • API String ID: 641708696-0
                        • Opcode ID: eada8ca3146263c1ec8f01f4d09c39783298871094bab1ba9e66f78a12e45226
                        • Instruction ID: adff06f61ddb5c83fe01d3cfa4eae74572eb3d8d37d16810f8d8d6761a2c5a70
                        • Opcode Fuzzy Hash: eada8ca3146263c1ec8f01f4d09c39783298871094bab1ba9e66f78a12e45226
                        • Instruction Fuzzy Hash: 88619D30502740DFCB369F16D948B2AB7F1FB51362F184568E482A7560CB71E995EF70
                        APIs
                          • Part of subcall function 00DA9944: GetWindowLongW.USER32(?,000000EB), ref: 00DA9952
                        • GetSysColor.USER32(0000000F), ref: 00DA9862
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ColorLongWindow
                        • String ID:
                        • API String ID: 259745315-0
                        • Opcode ID: e0d71c49f6f59187f96c602d21e34c5a5f534f90268a0d101f87afc5b4d60108
                        • Instruction ID: 6c66bb97b499f38ce3f2a9e6bd4aaa0896948f7a3db6bf7011b4d11d1b7470f7
                        • Opcode Fuzzy Hash: e0d71c49f6f59187f96c602d21e34c5a5f534f90268a0d101f87afc5b4d60108
                        • Instruction Fuzzy Hash: CE41AF31105640AFDB309F39DC99BBA7BA5AB07320F284605F9A29B1E1C7399C42DB31
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,00DDF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00DF9717
                        • LoadStringW.USER32(00000000,?,00DDF7F8,00000001), ref: 00DF9720
                          • Part of subcall function 00D99CB3: _wcslen.LIBCMT ref: 00D99CBD
                        • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00DDF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00DF9742
                        • LoadStringW.USER32(00000000,?,00DDF7F8,00000001), ref: 00DF9745
                        • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00DF9866
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: HandleLoadModuleString$Message_wcslen
                        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                        • API String ID: 747408836-2268648507
                        • Opcode ID: 661ae19c9f7f57f551604d56fdfcbbd9b90e8a2485edd737df7b6b0e1902036b
                        • Instruction ID: 1f26593cc7c388d86bfb8ebc4856010ce34f565b04d37f0e5aba06e4e6fb63fe
                        • Opcode Fuzzy Hash: 661ae19c9f7f57f551604d56fdfcbbd9b90e8a2485edd737df7b6b0e1902036b
                        • Instruction Fuzzy Hash: 0C412772800209AACF04FBE4DE96EEEB778EF55340F604069F60572092EA756F48CB71
                        APIs
                          • Part of subcall function 00D96B57: _wcslen.LIBCMT ref: 00D96B6A
                        • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00DF07A2
                        • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00DF07BE
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00DF07DA
                        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00DF0804
                        • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00DF082C
                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00DF0837
                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00DF083C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                        • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                        • API String ID: 323675364-22481851
                        • Opcode ID: 9308788c31800758f2c102fc88f8c24b4971c397dc67347a7211feefc69e24be
                        • Instruction ID: 296c773c96514aad3f72dcddb69658906efef2837465c0fae5ba6d2d367ac500
                        • Opcode Fuzzy Hash: 9308788c31800758f2c102fc88f8c24b4971c397dc67347a7211feefc69e24be
                        • Instruction Fuzzy Hash: FE410472C10229ABCF25EBA4DC95CEDB778FF54350B158169E911B3161EB30AE48CBB0
                        APIs
                        • CoInitialize.OLE32(00000000), ref: 00E07AF3
                        • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00E07B8F
                        • SHGetDesktopFolder.SHELL32(?), ref: 00E07BA3
                        • CoCreateInstance.OLE32(00E2FD08,00000000,00000001,00E56E6C,?), ref: 00E07BEF
                        • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00E07C74
                        • CoTaskMemFree.OLE32(?,?), ref: 00E07CCC
                        • SHBrowseForFolderW.SHELL32(?), ref: 00E07D57
                        • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00E07D7A
                        • CoTaskMemFree.OLE32(00000000), ref: 00E07D81
                        • CoTaskMemFree.OLE32(00000000), ref: 00E07DD6
                        • CoUninitialize.OLE32 ref: 00E07DDC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                        • String ID:
                        • API String ID: 2762341140-0
                        • Opcode ID: 2e2b7aa7d141ba808fa5915e110a63277bd7688afa241c29de3355e1a30d4ea9
                        • Instruction ID: 44d34aeb9414437624dd338b948fecb5a5addb654f20af4adbfd118694b48ef1
                        • Opcode Fuzzy Hash: 2e2b7aa7d141ba808fa5915e110a63277bd7688afa241c29de3355e1a30d4ea9
                        • Instruction Fuzzy Hash: 2AC11D75A04109AFDB14DFA4C884DAEBBF5FF48304B148499E556EB361D730EE85CBA0
                        APIs
                        • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00E25504
                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E25515
                        • CharNextW.USER32(00000158), ref: 00E25544
                        • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00E25585
                        • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00E2559B
                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E255AC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: MessageSend$CharNext
                        • String ID:
                        • API String ID: 1350042424-0
                        • Opcode ID: 8f339bcf972d08ce432f939a37459af18aa92c67cdea089f95a8e405bf15aa2f
                        • Instruction ID: 7a9306ad0d019485b06042da9ec0e137fee5277ab4903a4c9e7a607791dba1f0
                        • Opcode Fuzzy Hash: 8f339bcf972d08ce432f939a37459af18aa92c67cdea089f95a8e405bf15aa2f
                        • Instruction Fuzzy Hash: FB61CC32900628EFDF209F95ED84AFE7BB9FF09724F109045F925B6290C7708A81CB61
                        APIs
                        • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00DEFAAF
                        • SafeArrayAllocData.OLEAUT32(?), ref: 00DEFB08
                        • VariantInit.OLEAUT32(?), ref: 00DEFB1A
                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 00DEFB3A
                        • VariantCopy.OLEAUT32(?,?), ref: 00DEFB8D
                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 00DEFBA1
                        • VariantClear.OLEAUT32(?), ref: 00DEFBB6
                        • SafeArrayDestroyData.OLEAUT32(?), ref: 00DEFBC3
                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00DEFBCC
                        • VariantClear.OLEAUT32(?), ref: 00DEFBDE
                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00DEFBE9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                        • String ID:
                        • API String ID: 2706829360-0
                        • Opcode ID: 342821c86813a84089ae060d7eaf650ee10a4a3dceba661c11ff5b1f92356fc8
                        • Instruction ID: 72215949647712904c4f63e1f44b32d36d951b8e08738db0da55efebb7dc5929
                        • Opcode Fuzzy Hash: 342821c86813a84089ae060d7eaf650ee10a4a3dceba661c11ff5b1f92356fc8
                        • Instruction Fuzzy Hash: ED413F35A002199FCF10EF69DC549AEBBB9FF48354F108069E956A7261DB30E946CFB0
                        APIs
                        • GetKeyboardState.USER32(?), ref: 00DF9CA1
                        • GetAsyncKeyState.USER32(000000A0), ref: 00DF9D22
                        • GetKeyState.USER32(000000A0), ref: 00DF9D3D
                        • GetAsyncKeyState.USER32(000000A1), ref: 00DF9D57
                        • GetKeyState.USER32(000000A1), ref: 00DF9D6C
                        • GetAsyncKeyState.USER32(00000011), ref: 00DF9D84
                        • GetKeyState.USER32(00000011), ref: 00DF9D96
                        • GetAsyncKeyState.USER32(00000012), ref: 00DF9DAE
                        • GetKeyState.USER32(00000012), ref: 00DF9DC0
                        • GetAsyncKeyState.USER32(0000005B), ref: 00DF9DD8
                        • GetKeyState.USER32(0000005B), ref: 00DF9DEA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: State$Async$Keyboard
                        • String ID:
                        • API String ID: 541375521-0
                        • Opcode ID: 1c5eb35eb043c467bc202f4a5280f7c806b077d5acecaa39ae25a45a27548b26
                        • Instruction ID: 7df4d9e3cc027975bbd9078dded07fe0c9543436effdc18c15efa9308c4f1039
                        • Opcode Fuzzy Hash: 1c5eb35eb043c467bc202f4a5280f7c806b077d5acecaa39ae25a45a27548b26
                        • Instruction Fuzzy Hash: 0641B234D04BCD6DFF309661C8243B5EEA06B12344F1DC05ADBC65A5C2EBA499C887B2
                        APIs
                        • WSAStartup.WSOCK32(00000101,?), ref: 00E105BC
                        • inet_addr.WSOCK32(?), ref: 00E1061C
                        • gethostbyname.WSOCK32(?), ref: 00E10628
                        • IcmpCreateFile.IPHLPAPI ref: 00E10636
                        • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00E106C6
                        • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00E106E5
                        • IcmpCloseHandle.IPHLPAPI(?), ref: 00E107B9
                        • WSACleanup.WSOCK32 ref: 00E107BF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                        • String ID: Ping
                        • API String ID: 1028309954-2246546115
                        • Opcode ID: c93cf4ef5f1cae7be3aed1835f52fd086e5e31b0a06744f1dc875fa1b9f76bfd
                        • Instruction ID: 268524cb7d2ce39b70961cbc0c0d05c37d8ab1ae9791ae5123fc8c9d34f50f6c
                        • Opcode Fuzzy Hash: c93cf4ef5f1cae7be3aed1835f52fd086e5e31b0a06744f1dc875fa1b9f76bfd
                        • Instruction Fuzzy Hash: 9A91AD356042019FD720DF15C489F5ABBE1EF44318F1485AAF469AB6A2C7B0EDC5CF91
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _wcslen$BuffCharLower
                        • String ID: cdecl$none$stdcall$winapi
                        • API String ID: 707087890-567219261
                        • Opcode ID: db5d2211442077a13650b96d729d781016f3cb712190bf3c58dac0ff7494829d
                        • Instruction ID: 6bb2a38952da3f831fe0e8f567d549984607405e5fbc6e04b63162acd0dd3ae9
                        • Opcode Fuzzy Hash: db5d2211442077a13650b96d729d781016f3cb712190bf3c58dac0ff7494829d
                        • Instruction Fuzzy Hash: 17517F31A001169ACF14DF68CA518FEB7A6FF65728B215229E866B72C5DB31DD80C7A0
                        APIs
                        • CoInitialize.OLE32 ref: 00E13774
                        • CoUninitialize.OLE32 ref: 00E1377F
                        • CoCreateInstance.OLE32(?,00000000,00000017,00E2FB78,?), ref: 00E137D9
                        • IIDFromString.OLE32(?,?), ref: 00E1384C
                        • VariantInit.OLEAUT32(?), ref: 00E138E4
                        • VariantClear.OLEAUT32(?), ref: 00E13936
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                        • API String ID: 636576611-1287834457
                        • Opcode ID: 35944001c84e85289ba18e410d5a8777c4b38e7b83eaea6782d57356f7025ef4
                        • Instruction ID: ea227ad246f646d9cca8fa9766d81b86c5f8f3c7aa4c3a3faa22fc5d2b106c5e
                        • Opcode Fuzzy Hash: 35944001c84e85289ba18e410d5a8777c4b38e7b83eaea6782d57356f7025ef4
                        • Instruction Fuzzy Hash: 1A61B2716083019FD714DF64C885BABBBE8EF45714F10481AF985A7291C770EE88CBA2
                        APIs
                          • Part of subcall function 00DA9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DA9BB2
                          • Part of subcall function 00DA912D: GetCursorPos.USER32(?), ref: 00DA9141
                          • Part of subcall function 00DA912D: ScreenToClient.USER32(00000000,?), ref: 00DA915E
                          • Part of subcall function 00DA912D: GetAsyncKeyState.USER32(00000001), ref: 00DA9183
                          • Part of subcall function 00DA912D: GetAsyncKeyState.USER32(00000002), ref: 00DA919D
                        • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00E28B6B
                        • ImageList_EndDrag.COMCTL32 ref: 00E28B71
                        • ReleaseCapture.USER32 ref: 00E28B77
                        • SetWindowTextW.USER32(?,00000000), ref: 00E28C12
                        • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00E28C25
                        • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00E28CFF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                        • String ID: @GUI_DRAGFILE$@GUI_DROPID$p#
                        • API String ID: 1924731296-655930031
                        • Opcode ID: 04b5e93eb902694da8ed6b0e1e55883c58edbf3098d3e758490d0ded183b9831
                        • Instruction ID: dc891f2e35c75fa258d0ac98ea4eb55b8ba5311a4dec62b47091486c80b48c7a
                        • Opcode Fuzzy Hash: 04b5e93eb902694da8ed6b0e1e55883c58edbf3098d3e758490d0ded183b9831
                        • Instruction Fuzzy Hash: 37519C71205310AFDB14DF14EC56FAAB7E4FB88754F40062DF996A72E1CB709908CB62
                        APIs
                        • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00E033CF
                          • Part of subcall function 00D99CB3: _wcslen.LIBCMT ref: 00D99CBD
                        • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00E033F0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: LoadString$_wcslen
                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                        • API String ID: 4099089115-3080491070
                        • Opcode ID: 00314ddd4ec8425576e916b692583f79929c3d6a4cd5a7ae783c7a6d43c23d81
                        • Instruction ID: 7cdcb77dedf4bb5153ff0d3e5b1d0df24d0d4a4e82cdefef47fdfcec0876093b
                        • Opcode Fuzzy Hash: 00314ddd4ec8425576e916b692583f79929c3d6a4cd5a7ae783c7a6d43c23d81
                        • Instruction Fuzzy Hash: 3B519972800209AADF15EBE4DD52EEEB378EF14340F244166F505721A2EB716F98DB70
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _wcslen$BuffCharUpper
                        • String ID: APPEND$EXISTS$KEYS$REMOVE
                        • API String ID: 1256254125-769500911
                        • Opcode ID: 59d45f063a025c5c77cb6c5903820fa45c1c8106d6566747decd886c5af4209e
                        • Instruction ID: e87bf06142cf4bd634165caf3f08384bc47035af17fe1edcb995197850d1cf1a
                        • Opcode Fuzzy Hash: 59d45f063a025c5c77cb6c5903820fa45c1c8106d6566747decd886c5af4209e
                        • Instruction Fuzzy Hash: DC41BB32A0012A9BCB106F7DC8915BE77A5AF64774B2A812BE565DF284F731CD81C7B0
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 00E053A0
                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00E05416
                        • GetLastError.KERNEL32 ref: 00E05420
                        • SetErrorMode.KERNEL32(00000000,READY), ref: 00E054A7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Error$Mode$DiskFreeLastSpace
                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                        • API String ID: 4194297153-14809454
                        • Opcode ID: 71b54542e0a2660f2292171f297ceac2ccd3344a470f2aec0d714f82b4c45f9e
                        • Instruction ID: 584df194a8d8f72e092aba2e90e377f53b672622983f442a3e34f33adb9846c6
                        • Opcode Fuzzy Hash: 71b54542e0a2660f2292171f297ceac2ccd3344a470f2aec0d714f82b4c45f9e
                        • Instruction Fuzzy Hash: 6A31D236A005059FCB10DF68C485AEEBBB4EF44309F549469E812EB292DB30DDC6CFA1
                        APIs
                        • CreateMenu.USER32 ref: 00E23C79
                        • SetMenu.USER32(?,00000000), ref: 00E23C88
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E23D10
                        • IsMenu.USER32(?), ref: 00E23D24
                        • CreatePopupMenu.USER32 ref: 00E23D2E
                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00E23D5B
                        • DrawMenuBar.USER32 ref: 00E23D63
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Menu$CreateItem$DrawInfoInsertPopup
                        • String ID: 0$F
                        • API String ID: 161812096-3044882817
                        • Opcode ID: 72cf4887a3d73db641e7b5c1b4b034abb76b435ae72298fb89ca3a14bae9824a
                        • Instruction ID: 01d58ed75e6cdb1b87822cd9678dfc17a8045af1e37ea5235bfddd02b188b912
                        • Opcode Fuzzy Hash: 72cf4887a3d73db641e7b5c1b4b034abb76b435ae72298fb89ca3a14bae9824a
                        • Instruction Fuzzy Hash: 8B419A75A01219EFDB24CF65E844AEA7BB5FF49344F140028F946A7360D774EA14CF90
                        APIs
                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00E23A9D
                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00E23AA0
                        • GetWindowLongW.USER32(?,000000F0), ref: 00E23AC7
                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00E23AEA
                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00E23B62
                        • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00E23BAC
                        • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00E23BC7
                        • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00E23BE2
                        • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00E23BF6
                        • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00E23C13
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: MessageSend$LongWindow
                        • String ID:
                        • API String ID: 312131281-0
                        • Opcode ID: 16e1ce4d6c2f9b5072322d5a504645bbd0cc9c91402df04023f163a5e6f8da8d
                        • Instruction ID: 8adbc7658c2edf57c1f9411e947cb2d1b82f78b48bbad4688e00123c46526a8d
                        • Opcode Fuzzy Hash: 16e1ce4d6c2f9b5072322d5a504645bbd0cc9c91402df04023f163a5e6f8da8d
                        • Instruction Fuzzy Hash: FF617875900218AFDB11DFA8DC81EEEB7B8EB49704F14009AFA15B72A1C774AE45DF60
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 00DFB151
                        • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00DFA1E1,?,00000001), ref: 00DFB165
                        • GetWindowThreadProcessId.USER32(00000000), ref: 00DFB16C
                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00DFA1E1,?,00000001), ref: 00DFB17B
                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00DFB18D
                        • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00DFA1E1,?,00000001), ref: 00DFB1A6
                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00DFA1E1,?,00000001), ref: 00DFB1B8
                        • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00DFA1E1,?,00000001), ref: 00DFB1FD
                        • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00DFA1E1,?,00000001), ref: 00DFB212
                        • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00DFA1E1,?,00000001), ref: 00DFB21D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                        • String ID:
                        • API String ID: 2156557900-0
                        • Opcode ID: edc055c149f606034dc50d1750b75b0b8c46d4e0b841ea63a6508e07031fbec4
                        • Instruction ID: a806c26050af0241f4339e627cb1e4d30dea476e25cfe62cae9d07cae1641bda
                        • Opcode Fuzzy Hash: edc055c149f606034dc50d1750b75b0b8c46d4e0b841ea63a6508e07031fbec4
                        • Instruction Fuzzy Hash: 8A319171500208BFDB209F26EC48B7E7BAAFB51761F258006FA05E6190D7B49A498F74
                        APIs
                        • _free.LIBCMT ref: 00DC2C94
                          • Part of subcall function 00DC29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00DCD7D1,00000000,00000000,00000000,00000000,?,00DCD7F8,00000000,00000007,00000000,?,00DCDBF5,00000000), ref: 00DC29DE
                          • Part of subcall function 00DC29C8: GetLastError.KERNEL32(00000000,?,00DCD7D1,00000000,00000000,00000000,00000000,?,00DCD7F8,00000000,00000007,00000000,?,00DCDBF5,00000000,00000000), ref: 00DC29F0
                        • _free.LIBCMT ref: 00DC2CA0
                        • _free.LIBCMT ref: 00DC2CAB
                        • _free.LIBCMT ref: 00DC2CB6
                        • _free.LIBCMT ref: 00DC2CC1
                        • _free.LIBCMT ref: 00DC2CCC
                        • _free.LIBCMT ref: 00DC2CD7
                        • _free.LIBCMT ref: 00DC2CE2
                        • _free.LIBCMT ref: 00DC2CED
                        • _free.LIBCMT ref: 00DC2CFB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 63fdf2f65b3b53bdf7512b33ad77fb5d79e99469404c790735a0ba1c81ceeeee
                        • Instruction ID: 28cdabc39b0be2be30cd39da7ec6e0b27c8163bcb63f9c643176bd67c6ff8875
                        • Opcode Fuzzy Hash: 63fdf2f65b3b53bdf7512b33ad77fb5d79e99469404c790735a0ba1c81ceeeee
                        • Instruction Fuzzy Hash: E5115076540109AFCB02EF54D982EAD3BA5FF05350F5145A9FA489B222DB31EA509FB0
                        APIs
                        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00D91459
                        • OleUninitialize.OLE32(?,00000000), ref: 00D914F8
                        • UnregisterHotKey.USER32(?), ref: 00D916DD
                        • DestroyWindow.USER32(?), ref: 00DD24B9
                        • FreeLibrary.KERNEL32(?), ref: 00DD251E
                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00DD254B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                        • String ID: close all
                        • API String ID: 469580280-3243417748
                        • Opcode ID: 2aebc38932c2c279a942c62258d1ae24b812848ceffaf83efe55a7ddc17d7a15
                        • Instruction ID: e6a01896c75168acd9078e425a09303edcd47f9cb55386e8eac22199e3f8e73d
                        • Opcode Fuzzy Hash: 2aebc38932c2c279a942c62258d1ae24b812848ceffaf83efe55a7ddc17d7a15
                        • Instruction Fuzzy Hash: 21D156357012228FCB29EF65D895A29F7A4FF55700F2542AEE44A6B261DB30ED12CF70
                        APIs
                        • SetWindowLongW.USER32(?,000000EB), ref: 00D95C7A
                          • Part of subcall function 00D95D0A: GetClientRect.USER32(?,?), ref: 00D95D30
                          • Part of subcall function 00D95D0A: GetWindowRect.USER32(?,?), ref: 00D95D71
                          • Part of subcall function 00D95D0A: ScreenToClient.USER32(?,?), ref: 00D95D99
                        • GetDC.USER32 ref: 00DD46F5
                        • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00DD4708
                        • SelectObject.GDI32(00000000,00000000), ref: 00DD4716
                        • SelectObject.GDI32(00000000,00000000), ref: 00DD472B
                        • ReleaseDC.USER32(?,00000000), ref: 00DD4733
                        • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00DD47C4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                        • String ID: U
                        • API String ID: 4009187628-3372436214
                        • Opcode ID: 1252c06741a51e829f5b2870289e9a0665da683aaa1e7a59aa9c782920aaec72
                        • Instruction ID: fcaa3307cdd3e6c9ca642392ed72b3385d5856ffe5dbfd6117e0422b57e6ba7d
                        • Opcode Fuzzy Hash: 1252c06741a51e829f5b2870289e9a0665da683aaa1e7a59aa9c782920aaec72
                        • Instruction Fuzzy Hash: 1571C331500205EFCF228F64D984AFA7BB5FF46360F18426AE9566A26AC731DC45DFB0
                        APIs
                        • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00E035E4
                          • Part of subcall function 00D99CB3: _wcslen.LIBCMT ref: 00D99CBD
                        • LoadStringW.USER32(00E62390,?,00000FFF,?), ref: 00E0360A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: LoadString$_wcslen
                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                        • API String ID: 4099089115-2391861430
                        • Opcode ID: 54ac8dd5e174711659e1a3890aacb612b87ad28e4ed1b1a65db70db9a41e1aa0
                        • Instruction ID: e6feb4192dcf3b9ec939eb58ef6dafa498a09606831fd4dd0f18a8ed805c6e1b
                        • Opcode Fuzzy Hash: 54ac8dd5e174711659e1a3890aacb612b87ad28e4ed1b1a65db70db9a41e1aa0
                        • Instruction Fuzzy Hash: 9E518E72C00209BACF15EBA4DC52EEEBB38EF14340F185169F515721A2EB711A98DFB0
                        APIs
                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00E0C272
                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00E0C29A
                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00E0C2CA
                        • GetLastError.KERNEL32 ref: 00E0C322
                        • SetEvent.KERNEL32(?), ref: 00E0C336
                        • InternetCloseHandle.WININET(00000000), ref: 00E0C341
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                        • String ID:
                        • API String ID: 3113390036-3916222277
                        • Opcode ID: 6072fc850d20a7e9110d19b5ac91a2adc0a94bc6b66af49c5b4cff53eb3d78e5
                        • Instruction ID: c6bf00f1d52b965b7003744f7e33c0a006fbc83fd3edeb668b0ef4cca200c3c4
                        • Opcode Fuzzy Hash: 6072fc850d20a7e9110d19b5ac91a2adc0a94bc6b66af49c5b4cff53eb3d78e5
                        • Instruction Fuzzy Hash: A53171B1500604AFD7219FA5CC84AAF7BFCEB49744F20961EF446B2290DB34DD8A9B61
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00DD3AAF,?,?,Bad directive syntax error,00E2CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00DF98BC
                        • LoadStringW.USER32(00000000,?,00DD3AAF,?), ref: 00DF98C3
                          • Part of subcall function 00D99CB3: _wcslen.LIBCMT ref: 00D99CBD
                        • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00DF9987
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: HandleLoadMessageModuleString_wcslen
                        • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                        • API String ID: 858772685-4153970271
                        • Opcode ID: d64b3e14a481009a8519262ddd4b520f7bb01cc809f5f922cd64b50cbbb54a88
                        • Instruction ID: 27cbc0e88537723bed6e6b836d6a0a1ce8659cc96ebbbeb91bee8684ed6a632b
                        • Opcode Fuzzy Hash: d64b3e14a481009a8519262ddd4b520f7bb01cc809f5f922cd64b50cbbb54a88
                        • Instruction Fuzzy Hash: 19215C31C4021AABCF11AF90CC16EEEB735FF18301F04946AFA15720A2EA719618CB71
                        APIs
                        • GetParent.USER32 ref: 00DF20AB
                        • GetClassNameW.USER32(00000000,?,00000100), ref: 00DF20C0
                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00DF214D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ClassMessageNameParentSend
                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                        • API String ID: 1290815626-3381328864
                        • Opcode ID: 5d10049f092a5c480008e4c4768932629aa59ed62c5a8f25b937c450458eafde
                        • Instruction ID: a468cad8ed65befad1eb308f7b0d497c390cb3af57b60e6c985becad36637e09
                        • Opcode Fuzzy Hash: 5d10049f092a5c480008e4c4768932629aa59ed62c5a8f25b937c450458eafde
                        • Instruction Fuzzy Hash: A41136772C870AF9FA116220DC1BDFA739CCF05725B214116FB05B40E2FE61A80A5639
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 703b0e1728dad03bbfd95b2d0c4caeefedd220ce6cbc7020dd566c37a5767179
                        • Instruction ID: 9841a5daad716f5723a13cb5e8b68bd131059f38d946a63d6a9deff8c676ea6f
                        • Opcode Fuzzy Hash: 703b0e1728dad03bbfd95b2d0c4caeefedd220ce6cbc7020dd566c37a5767179
                        • Instruction Fuzzy Hash: B9C1EF74A0424AAFCB11DFA9D855FEEBBB4AF09310F18409DF855A7392CB708941DB71
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                        • String ID:
                        • API String ID: 1282221369-0
                        • Opcode ID: 36bdea9ac123af4a2dd85846a73da29663dfcdf52944ed305f7775c97b294c6c
                        • Instruction ID: 683d59a698a52473158e10ec4c8179ff01eead1f99eb119e9d9c1dfe6eb02bc5
                        • Opcode Fuzzy Hash: 36bdea9ac123af4a2dd85846a73da29663dfcdf52944ed305f7775c97b294c6c
                        • Instruction Fuzzy Hash: 7E61E471905313AFDF21AFB99C81F6A7BA9EF05360F08426DFA49A7281DA7199018770
                        APIs
                        • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00DE6890
                        • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00DE68A9
                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00DE68B9
                        • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00DE68D1
                        • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00DE68F2
                        • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00DA8874,00000000,00000000,00000000,000000FF,00000000), ref: 00DE6901
                        • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00DE691E
                        • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00DA8874,00000000,00000000,00000000,000000FF,00000000), ref: 00DE692D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Icon$DestroyExtractImageLoadMessageSend
                        • String ID:
                        • API String ID: 1268354404-0
                        • Opcode ID: 5bc195499190b657c18fb99a85956b71eb57ebb1d97f5e8ea1bc58e5a61adf5b
                        • Instruction ID: e31e073c2e54cd049fb95678d31b7ce4b316922d3de74a9d3087dbb9293bfeb6
                        • Opcode Fuzzy Hash: 5bc195499190b657c18fb99a85956b71eb57ebb1d97f5e8ea1bc58e5a61adf5b
                        • Instruction Fuzzy Hash: AC51AA70600209EFDB20DF26CC95BAA7BB5FF58790F144518F956A72A0DB70E950DB70
                        APIs
                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00E0C182
                        • GetLastError.KERNEL32 ref: 00E0C195
                        • SetEvent.KERNEL32(?), ref: 00E0C1A9
                          • Part of subcall function 00E0C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00E0C272
                          • Part of subcall function 00E0C253: GetLastError.KERNEL32 ref: 00E0C322
                          • Part of subcall function 00E0C253: SetEvent.KERNEL32(?), ref: 00E0C336
                          • Part of subcall function 00E0C253: InternetCloseHandle.WININET(00000000), ref: 00E0C341
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                        • String ID:
                        • API String ID: 337547030-0
                        • Opcode ID: 30b93cfde23000d72581629915f3ff93d8ae75585d9961af5881521ab1675b13
                        • Instruction ID: ae4c9c7b2f34fa18da17ca8d355690a01114772c111d81ad060524b284ef6bcf
                        • Opcode Fuzzy Hash: 30b93cfde23000d72581629915f3ff93d8ae75585d9961af5881521ab1675b13
                        • Instruction Fuzzy Hash: E631A371501A01FFDB219FF5DD04A6A7BF8FF18304B20561DF956A3660D730E8569BA0
                        APIs
                          • Part of subcall function 00DF3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00DF3A57
                          • Part of subcall function 00DF3A3D: GetCurrentThreadId.KERNEL32 ref: 00DF3A5E
                          • Part of subcall function 00DF3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00DF25B3), ref: 00DF3A65
                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00DF25BD
                        • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00DF25DB
                        • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00DF25DF
                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00DF25E9
                        • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00DF2601
                        • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00DF2605
                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00DF260F
                        • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00DF2623
                        • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00DF2627
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                        • String ID:
                        • API String ID: 2014098862-0
                        • Opcode ID: 32e8f7c255b3dec7eff3c98486a20f86cf6849b6d2badecab30b59cf25854691
                        • Instruction ID: 56fd6412f05bbb023d09b818d7c6b3573ced481eca9200a96a1c5967c32c95ff
                        • Opcode Fuzzy Hash: 32e8f7c255b3dec7eff3c98486a20f86cf6849b6d2badecab30b59cf25854691
                        • Instruction Fuzzy Hash: 3D01D830390614BBFB20676ADC8BF693F59DF4EB11F214001F354BE1D1C9E254898A7A
                        APIs
                        • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00DF1449,?,?,00000000), ref: 00DF180C
                        • HeapAlloc.KERNEL32(00000000,?,00DF1449,?,?,00000000), ref: 00DF1813
                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00DF1449,?,?,00000000), ref: 00DF1828
                        • GetCurrentProcess.KERNEL32(?,00000000,?,00DF1449,?,?,00000000), ref: 00DF1830
                        • DuplicateHandle.KERNEL32(00000000,?,00DF1449,?,?,00000000), ref: 00DF1833
                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00DF1449,?,?,00000000), ref: 00DF1843
                        • GetCurrentProcess.KERNEL32(00DF1449,00000000,?,00DF1449,?,?,00000000), ref: 00DF184B
                        • DuplicateHandle.KERNEL32(00000000,?,00DF1449,?,?,00000000), ref: 00DF184E
                        • CreateThread.KERNEL32(00000000,00000000,00DF1874,00000000,00000000,00000000), ref: 00DF1868
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                        • String ID:
                        • API String ID: 1957940570-0
                        • Opcode ID: ec84005965069041aef53a1dbd0e9cd627b55475d3f8064e684eac5806761e39
                        • Instruction ID: e654009385fbb7354b7c70a32fe397e9591f1799165e3bedb035beba6392dade
                        • Opcode Fuzzy Hash: ec84005965069041aef53a1dbd0e9cd627b55475d3f8064e684eac5806761e39
                        • Instruction Fuzzy Hash: BB01BF75641308BFE720AB65DC4EF6B3B6CEB89B11F214411FA05DB192C6709815CB60
                        APIs
                          • Part of subcall function 00DFD4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00DFD501
                          • Part of subcall function 00DFD4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00DFD50F
                          • Part of subcall function 00DFD4DC: CloseHandle.KERNEL32(00000000), ref: 00DFD5DC
                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00E1A16D
                        • GetLastError.KERNEL32 ref: 00E1A180
                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00E1A1B3
                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 00E1A268
                        • GetLastError.KERNEL32(00000000), ref: 00E1A273
                        • CloseHandle.KERNEL32(00000000), ref: 00E1A2C4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                        • String ID: SeDebugPrivilege
                        • API String ID: 2533919879-2896544425
                        • Opcode ID: a58dfd367e02e2c43781eca64bbfe3ae31879ee8bfd41cf1870dbb3a50b5d263
                        • Instruction ID: 1c176f952dc92ff1b7e802d8a86472ed73b7564287a5b93584344adf0290c776
                        • Opcode Fuzzy Hash: a58dfd367e02e2c43781eca64bbfe3ae31879ee8bfd41cf1870dbb3a50b5d263
                        • Instruction Fuzzy Hash: 5D61E471206201AFD720DF14C494F69BBE1EF44318F58849CE4669B7A3C772EC89CBA2
                        APIs
                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00E23925
                        • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00E2393A
                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00E23954
                        • _wcslen.LIBCMT ref: 00E23999
                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 00E239C6
                        • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00E239F4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: MessageSend$Window_wcslen
                        • String ID: SysListView32
                        • API String ID: 2147712094-78025650
                        • Opcode ID: 887018dee09329ce1402d265eeb73b854c9f698d9971d6d9fccc3fb2f3c08295
                        • Instruction ID: f26c8305a3a198eff6beaa2f1ff53aad12add6d1e9c94f397406fca69faaf907
                        • Opcode Fuzzy Hash: 887018dee09329ce1402d265eeb73b854c9f698d9971d6d9fccc3fb2f3c08295
                        • Instruction Fuzzy Hash: 9F41C171A00228ABEB259F64DC45BEA7BA9EF48354F101526F948F7281D3759984CFA0
                        APIs
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00DFBCFD
                        • IsMenu.USER32(00000000), ref: 00DFBD1D
                        • CreatePopupMenu.USER32 ref: 00DFBD53
                        • GetMenuItemCount.USER32(00F46440), ref: 00DFBDA4
                        • InsertMenuItemW.USER32(00F46440,?,00000001,00000030), ref: 00DFBDCC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Menu$Item$CountCreateInfoInsertPopup
                        • String ID: 0$2
                        • API String ID: 93392585-3793063076
                        • Opcode ID: b04847aa7d7eae4b5a3c3a2988c35b6aa212e3276146f8237c930c2fe2fce050
                        • Instruction ID: 07c0f2c930eb54c5f3267bcf6b349f53ec79eef3295bf5e8975c5e0279b6bdaf
                        • Opcode Fuzzy Hash: b04847aa7d7eae4b5a3c3a2988c35b6aa212e3276146f8237c930c2fe2fce050
                        • Instruction Fuzzy Hash: 4C518F7060020D9BDB20DFA9DC84BBEBBF4EF45324F29C11AE652A7290D7709945CB72
                        APIs
                        • LoadIconW.USER32(00000000,00007F03), ref: 00DFC913
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: IconLoad
                        • String ID: blank$info$question$stop$warning
                        • API String ID: 2457776203-404129466
                        • Opcode ID: dbd4b0f3a70894ada7b44747fb0fe6785477ded8b9feff9bc7dea573c7d1bdd5
                        • Instruction ID: 3c8078e09fbf945214cb0040259d606b803ce5272794c5a8ef88fd7758ca993c
                        • Opcode Fuzzy Hash: dbd4b0f3a70894ada7b44747fb0fe6785477ded8b9feff9bc7dea573c7d1bdd5
                        • Instruction Fuzzy Hash: E7115B3169930EBBEB009B10DD82CFE639CCF1935AB61502BFA00B7182E7A1DE545674
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _wcslen$LocalTime
                        • String ID:
                        • API String ID: 952045576-0
                        • Opcode ID: fb9275eeabc083992d93837c6c7c3674c9b5f77e225a4c5626b5d41c77e95144
                        • Instruction ID: ece8f454f92ef5d9ee5b666c0572ad8dad992caa41826097a9b1604ad7bc0b7a
                        • Opcode Fuzzy Hash: fb9275eeabc083992d93837c6c7c3674c9b5f77e225a4c5626b5d41c77e95144
                        • Instruction Fuzzy Hash: D041A165C10218B6DB11EBF48C8A9DFB7A8EF45310F508466F619E3122FB38E245C7B9
                        APIs
                        • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00DE682C,00000004,00000000,00000000), ref: 00DAF953
                        • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00DE682C,00000004,00000000,00000000), ref: 00DEF3D1
                        • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00DE682C,00000004,00000000,00000000), ref: 00DEF454
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ShowWindow
                        • String ID:
                        • API String ID: 1268545403-0
                        • Opcode ID: 258bae430bfc2a088a51a480c96050837016641a4b6d7d8dfac4f206efda2945
                        • Instruction ID: 7baca1fc61870c0fe183bfd5e0011e4ec6bac593d0775bd965efd1bd92499f37
                        • Opcode Fuzzy Hash: 258bae430bfc2a088a51a480c96050837016641a4b6d7d8dfac4f206efda2945
                        • Instruction Fuzzy Hash: 90410931604680BEC7799B7AC88876F7B91AF57314F1C48BDE087625A0C672E885CF71
                        APIs
                        • DeleteObject.GDI32(00000000), ref: 00E22D1B
                        • GetDC.USER32(00000000), ref: 00E22D23
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E22D2E
                        • ReleaseDC.USER32(00000000,00000000), ref: 00E22D3A
                        • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00E22D76
                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00E22D87
                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00E25A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00E22DC2
                        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00E22DE1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                        • String ID:
                        • API String ID: 3864802216-0
                        • Opcode ID: af25b022f29d29cec13d55111b5e6686c2539c590ce34e9a83fd355c5a1c2a78
                        • Instruction ID: 134b35b2d5655ac6c59618592603dd411815b0cfa4a0575a60af5f07f4b8e581
                        • Opcode Fuzzy Hash: af25b022f29d29cec13d55111b5e6686c2539c590ce34e9a83fd355c5a1c2a78
                        • Instruction Fuzzy Hash: 2931BF72201220BFEB204F11DC8AFEB3BA9EF09715F044055FE08AA291C6758C41C7A4
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _memcmp
                        • String ID:
                        • API String ID: 2931989736-0
                        • Opcode ID: 969729b11ba188478ecf1bdc7f31c9f228d590d40ff2f9e923fab9868bba5e23
                        • Instruction ID: 5ce43013e93b8e2d453e62d09787d2f4abda6b5c182230f5997f4f4b5b197982
                        • Opcode Fuzzy Hash: 969729b11ba188478ecf1bdc7f31c9f228d590d40ff2f9e923fab9868bba5e23
                        • Instruction Fuzzy Hash: 4421AA65644A1DB7D6146510BD92FFA739CEF113C4F998030FF16EA645F720EE1081B5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID:
                        • String ID: NULL Pointer assignment$Not an Object type
                        • API String ID: 0-572801152
                        • Opcode ID: e0e597e7d5fba8a75150a24410b72df73a88a46d217aa2a48d19cf444973e610
                        • Instruction ID: 4d57b97b6bc5c184ddbbea1db369d8a4950d570f04ba2ce7e2eccf8cd6ce249c
                        • Opcode Fuzzy Hash: e0e597e7d5fba8a75150a24410b72df73a88a46d217aa2a48d19cf444973e610
                        • Instruction Fuzzy Hash: 8BD18072A0060AEFDB10DF98D881BEEB7B5BF88344F149469E915BB281D770DD85CB60
                        APIs
                        • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,00DD17FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 00DD15CE
                        • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00DD17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00DD1651
                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00DD17FB,?,00DD17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00DD16E4
                        • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00DD17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00DD16FB
                          • Part of subcall function 00DC3820: RtlAllocateHeap.NTDLL(00000000,?,00E61444,?,00DAFDF5,?,?,00D9A976,00000010,00E61440,00D913FC,?,00D913C6,?,00D91129), ref: 00DC3852
                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00DD17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00DD1777
                        • __freea.LIBCMT ref: 00DD17A2
                        • __freea.LIBCMT ref: 00DD17AE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                        • String ID:
                        • API String ID: 2829977744-0
                        • Opcode ID: 8e70cddb90ca572454b3922a90ae153d1e62637d738e2711c7945de4f5765886
                        • Instruction ID: 2844d7fb147a594f6b1866d2ef0aa08eac6469c46aa1818878acf1145ce461bb
                        • Opcode Fuzzy Hash: 8e70cddb90ca572454b3922a90ae153d1e62637d738e2711c7945de4f5765886
                        • Instruction Fuzzy Hash: 9691B279E00216BEDB208E64DC81AEE7BB5EF49310F18465AE806E7391D739DD44CB70
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Variant$ClearInit
                        • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                        • API String ID: 2610073882-625585964
                        • Opcode ID: dba3ba0c1adc2fd36a797ce5dd18346e01e72c2d40390ef3a3771dc9957e772e
                        • Instruction ID: 78416fdc5313b44751402ec67d1aaf6d5d0781b1361a38c3e0fcc7e4f6564d7f
                        • Opcode Fuzzy Hash: dba3ba0c1adc2fd36a797ce5dd18346e01e72c2d40390ef3a3771dc9957e772e
                        • Instruction Fuzzy Hash: DA918EB1A00219ABDF20CFA5D844FEEBBB8EF46714F10955AF515BB2C0D7709985CBA0
                        APIs
                        • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 00E0125C
                        • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00E01284
                        • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 00E012A8
                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00E012D8
                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00E0135F
                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00E013C4
                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00E01430
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ArraySafe$Data$Access$UnaccessVartype
                        • String ID:
                        • API String ID: 2550207440-0
                        • Opcode ID: 6f5f946c1d5c0396fc8b77b551dcbec0a14da6ebcca0ea35dfa3e473fab28a41
                        • Instruction ID: 9fc33b093403612457db5b965d857bf38d21d725620c89ffcbb14c87ee2ce47e
                        • Opcode Fuzzy Hash: 6f5f946c1d5c0396fc8b77b551dcbec0a14da6ebcca0ea35dfa3e473fab28a41
                        • Instruction Fuzzy Hash: 5691D071A00208AFDB00DFA4C884BBEB7B5FF45314F1150A9E951FB2E1D774A981CBA0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ObjectSelect$BeginCreatePath
                        • String ID:
                        • API String ID: 3225163088-0
                        • Opcode ID: d9083cd0c7688ee6accb4b7bb0ecf750b8d60140fc31103832737a80025532b0
                        • Instruction ID: 3fea702caba42b76f4eb6cc5edfe71d534594462cdbc459a6cc86b8cc93c587e
                        • Opcode Fuzzy Hash: d9083cd0c7688ee6accb4b7bb0ecf750b8d60140fc31103832737a80025532b0
                        • Instruction Fuzzy Hash: 85912471D00219AFCB54CFA9C885AEEBBB9FF49320F248459E515B7251D378AA42CB70
                        APIs
                        • VariantInit.OLEAUT32(?), ref: 00E1396B
                        • CharUpperBuffW.USER32(?,?), ref: 00E13A7A
                        • _wcslen.LIBCMT ref: 00E13A8A
                        • VariantClear.OLEAUT32(?), ref: 00E13C1F
                          • Part of subcall function 00E00CDF: VariantInit.OLEAUT32(00000000), ref: 00E00D1F
                          • Part of subcall function 00E00CDF: VariantCopy.OLEAUT32(?,?), ref: 00E00D28
                          • Part of subcall function 00E00CDF: VariantClear.OLEAUT32(?), ref: 00E00D34
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                        • String ID: AUTOIT.ERROR$Incorrect Parameter format
                        • API String ID: 4137639002-1221869570
                        • Opcode ID: e313d29590b4235affa8e753cf8411c537314268827faefd19821dcc9ccde0a8
                        • Instruction ID: 0ee09360f278cccddc5786038a4705893a06fe9837ca6fc2337469517742b4a7
                        • Opcode Fuzzy Hash: e313d29590b4235affa8e753cf8411c537314268827faefd19821dcc9ccde0a8
                        • Instruction Fuzzy Hash: 2C916D756083059FCB04DF28C4919AAB7E4FF89314F14896DF89AA7351DB30EE45CBA2
                        APIs
                          • Part of subcall function 00DF000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DEFF41,80070057,?,?,?,00DF035E), ref: 00DF002B
                          • Part of subcall function 00DF000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DEFF41,80070057,?,?), ref: 00DF0046
                          • Part of subcall function 00DF000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DEFF41,80070057,?,?), ref: 00DF0054
                          • Part of subcall function 00DF000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DEFF41,80070057,?), ref: 00DF0064
                        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00E14C51
                        • _wcslen.LIBCMT ref: 00E14D59
                        • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00E14DCF
                        • CoTaskMemFree.OLE32(?), ref: 00E14DDA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                        • String ID: NULL Pointer assignment
                        • API String ID: 614568839-2785691316
                        • Opcode ID: b5b41dfb3402df469d46520e0f3895ef79b2c9a1f4a5c26de9a9dd34c957ac8e
                        • Instruction ID: 860703cbec4f3f714e0bd38e11a30aec52b9a9131c3c84095f057d61358b8c80
                        • Opcode Fuzzy Hash: b5b41dfb3402df469d46520e0f3895ef79b2c9a1f4a5c26de9a9dd34c957ac8e
                        • Instruction Fuzzy Hash: 9991E7B1D0021DAFDF14DFA4D891AEEB7B9FF08314F108569E915BB291DB309A458FA0
                        APIs
                        • GetMenu.USER32(?), ref: 00E22183
                        • GetMenuItemCount.USER32(00000000), ref: 00E221B5
                        • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00E221DD
                        • _wcslen.LIBCMT ref: 00E22213
                        • GetMenuItemID.USER32(?,?), ref: 00E2224D
                        • GetSubMenu.USER32(?,?), ref: 00E2225B
                          • Part of subcall function 00DF3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00DF3A57
                          • Part of subcall function 00DF3A3D: GetCurrentThreadId.KERNEL32 ref: 00DF3A5E
                          • Part of subcall function 00DF3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00DF25B3), ref: 00DF3A65
                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00E222E3
                          • Part of subcall function 00DFE97B: Sleep.KERNEL32 ref: 00DFE9F3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                        • String ID:
                        • API String ID: 4196846111-0
                        • Opcode ID: fea23adf7e0c5f3404abbc673432b4de27d13e944373e67411d7c1d0e800e803
                        • Instruction ID: f7edca2b925b5c1440bf758f5f84c50eaaca19d09d6696c9908670bb819422a6
                        • Opcode Fuzzy Hash: fea23adf7e0c5f3404abbc673432b4de27d13e944373e67411d7c1d0e800e803
                        • Instruction Fuzzy Hash: 4671AC36A00215EFCB14DFA4D841AAEB7F1EF88310F108458EA16BB351DB35EE418BA0
                        APIs
                        • GetParent.USER32(?), ref: 00DFAEF9
                        • GetKeyboardState.USER32(?), ref: 00DFAF0E
                        • SetKeyboardState.USER32(?), ref: 00DFAF6F
                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 00DFAF9D
                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 00DFAFBC
                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 00DFAFFD
                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00DFB020
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: MessagePost$KeyboardState$Parent
                        • String ID:
                        • API String ID: 87235514-0
                        • Opcode ID: 8dfb6a4cfb9de3dabe63a119f33fd0a038cbc58b26f86dd4a3e2f3ca95dfde00
                        • Instruction ID: 72f71dbd202e08b0a0e3276a9808297635bbede6d3abc351795c86866b704538
                        • Opcode Fuzzy Hash: 8dfb6a4cfb9de3dabe63a119f33fd0a038cbc58b26f86dd4a3e2f3ca95dfde00
                        • Instruction Fuzzy Hash: F25191E06046D93DFB364238CC45BBA7EA96F06314F0DC58AF6D9594C2C798AC88D771
                        APIs
                        • GetParent.USER32(00000000), ref: 00DFAD19
                        • GetKeyboardState.USER32(?), ref: 00DFAD2E
                        • SetKeyboardState.USER32(?), ref: 00DFAD8F
                        • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00DFADBB
                        • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00DFADD8
                        • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00DFAE17
                        • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00DFAE38
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: MessagePost$KeyboardState$Parent
                        • String ID:
                        • API String ID: 87235514-0
                        • Opcode ID: eb46f3d887cc2a59299d5082e8b522270aadff3a1ef0de7603fbccc28b900e95
                        • Instruction ID: aef383aa66ca47045a3868c6d67cf001edff9f93dde271d7b71252ea34b7e79a
                        • Opcode Fuzzy Hash: eb46f3d887cc2a59299d5082e8b522270aadff3a1ef0de7603fbccc28b900e95
                        • Instruction Fuzzy Hash: 0C51D5E16047D93DFB368228CC55B7A7EA96B45300F0DC489F2DD5A8C2D294EC88D772
                        APIs
                        • GetConsoleCP.KERNEL32(00DD3CD6,?,?,?,?,?,?,?,?,00DC5BA3,?,?,00DD3CD6,?,?), ref: 00DC5470
                        • __fassign.LIBCMT ref: 00DC54EB
                        • __fassign.LIBCMT ref: 00DC5506
                        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00DD3CD6,00000005,00000000,00000000), ref: 00DC552C
                        • WriteFile.KERNEL32(?,00DD3CD6,00000000,00DC5BA3,00000000,?,?,?,?,?,?,?,?,?,00DC5BA3,?), ref: 00DC554B
                        • WriteFile.KERNEL32(?,?,00000001,00DC5BA3,00000000,?,?,?,?,?,?,?,?,?,00DC5BA3,?), ref: 00DC5584
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                        • String ID:
                        • API String ID: 1324828854-0
                        • Opcode ID: cecd465be1f286af1c7c51a46bf78d874f7ae498d0a10845cc7e46ae88072df7
                        • Instruction ID: 0a8bf47a4174284a60b1e3fd6d71c447828e597a7f81022187e4315adda72e2a
                        • Opcode Fuzzy Hash: cecd465be1f286af1c7c51a46bf78d874f7ae498d0a10845cc7e46ae88072df7
                        • Instruction Fuzzy Hash: 6451A270A00609AFDF10CFA8E845FEEBBF9EF09300F24455EE555E7291D670AA81CB60
                        APIs
                        • GetCursorPos.USER32(?), ref: 00DA9141
                        • ScreenToClient.USER32(00000000,?), ref: 00DA915E
                        • GetAsyncKeyState.USER32(00000001), ref: 00DA9183
                        • GetAsyncKeyState.USER32(00000002), ref: 00DA919D
                        Strings
                        • 2d0ad0c99b0571a9d88dce1e6d4708399fafc10ea6855658149b5f6881f0ff2e82be4b48bc761deee85fa51f2ac5e3cf88bcfa89e727da99342ec30e974523a852, xrefs: 00DE7152
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: AsyncState$ClientCursorScreen
                        • String ID: 2d0ad0c99b0571a9d88dce1e6d4708399fafc10ea6855658149b5f6881f0ff2e82be4b48bc761deee85fa51f2ac5e3cf88bcfa89e727da99342ec30e974523a852
                        • API String ID: 4210589936-3886049831
                        • Opcode ID: 8507fbe9adc13f3fcf4e57c75a4558d28353b080c21e9a9148d5af55f41081ec
                        • Instruction ID: 670f3a9b7699334096ff6b7c4d682b2c208a61554a9f9e76f6e403615930d4bc
                        • Opcode Fuzzy Hash: 8507fbe9adc13f3fcf4e57c75a4558d28353b080c21e9a9148d5af55f41081ec
                        • Instruction Fuzzy Hash: 8C419F31A0875ABBDF15AF65C854BEEF774FF06320F248219E429A72D0C730A954CBA1
                        APIs
                        • _ValidateLocalCookies.LIBCMT ref: 00DB2D4B
                        • ___except_validate_context_record.LIBVCRUNTIME ref: 00DB2D53
                        • _ValidateLocalCookies.LIBCMT ref: 00DB2DE1
                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00DB2E0C
                        • _ValidateLocalCookies.LIBCMT ref: 00DB2E61
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                        • String ID: csm
                        • API String ID: 1170836740-1018135373
                        • Opcode ID: 55b981fa7745f14402a5a2e9c9ec821724ee37e25ba4c36014b089b1f2e36feb
                        • Instruction ID: 37336a24ad5f9c208d2acf3a86591668b116e91b7ea1b8cbcad6d11feaeba9b7
                        • Opcode Fuzzy Hash: 55b981fa7745f14402a5a2e9c9ec821724ee37e25ba4c36014b089b1f2e36feb
                        • Instruction Fuzzy Hash: 1141A135A00209EBCF10DF69C855AEEBBA5FF44324F188155E8166B392D731EA05CBF1
                        APIs
                          • Part of subcall function 00E1304E: inet_addr.WSOCK32(?), ref: 00E1307A
                          • Part of subcall function 00E1304E: _wcslen.LIBCMT ref: 00E1309B
                        • socket.WSOCK32(00000002,00000001,00000006), ref: 00E11112
                        • WSAGetLastError.WSOCK32 ref: 00E11121
                        • WSAGetLastError.WSOCK32 ref: 00E111C9
                        • closesocket.WSOCK32(00000000), ref: 00E111F9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                        • String ID:
                        • API String ID: 2675159561-0
                        • Opcode ID: 5501ee5e6c1e0e3adafaefb4c2dc51fccfe93037d996d7c744c62c703432dcca
                        • Instruction ID: 882ef1d0b338bba481e19f180a2498b503d85d5e0b8b7112c1ce3a8976cefe34
                        • Opcode Fuzzy Hash: 5501ee5e6c1e0e3adafaefb4c2dc51fccfe93037d996d7c744c62c703432dcca
                        • Instruction Fuzzy Hash: 0C41C331601214AFDB209F24C884BEDB7E9EF45368F148099FA19AB291D770AD85CBA1
                        APIs
                          • Part of subcall function 00DFDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00DFCF22,?), ref: 00DFDDFD
                          • Part of subcall function 00DFDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00DFCF22,?), ref: 00DFDE16
                        • lstrcmpiW.KERNEL32(?,?), ref: 00DFCF45
                        • MoveFileW.KERNEL32(?,?), ref: 00DFCF7F
                        • _wcslen.LIBCMT ref: 00DFD005
                        • _wcslen.LIBCMT ref: 00DFD01B
                        • SHFileOperationW.SHELL32(?), ref: 00DFD061
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                        • String ID: \*.*
                        • API String ID: 3164238972-1173974218
                        • Opcode ID: 377b7652960ffaa985f07fabd6d320a252b275746ce292fbf088bff78fc5aaf2
                        • Instruction ID: 40e03f57b9fc67a4c79a17dba58c27144e81b9780b4d7d23f8a2112f7e84ba33
                        • Opcode Fuzzy Hash: 377b7652960ffaa985f07fabd6d320a252b275746ce292fbf088bff78fc5aaf2
                        • Instruction Fuzzy Hash: 7C41787180621C9FDF12EFA4CE81AEDB7B9EF48340F1540E6E605EB151EA34A648CB70
                        APIs
                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00E22E1C
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00E22E4F
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00E22E84
                        • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00E22EB6
                        • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00E22EE0
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00E22EF1
                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00E22F0B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: LongWindow$MessageSend
                        • String ID:
                        • API String ID: 2178440468-0
                        • Opcode ID: 9691898bc03e7178ac0328d54e6012cc918d136c7e616c663da00d0f9bbf4e04
                        • Instruction ID: 95587d1b7122e083029c4b2fa2f241640687f6fd61a23844b01a6ee31a0c4bdd
                        • Opcode Fuzzy Hash: 9691898bc03e7178ac0328d54e6012cc918d136c7e616c663da00d0f9bbf4e04
                        • Instruction Fuzzy Hash: 15310A30644160AFDB22CF59EC84F6537E1FB99754F2A11A8F610AF2B1CBB1A845EF41
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00DF7769
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00DF778F
                        • SysAllocString.OLEAUT32(00000000), ref: 00DF7792
                        • SysAllocString.OLEAUT32(?), ref: 00DF77B0
                        • SysFreeString.OLEAUT32(?), ref: 00DF77B9
                        • StringFromGUID2.OLE32(?,?,00000028), ref: 00DF77DE
                        • SysAllocString.OLEAUT32(?), ref: 00DF77EC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                        • String ID:
                        • API String ID: 3761583154-0
                        • Opcode ID: e05079460b43774349d52bf0454c3180ce2662aef081a42c62741776e8539253
                        • Instruction ID: 0cdcf92def4d1c15828199b6c8b386366887689e6a40fd8bde6bddd1df099a83
                        • Opcode Fuzzy Hash: e05079460b43774349d52bf0454c3180ce2662aef081a42c62741776e8539253
                        • Instruction Fuzzy Hash: F221A17660421DAFDB10EFA9DC88CFB73ACEB093647158025FA14DB150D670DD468BB0
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00DF7842
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00DF7868
                        • SysAllocString.OLEAUT32(00000000), ref: 00DF786B
                        • SysAllocString.OLEAUT32 ref: 00DF788C
                        • SysFreeString.OLEAUT32 ref: 00DF7895
                        • StringFromGUID2.OLE32(?,?,00000028), ref: 00DF78AF
                        • SysAllocString.OLEAUT32(?), ref: 00DF78BD
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                        • String ID:
                        • API String ID: 3761583154-0
                        • Opcode ID: e628bfec881ef8800a78a5dce48608ec36b4a40a8c4a08b4637af1e650c020a1
                        • Instruction ID: 651761de02d25f4fdffb899910d093c1a5a27f1267f8c474e76fef1aff674491
                        • Opcode Fuzzy Hash: e628bfec881ef8800a78a5dce48608ec36b4a40a8c4a08b4637af1e650c020a1
                        • Instruction Fuzzy Hash: E1217431604108AFDB20AFA9DC89DBB77ECEB097A0725C125FA15DB2A1D670DC45CB74
                        APIs
                        • GetStdHandle.KERNEL32(0000000C), ref: 00E004F2
                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00E0052E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CreateHandlePipe
                        • String ID: nul
                        • API String ID: 1424370930-2873401336
                        • Opcode ID: 0aedc8f8828ebd8560cdad0eb84712c6e8c4e118f2e7c74291188b641708d739
                        • Instruction ID: 1bb43fcfdc2546ae28c00f7f3f4cf06a17055a2bc0430f3acc3b1f1f65795971
                        • Opcode Fuzzy Hash: 0aedc8f8828ebd8560cdad0eb84712c6e8c4e118f2e7c74291188b641708d739
                        • Instruction Fuzzy Hash: 09217771600305AFDB308F29DC04B9A7BB4AF44728F204A29E8A1F62E0E7709985CF20
                        APIs
                        • GetStdHandle.KERNEL32(000000F6), ref: 00E005C6
                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00E00601
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CreateHandlePipe
                        • String ID: nul
                        • API String ID: 1424370930-2873401336
                        • Opcode ID: da5b0b1295ae74ec9254cad1a3048d9bcc659752d0bf0f003c83219d8ddc6594
                        • Instruction ID: eaea57ac0a7b35976434a26605f6e80bbdf67cc26e8ae79863f674925a87efbf
                        • Opcode Fuzzy Hash: da5b0b1295ae74ec9254cad1a3048d9bcc659752d0bf0f003c83219d8ddc6594
                        • Instruction Fuzzy Hash: B521A1755003059FDB208F69EC04B9A77E5AF95734F301A19F8A1F32E0DB7199A1CB10
                        APIs
                          • Part of subcall function 00D9600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00D9604C
                          • Part of subcall function 00D9600E: GetStockObject.GDI32(00000011), ref: 00D96060
                          • Part of subcall function 00D9600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00D9606A
                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00E24112
                        • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00E2411F
                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00E2412A
                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00E24139
                        • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00E24145
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: MessageSend$CreateObjectStockWindow
                        • String ID: Msctls_Progress32
                        • API String ID: 1025951953-3636473452
                        • Opcode ID: bc51be5e6c4741109edda01cf3e3be19e01540d2f237d4bd8f78439d06b889cf
                        • Instruction ID: 1c5774a80f4a1cbf77336171dbf5f978d7d61312e68024d76cb299c03be725a1
                        • Opcode Fuzzy Hash: bc51be5e6c4741109edda01cf3e3be19e01540d2f237d4bd8f78439d06b889cf
                        • Instruction Fuzzy Hash: D91193B21402297EEF118F64DC85EE77F5DEF08798F015110FA18A2090CA729C61DBA4
                        APIs
                          • Part of subcall function 00DCD7A3: _free.LIBCMT ref: 00DCD7CC
                        • _free.LIBCMT ref: 00DCD82D
                          • Part of subcall function 00DC29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00DCD7D1,00000000,00000000,00000000,00000000,?,00DCD7F8,00000000,00000007,00000000,?,00DCDBF5,00000000), ref: 00DC29DE
                          • Part of subcall function 00DC29C8: GetLastError.KERNEL32(00000000,?,00DCD7D1,00000000,00000000,00000000,00000000,?,00DCD7F8,00000000,00000007,00000000,?,00DCDBF5,00000000,00000000), ref: 00DC29F0
                        • _free.LIBCMT ref: 00DCD838
                        • _free.LIBCMT ref: 00DCD843
                        • _free.LIBCMT ref: 00DCD897
                        • _free.LIBCMT ref: 00DCD8A2
                        • _free.LIBCMT ref: 00DCD8AD
                        • _free.LIBCMT ref: 00DCD8B8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                        • Instruction ID: 52666855dee7d943894daae390af7fc9b33e28fa564da9ae037af7362ba2fa39
                        • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                        • Instruction Fuzzy Hash: F111F971580B05AADA21BFB0CC46FDB7B9DEF04700F50582DB29EA7892DB75A5058A70
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00DFDA74
                        • LoadStringW.USER32(00000000), ref: 00DFDA7B
                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00DFDA91
                        • LoadStringW.USER32(00000000), ref: 00DFDA98
                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00DFDADC
                        Strings
                        • %s (%d) : ==> %s: %s %s, xrefs: 00DFDAB9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: HandleLoadModuleString$Message
                        • String ID: %s (%d) : ==> %s: %s %s
                        • API String ID: 4072794657-3128320259
                        • Opcode ID: edc8940c48d8fd2e0202e67b6a8c1e5db9f2add8c20bdca240676dd4d42cd1a3
                        • Instruction ID: a073f0a1b360876503277f8e237ba8c5dfab189333763e6cc95dc56e334d506e
                        • Opcode Fuzzy Hash: edc8940c48d8fd2e0202e67b6a8c1e5db9f2add8c20bdca240676dd4d42cd1a3
                        • Instruction Fuzzy Hash: 1F0186F29002087FE7109BA1DD89EFB736CEB08701F504492B746F2041E6749E898F74
                        APIs
                        • InterlockedExchange.KERNEL32(00F4EBC0,00F4EBC0), ref: 00E0097B
                        • EnterCriticalSection.KERNEL32(00F4EBA0,00000000), ref: 00E0098D
                        • TerminateThread.KERNEL32(00730065,000001F6), ref: 00E0099B
                        • WaitForSingleObject.KERNEL32(00730065,000003E8), ref: 00E009A9
                        • CloseHandle.KERNEL32(00730065), ref: 00E009B8
                        • InterlockedExchange.KERNEL32(00F4EBC0,000001F6), ref: 00E009C8
                        • LeaveCriticalSection.KERNEL32(00F4EBA0), ref: 00E009CF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                        • String ID:
                        • API String ID: 3495660284-0
                        • Opcode ID: 80602046ed97d342553eda2ee0b1cc6b51b59767075895ee978318ee4531ff3b
                        • Instruction ID: 0d7ed2ef067d95e377c0382d74771ba4779867c008bc2a3340d89c2dd030a844
                        • Opcode Fuzzy Hash: 80602046ed97d342553eda2ee0b1cc6b51b59767075895ee978318ee4531ff3b
                        • Instruction Fuzzy Hash: 85F01D32442902EFD7615B95EE89BDA7B35BF41702FA02015F101608B1CB7494AACF90
                        APIs
                        • __WSAFDIsSet.WSOCK32(00000000,?), ref: 00E11DC0
                        • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00E11DE1
                        • WSAGetLastError.WSOCK32 ref: 00E11DF2
                        • htons.WSOCK32(?), ref: 00E11EDB
                        • inet_ntoa.WSOCK32(?), ref: 00E11E8C
                          • Part of subcall function 00DF39E8: _strlen.LIBCMT ref: 00DF39F2
                          • Part of subcall function 00E13224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,00E0EC0C), ref: 00E13240
                        • _strlen.LIBCMT ref: 00E11F35
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                        • String ID:
                        • API String ID: 3203458085-0
                        • Opcode ID: 4e65170aa991ef96bcef7223537d3928b5eb645ba53537b364e5d4bb3ab830c5
                        • Instruction ID: 32aae22e4db926aced9853b3efe43c89cec366bd2309f6e6699e2bca57fb5f5e
                        • Opcode Fuzzy Hash: 4e65170aa991ef96bcef7223537d3928b5eb645ba53537b364e5d4bb3ab830c5
                        • Instruction Fuzzy Hash: C3B10731204340AFC724DF24C885E6A7BE5EF89318F54958CF5566B2E2DB71ED82CBA1
                        APIs
                        • __allrem.LIBCMT ref: 00DC00BA
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DC00D6
                        • __allrem.LIBCMT ref: 00DC00ED
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DC010B
                        • __allrem.LIBCMT ref: 00DC0122
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DC0140
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                        • String ID:
                        • API String ID: 1992179935-0
                        • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                        • Instruction ID: 081a9e4957631b84aba34647e5921f06fea6e7c6f14e50d636845bdbd71c4e3c
                        • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                        • Instruction Fuzzy Hash: 6081C376A00B07DBE7209F68CC42FAAB7A9EF45724F28452EF552D7281E770D9048B70
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00DB82D9,00DB82D9,?,?,?,00DC644F,00000001,00000001,8BE85006), ref: 00DC6258
                        • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00DC644F,00000001,00000001,8BE85006,?,?,?), ref: 00DC62DE
                        • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00DC63D8
                        • __freea.LIBCMT ref: 00DC63E5
                          • Part of subcall function 00DC3820: RtlAllocateHeap.NTDLL(00000000,?,00E61444,?,00DAFDF5,?,?,00D9A976,00000010,00E61440,00D913FC,?,00D913C6,?,00D91129), ref: 00DC3852
                        • __freea.LIBCMT ref: 00DC63EE
                        • __freea.LIBCMT ref: 00DC6413
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide__freea$AllocateHeap
                        • String ID:
                        • API String ID: 1414292761-0
                        • Opcode ID: 68f7ee578ee3d4303c068e57664cd9417cfd51453a02b047e4d4f00a6a5d33aa
                        • Instruction ID: bc33f15f59dd4fa2170d737aa21773e26312963c81c1cf37a09c3ceee31914c0
                        • Opcode Fuzzy Hash: 68f7ee578ee3d4303c068e57664cd9417cfd51453a02b047e4d4f00a6a5d33aa
                        • Instruction Fuzzy Hash: BB519D72600257ABEB268F64CC81FAF7BA9EF44750B29462DF805D7181DB34DC54C670
                        APIs
                          • Part of subcall function 00D99CB3: _wcslen.LIBCMT ref: 00D99CBD
                          • Part of subcall function 00E1C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E1B6AE,?,?), ref: 00E1C9B5
                          • Part of subcall function 00E1C998: _wcslen.LIBCMT ref: 00E1C9F1
                          • Part of subcall function 00E1C998: _wcslen.LIBCMT ref: 00E1CA68
                          • Part of subcall function 00E1C998: _wcslen.LIBCMT ref: 00E1CA9E
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E1BCCA
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00E1BD25
                        • RegCloseKey.ADVAPI32(00000000), ref: 00E1BD6A
                        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00E1BD99
                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00E1BDF3
                        • RegCloseKey.ADVAPI32(?), ref: 00E1BDFF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                        • String ID:
                        • API String ID: 1120388591-0
                        • Opcode ID: 6490416d1a11669b300631fd1168b52e91016b68d6849bebf3e8bd1d2733aa3b
                        • Instruction ID: e07f416fd6727598f3b95dab52fc7bd375208574c8b18eb97d7ed1e0894dcbc1
                        • Opcode Fuzzy Hash: 6490416d1a11669b300631fd1168b52e91016b68d6849bebf3e8bd1d2733aa3b
                        • Instruction Fuzzy Hash: 2781B171208241EFD714DF24C895E6ABBE5FF84308F14895CF4599B2A2DB31ED85CBA2
                        APIs
                        • VariantInit.OLEAUT32(00000035), ref: 00DEF7B9
                        • SysAllocString.OLEAUT32(00000001), ref: 00DEF860
                        • VariantCopy.OLEAUT32(00DEFA64,00000000), ref: 00DEF889
                        • VariantClear.OLEAUT32(00DEFA64), ref: 00DEF8AD
                        • VariantCopy.OLEAUT32(00DEFA64,00000000), ref: 00DEF8B1
                        • VariantClear.OLEAUT32(?), ref: 00DEF8BB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Variant$ClearCopy$AllocInitString
                        • String ID:
                        • API String ID: 3859894641-0
                        • Opcode ID: abdc7077a2d98171ed17e00a82648456922b6058910a75d171e6a9f09d94cbb9
                        • Instruction ID: a756660fdaab2fb15c81354bd0161942fcad26bbc5628baf9aa7d1f447bb6f89
                        • Opcode Fuzzy Hash: abdc7077a2d98171ed17e00a82648456922b6058910a75d171e6a9f09d94cbb9
                        • Instruction Fuzzy Hash: B751B532500750BADF24BB66DCD5B2DB3A9EF45310B249467E945EF292DB708C40CBB6
                        APIs
                          • Part of subcall function 00D97620: _wcslen.LIBCMT ref: 00D97625
                          • Part of subcall function 00D96B57: _wcslen.LIBCMT ref: 00D96B6A
                        • GetOpenFileNameW.COMDLG32(00000058), ref: 00E094E5
                        • _wcslen.LIBCMT ref: 00E09506
                        • _wcslen.LIBCMT ref: 00E0952D
                        • GetSaveFileNameW.COMDLG32(00000058), ref: 00E09585
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _wcslen$FileName$OpenSave
                        • String ID: X
                        • API String ID: 83654149-3081909835
                        • Opcode ID: 9e0005a39cc45e9f66aa6269cf966ea4afa49a8cc335e635783d20ce4d444f32
                        • Instruction ID: dbe5a03d6e5152e9a3355a796b1c88c02b39ac09c9828e6a8a247c03077a88c0
                        • Opcode Fuzzy Hash: 9e0005a39cc45e9f66aa6269cf966ea4afa49a8cc335e635783d20ce4d444f32
                        • Instruction Fuzzy Hash: 7AE17D715083009FCB24DF25C881A6AB7E4FF85314F15896DE899AB2A3DB31DD45CBA2
                        APIs
                          • Part of subcall function 00DA9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DA9BB2
                        • BeginPaint.USER32(?,?,?), ref: 00DA9241
                        • GetWindowRect.USER32(?,?), ref: 00DA92A5
                        • ScreenToClient.USER32(?,?), ref: 00DA92C2
                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00DA92D3
                        • EndPaint.USER32(?,?,?,?,?), ref: 00DA9321
                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00DE71EA
                          • Part of subcall function 00DA9339: BeginPath.GDI32(00000000), ref: 00DA9357
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                        • String ID:
                        • API String ID: 3050599898-0
                        • Opcode ID: cf61b680d564ec1a9e676b07cb3169776a407a055827d0199092a196edbb9b89
                        • Instruction ID: d300f6bd8aa09616f04430de111af4fd0f28b8bf7122e035c4630681799a76b0
                        • Opcode Fuzzy Hash: cf61b680d564ec1a9e676b07cb3169776a407a055827d0199092a196edbb9b89
                        • Instruction Fuzzy Hash: 9441CF30104300AFDB21DF26DC95FABBBB8EF86760F180269F994971A1C7709849DB71
                        APIs
                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 00E0080C
                        • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00E00847
                        • EnterCriticalSection.KERNEL32(?), ref: 00E00863
                        • LeaveCriticalSection.KERNEL32(?), ref: 00E008DC
                        • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00E008F3
                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00E00921
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                        • String ID:
                        • API String ID: 3368777196-0
                        • Opcode ID: 6d6e86548dc5b09362aef35a36283cf49af6dddcb93481760f3b96607481656e
                        • Instruction ID: a2c838bf7facce37df5c8f859fd145297eabace0bd34ea7075129da3727d8cce
                        • Opcode Fuzzy Hash: 6d6e86548dc5b09362aef35a36283cf49af6dddcb93481760f3b96607481656e
                        • Instruction Fuzzy Hash: 70414A71900205EFDF14AF95DC85AAA77B8FF44314F1480A5FD00AA29ADB30EE65DBB4
                        APIs
                        • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,00DEF3AB,00000000,?,?,00000000,?,00DE682C,00000004,00000000,00000000), ref: 00E2824C
                        • EnableWindow.USER32(00000000,00000000), ref: 00E28272
                        • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00E282D1
                        • ShowWindow.USER32(00000000,00000004), ref: 00E282E5
                        • EnableWindow.USER32(00000000,00000001), ref: 00E2830B
                        • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00E2832F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Window$Show$Enable$MessageSend
                        • String ID:
                        • API String ID: 642888154-0
                        • Opcode ID: 3c5c0901a2c71797224539581e2b81eaa4de203c3e0ac13c34a7ddaf5b9604dc
                        • Instruction ID: 6571e01d4a2014bcf6160de7ba32884a6dae1776843c03ea1bd36b837d4b7608
                        • Opcode Fuzzy Hash: 3c5c0901a2c71797224539581e2b81eaa4de203c3e0ac13c34a7ddaf5b9604dc
                        • Instruction Fuzzy Hash: 05412831202610EFDB22CF15E994BE43BE0FB45718F1C21A9E5086F272CB71A845CF41
                        APIs
                        • IsWindowVisible.USER32(?), ref: 00DF4C95
                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00DF4CB2
                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00DF4CEA
                        • _wcslen.LIBCMT ref: 00DF4D08
                        • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00DF4D10
                        • _wcsstr.LIBVCRUNTIME ref: 00DF4D1A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                        • String ID:
                        • API String ID: 72514467-0
                        • Opcode ID: b87d597264fdfacbe11163b6b81bd1eef3c341c14c90aed696ac70f82449693f
                        • Instruction ID: 2ba9a8d2f1eaf34f80594e13129fb5acf42e049687aace91012124a170d80227
                        • Opcode Fuzzy Hash: b87d597264fdfacbe11163b6b81bd1eef3c341c14c90aed696ac70f82449693f
                        • Instruction Fuzzy Hash: B9212632204208BFEB255B7AEC09E7F7B9CDF45B50F15C069F905DA192EA61CD0186B0
                        APIs
                          • Part of subcall function 00D93AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00D93A97,?,?,00D92E7F,?,?,?,00000000), ref: 00D93AC2
                        • _wcslen.LIBCMT ref: 00E0587B
                        • CoInitialize.OLE32(00000000), ref: 00E05995
                        • CoCreateInstance.OLE32(00E2FCF8,00000000,00000001,00E2FB68,?), ref: 00E059AE
                        • CoUninitialize.OLE32 ref: 00E059CC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                        • String ID: .lnk
                        • API String ID: 3172280962-24824748
                        • Opcode ID: 266da2cd0ab18ecb50f98756a967054e9275f79572d859000e02075d3a4de879
                        • Instruction ID: 369ca75a54a1f93e852ff1ccbd14cb1a119f1491ee2d1e20558383585dca3849
                        • Opcode Fuzzy Hash: 266da2cd0ab18ecb50f98756a967054e9275f79572d859000e02075d3a4de879
                        • Instruction Fuzzy Hash: 21D153726087019FCB14DF14C48092BBBE5EF89714F15885DF899AB2A1DB31ED85CFA2
                        APIs
                          • Part of subcall function 00DF0FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00DF0FCA
                          • Part of subcall function 00DF0FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00DF0FD6
                          • Part of subcall function 00DF0FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00DF0FE5
                          • Part of subcall function 00DF0FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00DF0FEC
                          • Part of subcall function 00DF0FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00DF1002
                        • GetLengthSid.ADVAPI32(?,00000000,00DF1335), ref: 00DF17AE
                        • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00DF17BA
                        • HeapAlloc.KERNEL32(00000000), ref: 00DF17C1
                        • CopySid.ADVAPI32(00000000,00000000,?), ref: 00DF17DA
                        • GetProcessHeap.KERNEL32(00000000,00000000,00DF1335), ref: 00DF17EE
                        • HeapFree.KERNEL32(00000000), ref: 00DF17F5
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                        • String ID:
                        • API String ID: 3008561057-0
                        • Opcode ID: 34074707bcb3771433e64f448cfbca497e299240f9330a88d343b7cc7235ca86
                        • Instruction ID: 5b7aed58dd74eecea413de1bd2e14c8b4db8a52ba4061800305b9f36ef8ae6d5
                        • Opcode Fuzzy Hash: 34074707bcb3771433e64f448cfbca497e299240f9330a88d343b7cc7235ca86
                        • Instruction Fuzzy Hash: BB118935901209EFDB20ABA5CC4ABBF7BB9FB41355F258018E585A7210C735A949CB60
                        APIs
                        • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00DF14FF
                        • OpenProcessToken.ADVAPI32(00000000), ref: 00DF1506
                        • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00DF1515
                        • CloseHandle.KERNEL32(00000004), ref: 00DF1520
                        • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00DF154F
                        • DestroyEnvironmentBlock.USERENV(00000000), ref: 00DF1563
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                        • String ID:
                        • API String ID: 1413079979-0
                        • Opcode ID: 38e80879e6c8500290289c36853f8e3e8202b7ae8eb57ed402ead3410b8abf4f
                        • Instruction ID: 3e47cd0bf4c6ebfe8ca6aaca5c6b4d84ce8459465e8340361ad1ec103fc885c2
                        • Opcode Fuzzy Hash: 38e80879e6c8500290289c36853f8e3e8202b7ae8eb57ed402ead3410b8abf4f
                        • Instruction Fuzzy Hash: B311477650020DEFDB218FA8DD49FEE7BA9EF48704F298015FA05A2160C371CE659B60
                        APIs
                        • GetLastError.KERNEL32(?,?,00DB3379,00DB2FE5), ref: 00DB3390
                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00DB339E
                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00DB33B7
                        • SetLastError.KERNEL32(00000000,?,00DB3379,00DB2FE5), ref: 00DB3409
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ErrorLastValue___vcrt_
                        • String ID:
                        • API String ID: 3852720340-0
                        • Opcode ID: 8f0ba2778d6a6d2bbf18c0d69ea3b9b784a02aa3acb076a642b8ca54ee7d1f7c
                        • Instruction ID: 25c62575d7a6e0d3ba77d1c0853f7b14d02322bec15cddd2269875d4bc35d400
                        • Opcode Fuzzy Hash: 8f0ba2778d6a6d2bbf18c0d69ea3b9b784a02aa3acb076a642b8ca54ee7d1f7c
                        • Instruction Fuzzy Hash: 9F012832608311FEE6282779FC966E72B94DB05376734022DF413912F0EF118D0AB574
                        APIs
                        • GetLastError.KERNEL32(?,?,00DC5686,00DD3CD6,?,00000000,?,00DC5B6A,?,?,?,?,?,00DBE6D1,?,00E58A48), ref: 00DC2D78
                        • _free.LIBCMT ref: 00DC2DAB
                        • _free.LIBCMT ref: 00DC2DD3
                        • SetLastError.KERNEL32(00000000,?,?,?,?,00DBE6D1,?,00E58A48,00000010,00D94F4A,?,?,00000000,00DD3CD6), ref: 00DC2DE0
                        • SetLastError.KERNEL32(00000000,?,?,?,?,00DBE6D1,?,00E58A48,00000010,00D94F4A,?,?,00000000,00DD3CD6), ref: 00DC2DEC
                        • _abort.LIBCMT ref: 00DC2DF2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ErrorLast$_free$_abort
                        • String ID:
                        • API String ID: 3160817290-0
                        • Opcode ID: 351d20e8bba86bd61b24b450e75cf28142047ebcde6a812b1f9062ee18b48f96
                        • Instruction ID: ea24456cea30b051e28df4c7a70f7dd02f01fc5566bbd4166b64b2b1c215ef68
                        • Opcode Fuzzy Hash: 351d20e8bba86bd61b24b450e75cf28142047ebcde6a812b1f9062ee18b48f96
                        • Instruction Fuzzy Hash: ACF08131545B036BCA226735AC16F3E2669EBD17B1B38491CF825A31D2EE248C0641B1
                        APIs
                          • Part of subcall function 00DA9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00DA9693
                          • Part of subcall function 00DA9639: SelectObject.GDI32(?,00000000), ref: 00DA96A2
                          • Part of subcall function 00DA9639: BeginPath.GDI32(?), ref: 00DA96B9
                          • Part of subcall function 00DA9639: SelectObject.GDI32(?,00000000), ref: 00DA96E2
                        • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00E28A4E
                        • LineTo.GDI32(?,00000003,00000000), ref: 00E28A62
                        • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00E28A70
                        • LineTo.GDI32(?,00000000,00000003), ref: 00E28A80
                        • EndPath.GDI32(?), ref: 00E28A90
                        • StrokePath.GDI32(?), ref: 00E28AA0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                        • String ID:
                        • API String ID: 43455801-0
                        • Opcode ID: 8113634f9afb228c83094ee46994aaf209f972d735d4e5ce6a826cf6d1f02cfe
                        • Instruction ID: 45c2425944b9bc0acead6cf78aa9a9ba919dd6ff8bf785c4199e8d6a3967b0b2
                        • Opcode Fuzzy Hash: 8113634f9afb228c83094ee46994aaf209f972d735d4e5ce6a826cf6d1f02cfe
                        • Instruction Fuzzy Hash: 40110C76000118FFEF129F95EC48E9A7F6CEB08394F148051FA15A5161C7719D59DBA0
                        APIs
                        • GetDC.USER32(00000000), ref: 00DF5218
                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 00DF5229
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00DF5230
                        • ReleaseDC.USER32(00000000,00000000), ref: 00DF5238
                        • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00DF524F
                        • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00DF5261
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CapsDevice$Release
                        • String ID:
                        • API String ID: 1035833867-0
                        • Opcode ID: f85a3e56559ce8f920ab93afca41e746044f7fe4c206a713e57eec5e9fa4a08f
                        • Instruction ID: 55b18ab8e15037176769812b9c55667ac092fa5094b42f11b48b9f5968af77f3
                        • Opcode Fuzzy Hash: f85a3e56559ce8f920ab93afca41e746044f7fe4c206a713e57eec5e9fa4a08f
                        • Instruction Fuzzy Hash: AE018F75E00708BFEB109BA6DC49E5EBFB8EF48751F144165FB04A7281D6709805CBA0
                        APIs
                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00D91BF4
                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 00D91BFC
                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00D91C07
                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00D91C12
                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 00D91C1A
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00D91C22
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Virtual
                        • String ID:
                        • API String ID: 4278518827-0
                        • Opcode ID: 670584f567790da4fc0524d666b0f7197c2406d1d30f4743d10c7d450b379694
                        • Instruction ID: f611afbfe4e94835566727710b9ab2f23a100cd6cdc164b024695a908c835d24
                        • Opcode Fuzzy Hash: 670584f567790da4fc0524d666b0f7197c2406d1d30f4743d10c7d450b379694
                        • Instruction Fuzzy Hash: D7016CB09027597DE3008F5A8C85B56FFA8FF19754F00411B915C47941C7F5A864CBE5
                        APIs
                        • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00DFEB30
                        • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00DFEB46
                        • GetWindowThreadProcessId.USER32(?,?), ref: 00DFEB55
                        • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00DFEB64
                        • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00DFEB6E
                        • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00DFEB75
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                        • String ID:
                        • API String ID: 839392675-0
                        • Opcode ID: 51f9c8ef09b75e34874ec58824ab5eb769672a33741c4b9f7ed9e357d5214042
                        • Instruction ID: 6a07868af1ee5ced0dd151bd2bd70a9beb8a0c4c0dca45130c76b6ec5c4157ad
                        • Opcode Fuzzy Hash: 51f9c8ef09b75e34874ec58824ab5eb769672a33741c4b9f7ed9e357d5214042
                        • Instruction Fuzzy Hash: 68F01772241568BFE6315B63DC0EEAF3A7CEBCAF11F104158F601E109196A05A0A86B5
                        APIs
                        • GetClientRect.USER32(?), ref: 00DE7452
                        • SendMessageW.USER32(?,00001328,00000000,?), ref: 00DE7469
                        • GetWindowDC.USER32(?), ref: 00DE7475
                        • GetPixel.GDI32(00000000,?,?), ref: 00DE7484
                        • ReleaseDC.USER32(?,00000000), ref: 00DE7496
                        • GetSysColor.USER32(00000005), ref: 00DE74B0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ClientColorMessagePixelRectReleaseSendWindow
                        • String ID:
                        • API String ID: 272304278-0
                        • Opcode ID: 5463a8ced6de256da906908c5a07af91e6e1e1d6339ed885d284e5dae5bece27
                        • Instruction ID: 64ea00f3c209684cb21ffebaa66978fd06d046d43fa39daabca656c16449b7c2
                        • Opcode Fuzzy Hash: 5463a8ced6de256da906908c5a07af91e6e1e1d6339ed885d284e5dae5bece27
                        • Instruction Fuzzy Hash: 6D018B31400205EFDB616F66DC08BAE7BB5FF04711F250060F916A21A0CF311E56ABA1
                        APIs
                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00DF187F
                        • UnloadUserProfile.USERENV(?,?), ref: 00DF188B
                        • CloseHandle.KERNEL32(?), ref: 00DF1894
                        • CloseHandle.KERNEL32(?), ref: 00DF189C
                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00DF18A5
                        • HeapFree.KERNEL32(00000000), ref: 00DF18AC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                        • String ID:
                        • API String ID: 146765662-0
                        • Opcode ID: 82634ebd9cbf94867f656cd4277548448e35169bd019cb8c9f7fed69461bf941
                        • Instruction ID: 6898dd328e10d23fe96dbf1f96638a1c78bfdebd0d7c54c30ad33291659ff6ac
                        • Opcode Fuzzy Hash: 82634ebd9cbf94867f656cd4277548448e35169bd019cb8c9f7fed69461bf941
                        • Instruction Fuzzy Hash: CEE0C236004501BFDA115BA2ED0D90ABB39FF49B22B308621F225A1075CB32947ADB50
                        APIs
                        • __Init_thread_footer.LIBCMT ref: 00D9BEB3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Init_thread_footer
                        • String ID: D%$D%$D%$D%
                        • API String ID: 1385522511-2722557190
                        • Opcode ID: cec88f294cca5d9cedc7479d7a90309fa24e7be5d563cb30e89f22e3010b510b
                        • Instruction ID: ca21abefe954a7dd381eb4faa88c3f2b4d755495f4e413ba9267ff35f42413cb
                        • Opcode Fuzzy Hash: cec88f294cca5d9cedc7479d7a90309fa24e7be5d563cb30e89f22e3010b510b
                        • Instruction Fuzzy Hash: 53913D75A0060ACFCF14CF69E1906AAB7F1FF58320B25415ED586AB350D771ED81CBA0
                        APIs
                          • Part of subcall function 00D97620: _wcslen.LIBCMT ref: 00D97625
                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00DFC6EE
                        • _wcslen.LIBCMT ref: 00DFC735
                        • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00DFC79C
                        • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00DFC7CA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ItemMenu$Info_wcslen$Default
                        • String ID: 0
                        • API String ID: 1227352736-4108050209
                        • Opcode ID: fdf5d08e328a358589e8300157b695b6ffcc98d442ae3f58b779de70cca515a8
                        • Instruction ID: 71e98274ff5503c3cce69eb8e6ae068dd6b76dbaa2f6092bd0bc07e594954faa
                        • Opcode Fuzzy Hash: fdf5d08e328a358589e8300157b695b6ffcc98d442ae3f58b779de70cca515a8
                        • Instruction Fuzzy Hash: 3751F37162430C9BC715AF28CA45A7B77E4EF85314F09A92DF691E21A0DB60D924CBB2
                        APIs
                        • ShellExecuteExW.SHELL32(0000003C), ref: 00E1AEA3
                          • Part of subcall function 00D97620: _wcslen.LIBCMT ref: 00D97625
                        • GetProcessId.KERNEL32(00000000), ref: 00E1AF38
                        • CloseHandle.KERNEL32(00000000), ref: 00E1AF67
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CloseExecuteHandleProcessShell_wcslen
                        • String ID: <$@
                        • API String ID: 146682121-1426351568
                        • Opcode ID: 162acc75f14eae0b8aa0a42cb742989ddd923cde199027a6ff2812b986eff3b9
                        • Instruction ID: 207c7efac855a53ef69e412d83bafc456a3650be9bbd756629ab5e645deca7ed
                        • Opcode Fuzzy Hash: 162acc75f14eae0b8aa0a42cb742989ddd923cde199027a6ff2812b986eff3b9
                        • Instruction Fuzzy Hash: 93713871A01615DFCF14DF54C484AAEBBF0EF08314F1984A9E85AAB392C774ED85CBA1
                        APIs
                        • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00DF7206
                        • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00DF723C
                        • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00DF724D
                        • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00DF72CF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ErrorMode$AddressCreateInstanceProc
                        • String ID: DllGetClassObject
                        • API String ID: 753597075-1075368562
                        • Opcode ID: 4ff2080ea7718161cca081459804c358a50d92197240c63721cfcf34d3638ea3
                        • Instruction ID: 1c08ac4fc6ed90d47f905648c2b08087cde22c3db953cb3bcc095741d62305ea
                        • Opcode Fuzzy Hash: 4ff2080ea7718161cca081459804c358a50d92197240c63721cfcf34d3638ea3
                        • Instruction Fuzzy Hash: E5415271605208AFDB15CF54C885AEA7BB9EF44310F15C0ADBE05AF20AD7B1D945CBB4
                        APIs
                        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00E22F8D
                        • LoadLibraryW.KERNEL32(?), ref: 00E22F94
                        • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00E22FA9
                        • DestroyWindow.USER32(?), ref: 00E22FB1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: MessageSend$DestroyLibraryLoadWindow
                        • String ID: SysAnimate32
                        • API String ID: 3529120543-1011021900
                        • Opcode ID: 315a6f63af0563a35a9015461027893ad61feb204e785a05d2fef54561130d39
                        • Instruction ID: ca388249a0c4cb2d64aec4c76f7eacac9cbd531358b2fe981781b88ca5146922
                        • Opcode Fuzzy Hash: 315a6f63af0563a35a9015461027893ad61feb204e785a05d2fef54561130d39
                        • Instruction Fuzzy Hash: 51218872200225BFFB208F64ED80EBB37B9EB59368F10661CFA50B21A0D671DC519760
                        APIs
                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00DB4D1E,00DC28E9,?,00DB4CBE,00DC28E9,00E588B8,0000000C,00DB4E15,00DC28E9,00000002), ref: 00DB4D8D
                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00DB4DA0
                        • FreeLibrary.KERNEL32(00000000,?,?,?,00DB4D1E,00DC28E9,?,00DB4CBE,00DC28E9,00E588B8,0000000C,00DB4E15,00DC28E9,00000002,00000000), ref: 00DB4DC3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: AddressFreeHandleLibraryModuleProc
                        • String ID: CorExitProcess$mscoree.dll
                        • API String ID: 4061214504-1276376045
                        • Opcode ID: 55655afcc46da196986d267041e0caac4a667f70a65726b1aed24167291190af
                        • Instruction ID: e50c2197599234f97a1a30c7b24a941501b538cce18c23c9d253ecfa0e86e71c
                        • Opcode Fuzzy Hash: 55655afcc46da196986d267041e0caac4a667f70a65726b1aed24167291190af
                        • Instruction Fuzzy Hash: A9F03C34A40308EFDB259B91DC49BEEBFB5EF44752F1400A5E80AB22A1CB309955CAA1
                        APIs
                        • LoadLibraryA.KERNEL32 ref: 00DED3AD
                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00DED3BF
                        • FreeLibrary.KERNEL32(00000000), ref: 00DED3E5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: GetSystemWow64DirectoryW$X64
                        • API String ID: 145871493-2590602151
                        • Opcode ID: 74f4ef82f16502c936f4a805d4f10bd80139c2262f42462c25f42b5bd143d7db
                        • Instruction ID: 192ce74c0dfc7236ad44bec428e1baa8bbb369ba0a7119bc12ee01e216dad2f7
                        • Opcode Fuzzy Hash: 74f4ef82f16502c936f4a805d4f10bd80139c2262f42462c25f42b5bd143d7db
                        • Instruction Fuzzy Hash: 85F05530802AA1DBC3313B13CC4992D3222AF00702B789095F986F1110DF70CC4486F7
                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00D94EDD,?,00E61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D94E9C
                        • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00D94EAE
                        • FreeLibrary.KERNEL32(00000000,?,?,00D94EDD,?,00E61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D94EC0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                        • API String ID: 145871493-3689287502
                        • Opcode ID: b65a186af51342237effde227c4211b9f99f10a68dcdcf3575b3cfab19714bc7
                        • Instruction ID: ee339a9d0e3378d3604b35d51752fa89ecb54070e2d9266e239713d6bef3655b
                        • Opcode Fuzzy Hash: b65a186af51342237effde227c4211b9f99f10a68dcdcf3575b3cfab19714bc7
                        • Instruction Fuzzy Hash: E1E08635A026225F97311726EC19E5F6564AF81B637190115FC01F2101DB60CD0781F1
                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00DD3CDE,?,00E61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D94E62
                        • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00D94E74
                        • FreeLibrary.KERNEL32(00000000,?,?,00DD3CDE,?,00E61418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00D94E87
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                        • API String ID: 145871493-1355242751
                        • Opcode ID: d3f5b83e565313e5db21d25a62e78118505c0e022d5e9b4e54d5b23c9043990d
                        • Instruction ID: e799d41230d2778562625838ad3a25773cbbe5a2ad60b66eba0a0f84e59576bf
                        • Opcode Fuzzy Hash: d3f5b83e565313e5db21d25a62e78118505c0e022d5e9b4e54d5b23c9043990d
                        • Instruction Fuzzy Hash: 58D0C232903A315B4B321B26FC09D8F2A28BF85B513190510BC00B2211CF30CD17C1E0
                        APIs
                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00E02C05
                        • DeleteFileW.KERNEL32(?), ref: 00E02C87
                        • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00E02C9D
                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00E02CAE
                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00E02CC0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: File$Delete$Copy
                        • String ID:
                        • API String ID: 3226157194-0
                        • Opcode ID: f4b358a20cedddbca16d3c380cd6e1d1a1d7c211466f6b6b482670f15f218278
                        • Instruction ID: c0095e22289820124cdbdfa1da6fa1341a84dc2731d357740574d59703df2e25
                        • Opcode Fuzzy Hash: f4b358a20cedddbca16d3c380cd6e1d1a1d7c211466f6b6b482670f15f218278
                        • Instruction Fuzzy Hash: 6CB15271D00119ABDF21DBA4CC89EDEB7BDEF49350F1040AAF609F6195EA319A848F71
                        APIs
                        • GetCurrentProcessId.KERNEL32 ref: 00E1A427
                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00E1A435
                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00E1A468
                        • CloseHandle.KERNEL32(?), ref: 00E1A63D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Process$CloseCountersCurrentHandleOpen
                        • String ID:
                        • API String ID: 3488606520-0
                        • Opcode ID: 354d311976e453e3a5be9a5532cbfce2964f87bae66eaa4a45680d4b48e9d5b4
                        • Instruction ID: 8ac1914bc162f99f24b71ee3842a11aa85b7e06e9918651df021b07d8053abf5
                        • Opcode Fuzzy Hash: 354d311976e453e3a5be9a5532cbfce2964f87bae66eaa4a45680d4b48e9d5b4
                        • Instruction Fuzzy Hash: F9A1B1716053009FD720DF24D886F2AB7E5EF88714F18986DF55A9B292D7B0EC41CBA2
                        APIs
                        • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00E33700), ref: 00DCBB91
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00E6121C,000000FF,00000000,0000003F,00000000,?,?), ref: 00DCBC09
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00E61270,000000FF,?,0000003F,00000000,?), ref: 00DCBC36
                        • _free.LIBCMT ref: 00DCBB7F
                          • Part of subcall function 00DC29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00DCD7D1,00000000,00000000,00000000,00000000,?,00DCD7F8,00000000,00000007,00000000,?,00DCDBF5,00000000), ref: 00DC29DE
                          • Part of subcall function 00DC29C8: GetLastError.KERNEL32(00000000,?,00DCD7D1,00000000,00000000,00000000,00000000,?,00DCD7F8,00000000,00000007,00000000,?,00DCDBF5,00000000,00000000), ref: 00DC29F0
                        • _free.LIBCMT ref: 00DCBD4B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                        • String ID:
                        • API String ID: 1286116820-0
                        • Opcode ID: 6f884bccac6c8510464f3bfa54182ae545858e04bd9a0ed320ab0604282e3ba1
                        • Instruction ID: a7e00acb8faaf9843bdeba550817fe9d57a4172f79ef16b6808d132187f1fdaf
                        • Opcode Fuzzy Hash: 6f884bccac6c8510464f3bfa54182ae545858e04bd9a0ed320ab0604282e3ba1
                        • Instruction Fuzzy Hash: 2051D57190020AAFCB11DF759C82EAAB7B8EB40360F1402AFE555E71A1EB70DD449B70
                        APIs
                          • Part of subcall function 00DFDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00DFCF22,?), ref: 00DFDDFD
                          • Part of subcall function 00DFDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00DFCF22,?), ref: 00DFDE16
                          • Part of subcall function 00DFE199: GetFileAttributesW.KERNEL32(?,00DFCF95), ref: 00DFE19A
                        • lstrcmpiW.KERNEL32(?,?), ref: 00DFE473
                        • MoveFileW.KERNEL32(?,?), ref: 00DFE4AC
                        • _wcslen.LIBCMT ref: 00DFE5EB
                        • _wcslen.LIBCMT ref: 00DFE603
                        • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00DFE650
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                        • String ID:
                        • API String ID: 3183298772-0
                        • Opcode ID: e1e7ba4c66eb6d3d88bd35c42207f8d1e1e6a90f6177fefd7b8593785bb4a5f6
                        • Instruction ID: 613d944425667e2d1cecc78e91c2ad96c29a382115aa88cf24b9bda6af62a788
                        • Opcode Fuzzy Hash: e1e7ba4c66eb6d3d88bd35c42207f8d1e1e6a90f6177fefd7b8593785bb4a5f6
                        • Instruction Fuzzy Hash: 535141B24083499BC724EB94DC919EFB3DCEF84340F14491EF689D3151EE74A6888776
                        APIs
                          • Part of subcall function 00D99CB3: _wcslen.LIBCMT ref: 00D99CBD
                          • Part of subcall function 00E1C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E1B6AE,?,?), ref: 00E1C9B5
                          • Part of subcall function 00E1C998: _wcslen.LIBCMT ref: 00E1C9F1
                          • Part of subcall function 00E1C998: _wcslen.LIBCMT ref: 00E1CA68
                          • Part of subcall function 00E1C998: _wcslen.LIBCMT ref: 00E1CA9E
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E1BAA5
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00E1BB00
                        • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00E1BB63
                        • RegCloseKey.ADVAPI32(?,?), ref: 00E1BBA6
                        • RegCloseKey.ADVAPI32(00000000), ref: 00E1BBB3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                        • String ID:
                        • API String ID: 826366716-0
                        • Opcode ID: 877ec9ef6271b125a80c8d28bdb530068a9b0bbf3d86588f5813d1a3e3d00648
                        • Instruction ID: bc6cd890195c5e0b42630b9a4039914c25dc90f9a972371d915650ab15458dc0
                        • Opcode Fuzzy Hash: 877ec9ef6271b125a80c8d28bdb530068a9b0bbf3d86588f5813d1a3e3d00648
                        • Instruction Fuzzy Hash: 5661C531208241EFD714DF14C490E6ABBE5FF84308F54955CF4999B2A2DB31ED85CBA2
                        APIs
                        • VariantInit.OLEAUT32(?), ref: 00DF8BCD
                        • VariantClear.OLEAUT32 ref: 00DF8C3E
                        • VariantClear.OLEAUT32 ref: 00DF8C9D
                        • VariantClear.OLEAUT32(?), ref: 00DF8D10
                        • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00DF8D3B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Variant$Clear$ChangeInitType
                        • String ID:
                        • API String ID: 4136290138-0
                        • Opcode ID: 5a1ea8a4a089b85de4c83df707606bf3195f270d1600ec603008acabe5b7b721
                        • Instruction ID: be13d30d010e4900a51ebeea4552a9ea467ee5395027c5bfd5681dc1c7ca7f19
                        • Opcode Fuzzy Hash: 5a1ea8a4a089b85de4c83df707606bf3195f270d1600ec603008acabe5b7b721
                        • Instruction Fuzzy Hash: 77517CB5A00619EFCB10CF69C884AAAB7F8FF89310B168559F915DB354E730E911CFA0
                        APIs
                        • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00E08BAE
                        • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00E08BDA
                        • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00E08C32
                        • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00E08C57
                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00E08C5F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: PrivateProfile$SectionWrite$String
                        • String ID:
                        • API String ID: 2832842796-0
                        • Opcode ID: 64288179dbc8bd42b08308c934d60286a93e30bfde08a92c25daa026c1f25813
                        • Instruction ID: a60f51a9afa13a91d5a6a25c930866e7a06b4a58d3b06f0159a66f2d7d1d4a5b
                        • Opcode Fuzzy Hash: 64288179dbc8bd42b08308c934d60286a93e30bfde08a92c25daa026c1f25813
                        • Instruction Fuzzy Hash: EC513735A006149FDF11DF65C880A69BBF5FF49314F098498E849AB3A2DB31ED51CBA1
                        APIs
                        • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00E18F40
                        • GetProcAddress.KERNEL32(00000000,?), ref: 00E18FD0
                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00E18FEC
                        • GetProcAddress.KERNEL32(00000000,?), ref: 00E19032
                        • FreeLibrary.KERNEL32(00000000), ref: 00E19052
                          • Part of subcall function 00DAF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00E01043,?,7529E610), ref: 00DAF6E6
                          • Part of subcall function 00DAF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00DEFA64,00000000,00000000,?,?,00E01043,?,7529E610,?,00DEFA64), ref: 00DAF70D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                        • String ID:
                        • API String ID: 666041331-0
                        • Opcode ID: d450c35db939748f190be735a3428b4c75b681390cf6c19ba45eb1e8a4bfcff6
                        • Instruction ID: 9e8b577cda6c0e3d4201fb5ce5b1f7ad2622fbac08296f6c3bcdd2072b61e628
                        • Opcode Fuzzy Hash: d450c35db939748f190be735a3428b4c75b681390cf6c19ba45eb1e8a4bfcff6
                        • Instruction Fuzzy Hash: 3E513A35605205DFCB15DF58C4948EDBBF1FF49324B099099E806AB362DB31ED86CBA0
                        APIs
                        • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00E26C33
                        • SetWindowLongW.USER32(?,000000EC,?), ref: 00E26C4A
                        • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00E26C73
                        • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00E0AB79,00000000,00000000), ref: 00E26C98
                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00E26CC7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Window$Long$MessageSendShow
                        • String ID:
                        • API String ID: 3688381893-0
                        • Opcode ID: d9525c3fbee93f274f3aff3234e370036bfc67d4d8667d57f199519d6eb0f445
                        • Instruction ID: 26febb94f06ee01e0983bb51e2b6024011234bb716ef724872602c57ed7c8f49
                        • Opcode Fuzzy Hash: d9525c3fbee93f274f3aff3234e370036bfc67d4d8667d57f199519d6eb0f445
                        • Instruction Fuzzy Hash: 04412835600124AFDB24EF29EC4AFA9BBA4EB49364F141368F895B72E0C371ED41CA50
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _free
                        • String ID:
                        • API String ID: 269201875-0
                        • Opcode ID: f0b4551ea898d8f9e84ac17f7eb5b22fbc52ba94816b24480a2666a85d2de967
                        • Instruction ID: f4fe9a59458d2026447b5ef95cde9efc92eb55492ce4f8ba545bd000f57b614b
                        • Opcode Fuzzy Hash: f0b4551ea898d8f9e84ac17f7eb5b22fbc52ba94816b24480a2666a85d2de967
                        • Instruction Fuzzy Hash: 65419232A003019FCB24DF78C881F69B7A5EF89314B1945ADE555EB395DA31AE01DBA0
                        APIs
                        • GetInputState.USER32 ref: 00E038CB
                        • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00E03922
                        • TranslateMessage.USER32(?), ref: 00E0394B
                        • DispatchMessageW.USER32(?), ref: 00E03955
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E03966
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                        • String ID:
                        • API String ID: 2256411358-0
                        • Opcode ID: 1778815989674d1d8db053b98459e91895447c761cf7082000219235c14d0636
                        • Instruction ID: 6f1db8278b1b21919dde4404afdd4c24b6289baf7294083a17d1d4b6bbdd5131
                        • Opcode Fuzzy Hash: 1778815989674d1d8db053b98459e91895447c761cf7082000219235c14d0636
                        • Instruction Fuzzy Hash: 3431F7709043419EEB39CB35E808BB737ACAB41348F5815ADE462F21E4E3F496C9CB21
                        APIs
                        • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00E0C21E,00000000), ref: 00E0CF38
                        • InternetReadFile.WININET(?,00000000,?,?), ref: 00E0CF6F
                        • GetLastError.KERNEL32(?,00000000,?,?,?,00E0C21E,00000000), ref: 00E0CFB4
                        • SetEvent.KERNEL32(?,?,00000000,?,?,?,00E0C21E,00000000), ref: 00E0CFC8
                        • SetEvent.KERNEL32(?,?,00000000,?,?,?,00E0C21E,00000000), ref: 00E0CFF2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                        • String ID:
                        • API String ID: 3191363074-0
                        • Opcode ID: 53c6bfaa354761754f2a8fb45be8ac0b62a41d7b9276fefac79aa1545eac34d7
                        • Instruction ID: 9dc3893555bcc73d71833f9dbb3ce412de981920a49fcf3d388600edd4279be4
                        • Opcode Fuzzy Hash: 53c6bfaa354761754f2a8fb45be8ac0b62a41d7b9276fefac79aa1545eac34d7
                        • Instruction Fuzzy Hash: F1318071600606EFDB20DFA5C8849AFBBF9EF04358B20456EF506F2190DB30AE85DB61
                        APIs
                        • GetWindowRect.USER32(?,?), ref: 00DF1915
                        • PostMessageW.USER32(00000001,00000201,00000001), ref: 00DF19C1
                        • Sleep.KERNEL32(00000000,?,?,?), ref: 00DF19C9
                        • PostMessageW.USER32(00000001,00000202,00000000), ref: 00DF19DA
                        • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00DF19E2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: MessagePostSleep$RectWindow
                        • String ID:
                        • API String ID: 3382505437-0
                        • Opcode ID: db95224bade26a169a384459813e01b8a6e59b13c71b8967c19d06a5137f44bd
                        • Instruction ID: 45206c2b4aea2c29d14b144a60213e079502fde667f5fd0c4c5d348de90d5e95
                        • Opcode Fuzzy Hash: db95224bade26a169a384459813e01b8a6e59b13c71b8967c19d06a5137f44bd
                        • Instruction Fuzzy Hash: 2431E27590021DEFCB14CFA8CD99AEE3BB5EB04314F118229FA21A72D0C3B09954CFA1
                        APIs
                        • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00E25745
                        • SendMessageW.USER32(?,00001074,?,00000001), ref: 00E2579D
                        • _wcslen.LIBCMT ref: 00E257AF
                        • _wcslen.LIBCMT ref: 00E257BA
                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00E25816
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: MessageSend$_wcslen
                        • String ID:
                        • API String ID: 763830540-0
                        • Opcode ID: 6eb711a523de7016e27b5a48f75ae8a00e29faa962196a73d3d6f1ad05afa0fb
                        • Instruction ID: 21cd3544b2e88ce2b0b6666916cc3cc69e63c009011ea5e13e6dd7d2c17d3cf3
                        • Opcode Fuzzy Hash: 6eb711a523de7016e27b5a48f75ae8a00e29faa962196a73d3d6f1ad05afa0fb
                        • Instruction Fuzzy Hash: F421B632904628DADB209F60ED84AEEB7B8FF44724F109216F92AFB180D770C985CF51
                        APIs
                        • IsWindow.USER32(00000000), ref: 00E10951
                        • GetForegroundWindow.USER32 ref: 00E10968
                        • GetDC.USER32(00000000), ref: 00E109A4
                        • GetPixel.GDI32(00000000,?,00000003), ref: 00E109B0
                        • ReleaseDC.USER32(00000000,00000003), ref: 00E109E8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Window$ForegroundPixelRelease
                        • String ID:
                        • API String ID: 4156661090-0
                        • Opcode ID: 73ee1fdc4c827fbee3a89e5d047e191d974bcfbfa38f3b053f28dd079af1d649
                        • Instruction ID: 038e47913e6aab291891299c9ed41aa6c068cf0dc7fca2b6392dd8d21fc71f2d
                        • Opcode Fuzzy Hash: 73ee1fdc4c827fbee3a89e5d047e191d974bcfbfa38f3b053f28dd079af1d649
                        • Instruction Fuzzy Hash: F021C335600204AFD714EF65D884AAEBBF5EF84700F108069F85AE7762CB70AC45CBA0
                        APIs
                        • GetEnvironmentStringsW.KERNEL32 ref: 00DCCDC6
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00DCCDE9
                          • Part of subcall function 00DC3820: RtlAllocateHeap.NTDLL(00000000,?,00E61444,?,00DAFDF5,?,?,00D9A976,00000010,00E61440,00D913FC,?,00D913C6,?,00D91129), ref: 00DC3852
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00DCCE0F
                        • _free.LIBCMT ref: 00DCCE22
                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00DCCE31
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                        • String ID:
                        • API String ID: 336800556-0
                        • Opcode ID: d66e1acc4205418dd7345ba6af0074c26b3ad6c2766b596e978468c1a6aea196
                        • Instruction ID: 91fb4a3449de55288dac9d0060ddc16f3cccf170793b70b5232f09d4ce0e4b04
                        • Opcode Fuzzy Hash: d66e1acc4205418dd7345ba6af0074c26b3ad6c2766b596e978468c1a6aea196
                        • Instruction Fuzzy Hash: D301D4726126167F233216B7AC88F7F696DDFC7BA1329112DFA09D7201EA618D0281F0
                        APIs
                        • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00DA9693
                        • SelectObject.GDI32(?,00000000), ref: 00DA96A2
                        • BeginPath.GDI32(?), ref: 00DA96B9
                        • SelectObject.GDI32(?,00000000), ref: 00DA96E2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ObjectSelect$BeginCreatePath
                        • String ID:
                        • API String ID: 3225163088-0
                        • Opcode ID: d55bc0c11bbfa1f6e54c11522241e9c86bea8b5520b1fa4169a614875da04346
                        • Instruction ID: 69f7a3e6370d4272bca0daff8692c2cf0b507fe4db4f68f0e97e1e354a496a36
                        • Opcode Fuzzy Hash: d55bc0c11bbfa1f6e54c11522241e9c86bea8b5520b1fa4169a614875da04346
                        • Instruction Fuzzy Hash: FA214130802305EFDB129F66EC25BAA7B74BF91395F1C4255F410B61A0D3B0985ADFA4
                        APIs
                        • GetSysColor.USER32(00000008), ref: 00DA98CC
                        • SetTextColor.GDI32(?,?), ref: 00DA98D6
                        • SetBkMode.GDI32(?,00000001), ref: 00DA98E9
                        • GetStockObject.GDI32(00000005), ref: 00DA98F1
                        • GetWindowLongW.USER32(?,000000EB), ref: 00DA9952
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Color$LongModeObjectStockTextWindow
                        • String ID:
                        • API String ID: 1860813098-0
                        • Opcode ID: 5654217f47fe09ad686d84f538aec4e5b351deafaddc392f38e02b58c06d221d
                        • Instruction ID: b75786b61dff7d3420488e63df640a953110c1f05c47d6d774e9ebf7d033ec17
                        • Opcode Fuzzy Hash: 5654217f47fe09ad686d84f538aec4e5b351deafaddc392f38e02b58c06d221d
                        • Instruction Fuzzy Hash: 7621273114A2809FC7224F36ECB9AAA7B609F13331B2C019DF5929B1A1C7354C45CB61
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _memcmp
                        • String ID:
                        • API String ID: 2931989736-0
                        • Opcode ID: 9ba36f43c9ed76b3fadec6b5a5d1b1d899263923ce5ab3abca8f87994287357a
                        • Instruction ID: 47063dc5c278ec0528d29ac5306e77e56e2d6cffbc8ee11c2b88b956f0809a75
                        • Opcode Fuzzy Hash: 9ba36f43c9ed76b3fadec6b5a5d1b1d899263923ce5ab3abca8f87994287357a
                        • Instruction Fuzzy Hash: BB01F566645B1DFBD6086111BD82FFBB39CDB21394F558030FF06AA245F720ED1082B0
                        APIs
                        • GetLastError.KERNEL32(?,?,?,00DBF2DE,00DC3863,00E61444,?,00DAFDF5,?,?,00D9A976,00000010,00E61440,00D913FC,?,00D913C6), ref: 00DC2DFD
                        • _free.LIBCMT ref: 00DC2E32
                        • _free.LIBCMT ref: 00DC2E59
                        • SetLastError.KERNEL32(00000000,00D91129), ref: 00DC2E66
                        • SetLastError.KERNEL32(00000000,00D91129), ref: 00DC2E6F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ErrorLast$_free
                        • String ID:
                        • API String ID: 3170660625-0
                        • Opcode ID: 361a2edc2e0fc336cc2130517e9ed67da3c894fc21f2194cc1bce7769c609167
                        • Instruction ID: 2ec3f47df0c5ededeb2f880f343d2f72b01a926742b257b0d8eb7e555682f956
                        • Opcode Fuzzy Hash: 361a2edc2e0fc336cc2130517e9ed67da3c894fc21f2194cc1bce7769c609167
                        • Instruction Fuzzy Hash: 2101D136245A036B8A2266B66C46F3B266DEBC17B1B38442CF465B3192EF30CC0A4430
                        APIs
                        • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DEFF41,80070057,?,?,?,00DF035E), ref: 00DF002B
                        • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DEFF41,80070057,?,?), ref: 00DF0046
                        • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DEFF41,80070057,?,?), ref: 00DF0054
                        • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DEFF41,80070057,?), ref: 00DF0064
                        • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DEFF41,80070057,?,?), ref: 00DF0070
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: From$Prog$FreeStringTasklstrcmpi
                        • String ID:
                        • API String ID: 3897988419-0
                        • Opcode ID: 8ed19afc5889d448c4034f3e3f05f5ee5780aeefdeaf874262385c87dbd3d224
                        • Instruction ID: 2bc98363ac65901dd63f687b5f0a13090438a6bd9d1e1c2221e2a884b88bc6d8
                        • Opcode Fuzzy Hash: 8ed19afc5889d448c4034f3e3f05f5ee5780aeefdeaf874262385c87dbd3d224
                        • Instruction Fuzzy Hash: 67017C72600208BFDB244F69EC04BAE7EADEB44752F258124FA05E3211DB71DD458BA0
                        APIs
                        • QueryPerformanceCounter.KERNEL32(?), ref: 00DFE997
                        • QueryPerformanceFrequency.KERNEL32(?), ref: 00DFE9A5
                        • Sleep.KERNEL32(00000000), ref: 00DFE9AD
                        • QueryPerformanceCounter.KERNEL32(?), ref: 00DFE9B7
                        • Sleep.KERNEL32 ref: 00DFE9F3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: PerformanceQuery$CounterSleep$Frequency
                        • String ID:
                        • API String ID: 2833360925-0
                        • Opcode ID: 011a8d2aa65f70d277cbb2ef4c13329c836437ce542fa29ff06ca02d60898c84
                        • Instruction ID: fbb12dda41e1c68e83f037d3336dc2667740634ad8d167868202a3c270b6f8c5
                        • Opcode Fuzzy Hash: 011a8d2aa65f70d277cbb2ef4c13329c836437ce542fa29ff06ca02d60898c84
                        • Instruction Fuzzy Hash: 76013931C01A6DDBCF109BE6DC496EDBB78BB09700F128546E602B2260CB70955A8BB1
                        APIs
                        • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00DF1114
                        • GetLastError.KERNEL32(?,00000000,00000000,?,?,00DF0B9B,?,?,?), ref: 00DF1120
                        • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00DF0B9B,?,?,?), ref: 00DF112F
                        • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00DF0B9B,?,?,?), ref: 00DF1136
                        • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00DF114D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                        • String ID:
                        • API String ID: 842720411-0
                        • Opcode ID: d0e1516ff9a974ae52c982892bdc42ac858406924aa7461404b3be4cba078fd0
                        • Instruction ID: 0beb7d077e1a3f83334bbada872f7901553431caba9aa223e0d8fd1c2e2a43ca
                        • Opcode Fuzzy Hash: d0e1516ff9a974ae52c982892bdc42ac858406924aa7461404b3be4cba078fd0
                        • Instruction Fuzzy Hash: 6E016D79100305BFDB214F65DC49A6A3B6EEF85360B254415FA45D3350DB71DC458A60
                        APIs
                        • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00DF0FCA
                        • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00DF0FD6
                        • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00DF0FE5
                        • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00DF0FEC
                        • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00DF1002
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: HeapInformationToken$AllocErrorLastProcess
                        • String ID:
                        • API String ID: 44706859-0
                        • Opcode ID: 0fa39b972012b000a658ca0086e3f80d0d6ff098d8adb5d4349c0e00803737bd
                        • Instruction ID: 87fe5686ced22d8262ef965c2934c73cb685f24cbb686dd786637e2c85248cd0
                        • Opcode Fuzzy Hash: 0fa39b972012b000a658ca0086e3f80d0d6ff098d8adb5d4349c0e00803737bd
                        • Instruction Fuzzy Hash: C2F0AF3A100305EFD7214FA5DC4AF5A3B6DEF89761F254414FA05D7250CA30DC458A60
                        APIs
                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00DF102A
                        • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00DF1036
                        • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00DF1045
                        • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00DF104C
                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00DF1062
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: HeapInformationToken$AllocErrorLastProcess
                        • String ID:
                        • API String ID: 44706859-0
                        • Opcode ID: 5d0b768bfa8fa36d3f8eeebb0ac35505deecebdd589d4808a425afb12674b012
                        • Instruction ID: 036b119301bbc957d057eaac69db8b6960c26790f763df62a96b8b3497e14822
                        • Opcode Fuzzy Hash: 5d0b768bfa8fa36d3f8eeebb0ac35505deecebdd589d4808a425afb12674b012
                        • Instruction Fuzzy Hash: BEF0CD39200305FFDB215FA6EC4AF6A3BADEF89761F214424FA05E7250CE30D8858A70
                        APIs
                        • CloseHandle.KERNEL32(?,?,?,?,00E0017D,?,00E032FC,?,00000001,00DD2592,?), ref: 00E00324
                        • CloseHandle.KERNEL32(?,?,?,?,00E0017D,?,00E032FC,?,00000001,00DD2592,?), ref: 00E00331
                        • CloseHandle.KERNEL32(?,?,?,?,00E0017D,?,00E032FC,?,00000001,00DD2592,?), ref: 00E0033E
                        • CloseHandle.KERNEL32(?,?,?,?,00E0017D,?,00E032FC,?,00000001,00DD2592,?), ref: 00E0034B
                        • CloseHandle.KERNEL32(?,?,?,?,00E0017D,?,00E032FC,?,00000001,00DD2592,?), ref: 00E00358
                        • CloseHandle.KERNEL32(?,?,?,?,00E0017D,?,00E032FC,?,00000001,00DD2592,?), ref: 00E00365
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CloseHandle
                        • String ID:
                        • API String ID: 2962429428-0
                        • Opcode ID: 4b970b420a09bdd78d2bbecb6930e7437921efe83d781ee4a45441a8be87d620
                        • Instruction ID: 379a4e69ace8860eb6e224bd5fd20475daf7a9864cee10b3ffce85ba9ccd83af
                        • Opcode Fuzzy Hash: 4b970b420a09bdd78d2bbecb6930e7437921efe83d781ee4a45441a8be87d620
                        • Instruction Fuzzy Hash: 9501EE72800B019FCB31AF66D880902FBF9FF603193149A3FD19262970C3B4A988CF80
                        APIs
                        • _free.LIBCMT ref: 00DCD752
                          • Part of subcall function 00DC29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00DCD7D1,00000000,00000000,00000000,00000000,?,00DCD7F8,00000000,00000007,00000000,?,00DCDBF5,00000000), ref: 00DC29DE
                          • Part of subcall function 00DC29C8: GetLastError.KERNEL32(00000000,?,00DCD7D1,00000000,00000000,00000000,00000000,?,00DCD7F8,00000000,00000007,00000000,?,00DCDBF5,00000000,00000000), ref: 00DC29F0
                        • _free.LIBCMT ref: 00DCD764
                        • _free.LIBCMT ref: 00DCD776
                        • _free.LIBCMT ref: 00DCD788
                        • _free.LIBCMT ref: 00DCD79A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 32adc97a125e29de8630c4f67ab4d4e2fedb7bfd4a2c2fcf3bfd28ae1bd02e41
                        • Instruction ID: 434be9a0618343265af29d92e6e99ea4b813a4f9f694509ff1f7719764b4660d
                        • Opcode Fuzzy Hash: 32adc97a125e29de8630c4f67ab4d4e2fedb7bfd4a2c2fcf3bfd28ae1bd02e41
                        • Instruction Fuzzy Hash: F1F0C972584306AF8A29AB65F9C5E2677DAFB447117A90C1DF04AE7541CB30F8808A74
                        APIs
                        • GetDlgItem.USER32(?,000003E9), ref: 00DF5C58
                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 00DF5C6F
                        • MessageBeep.USER32(00000000), ref: 00DF5C87
                        • KillTimer.USER32(?,0000040A), ref: 00DF5CA3
                        • EndDialog.USER32(?,00000001), ref: 00DF5CBD
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                        • String ID:
                        • API String ID: 3741023627-0
                        • Opcode ID: 6dc08703f287d53292d2bad5b39bb09b58ef626a0483f88e7b18fa413c14d636
                        • Instruction ID: 292eb105fd542500edae7ff79f4ff12e3ffa4b559fd0f23045f53316427eb0a2
                        • Opcode Fuzzy Hash: 6dc08703f287d53292d2bad5b39bb09b58ef626a0483f88e7b18fa413c14d636
                        • Instruction Fuzzy Hash: 33016230500B08AFEB305B11ED4EFAA77B8BF00B05F054559A783B14E1DBF0A9898AA0
                        APIs
                        • _free.LIBCMT ref: 00DC22BE
                          • Part of subcall function 00DC29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00DCD7D1,00000000,00000000,00000000,00000000,?,00DCD7F8,00000000,00000007,00000000,?,00DCDBF5,00000000), ref: 00DC29DE
                          • Part of subcall function 00DC29C8: GetLastError.KERNEL32(00000000,?,00DCD7D1,00000000,00000000,00000000,00000000,?,00DCD7F8,00000000,00000007,00000000,?,00DCDBF5,00000000,00000000), ref: 00DC29F0
                        • _free.LIBCMT ref: 00DC22D0
                        • _free.LIBCMT ref: 00DC22E3
                        • _free.LIBCMT ref: 00DC22F4
                        • _free.LIBCMT ref: 00DC2305
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 577099b4e833938c62048c8862d065056ade63f136fd3c4906a233b6441b4979
                        • Instruction ID: 34090fee9dd010c965e5dd2e88d03486f92e143fee77344cbdd1690050a6bf34
                        • Opcode Fuzzy Hash: 577099b4e833938c62048c8862d065056ade63f136fd3c4906a233b6441b4979
                        • Instruction Fuzzy Hash: A7F030705802219F8A17AF56BC11D2A7B64F7187D1718054EF420F3371CBB01519EFB4
                        APIs
                        • EndPath.GDI32(?), ref: 00DA95D4
                        • StrokeAndFillPath.GDI32(?,?,00DE71F7,00000000,?,?,?), ref: 00DA95F0
                        • SelectObject.GDI32(?,00000000), ref: 00DA9603
                        • DeleteObject.GDI32 ref: 00DA9616
                        • StrokePath.GDI32(?), ref: 00DA9631
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Path$ObjectStroke$DeleteFillSelect
                        • String ID:
                        • API String ID: 2625713937-0
                        • Opcode ID: ab6fb8874efbd5dbe4e6da170a4262f2708a1e3a17c5b2b05781700571aa1d99
                        • Instruction ID: 19bab44e2c63a2de0c5800437f1df23534da23beffb321b36393b2f179e2de6a
                        • Opcode Fuzzy Hash: ab6fb8874efbd5dbe4e6da170a4262f2708a1e3a17c5b2b05781700571aa1d99
                        • Instruction Fuzzy Hash: AFF01D30406204DFEB275F56ED29B693B65AB423A2F1C8254F455750F0C770855ADF61
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: __freea$_free
                        • String ID: a/p$am/pm
                        • API String ID: 3432400110-3206640213
                        • Opcode ID: 84c1d466f20490b07ef4ecd146b2612fd70b4291b268349bd9aa16ae0a532fdd
                        • Instruction ID: da69c128f1bbfff7c021a051b6513a61ce03d45946b53195127abe9ae4f68938
                        • Opcode Fuzzy Hash: 84c1d466f20490b07ef4ecd146b2612fd70b4291b268349bd9aa16ae0a532fdd
                        • Instruction Fuzzy Hash: 63D1DF399002A7CADB249F68C855FBAB7B0EF07304F2C425DE941AB652D2359D81CBB1
                        APIs
                          • Part of subcall function 00DB0242: EnterCriticalSection.KERNEL32(00E6070C,00E61884,?,?,00DA198B,00E62518,?,?,?,00D912F9,00000000), ref: 00DB024D
                          • Part of subcall function 00DB0242: LeaveCriticalSection.KERNEL32(00E6070C,?,00DA198B,00E62518,?,?,?,00D912F9,00000000), ref: 00DB028A
                          • Part of subcall function 00DB00A3: __onexit.LIBCMT ref: 00DB00A9
                        • __Init_thread_footer.LIBCMT ref: 00E16238
                          • Part of subcall function 00DB01F8: EnterCriticalSection.KERNEL32(00E6070C,?,?,00DA8747,00E62514), ref: 00DB0202
                          • Part of subcall function 00DB01F8: LeaveCriticalSection.KERNEL32(00E6070C,?,00DA8747,00E62514), ref: 00DB0235
                          • Part of subcall function 00E0359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00E035E4
                          • Part of subcall function 00E0359C: LoadStringW.USER32(00E62390,?,00000FFF,?), ref: 00E0360A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                        • String ID: x#$x#$x#
                        • API String ID: 1072379062-1894725482
                        • Opcode ID: aa8ce8657791633109a1b96d1687583e85c487cb05ec0effbb479d059c9d2e85
                        • Instruction ID: 3091c77a932114e31cf7ec086edc8ca82dbcfb192d3965d71d7727a1d0311a2b
                        • Opcode Fuzzy Hash: aa8ce8657791633109a1b96d1687583e85c487cb05ec0effbb479d059c9d2e85
                        • Instruction Fuzzy Hash: 04C15C71A00105AFCB14DF98C891EFEB7BAFF48344F148469E955AB291DB70ED85CBA0
                        APIs
                          • Part of subcall function 00DB0242: EnterCriticalSection.KERNEL32(00E6070C,00E61884,?,?,00DA198B,00E62518,?,?,?,00D912F9,00000000), ref: 00DB024D
                          • Part of subcall function 00DB0242: LeaveCriticalSection.KERNEL32(00E6070C,?,00DA198B,00E62518,?,?,?,00D912F9,00000000), ref: 00DB028A
                          • Part of subcall function 00D99CB3: _wcslen.LIBCMT ref: 00D99CBD
                          • Part of subcall function 00DB00A3: __onexit.LIBCMT ref: 00DB00A9
                        • __Init_thread_footer.LIBCMT ref: 00E17BFB
                          • Part of subcall function 00DB01F8: EnterCriticalSection.KERNEL32(00E6070C,?,?,00DA8747,00E62514), ref: 00DB0202
                          • Part of subcall function 00DB01F8: LeaveCriticalSection.KERNEL32(00E6070C,?,00DA8747,00E62514), ref: 00DB0235
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                        • String ID: 5$G$Variable must be of type 'Object'.
                        • API String ID: 535116098-3733170431
                        • Opcode ID: 7de480c7b6baf203cd8c1b1b211bdb6ec089db7cf4188ba1c018ed98fae544ba
                        • Instruction ID: 474be9dae47b7c8b717f084e445f79b46c9f7b222dabbddbedc32f7a84f0cc0e
                        • Opcode Fuzzy Hash: 7de480c7b6baf203cd8c1b1b211bdb6ec089db7cf4188ba1c018ed98fae544ba
                        • Instruction Fuzzy Hash: 2C91AF74A04209EFCB04EF94D8819FDB7B1FF49704F109059F886AB292DB709E85CB61
                        APIs
                          • Part of subcall function 00DFB403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00DF21D0,?,?,00000034,00000800,?,00000034), ref: 00DFB42D
                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00DF2760
                          • Part of subcall function 00DFB3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00DF21FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00DFB3F8
                          • Part of subcall function 00DFB32A: GetWindowThreadProcessId.USER32(?,?), ref: 00DFB355
                          • Part of subcall function 00DFB32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00DF2194,00000034,?,?,00001004,00000000,00000000), ref: 00DFB365
                          • Part of subcall function 00DFB32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00DF2194,00000034,?,?,00001004,00000000,00000000), ref: 00DFB37B
                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00DF27CD
                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00DF281A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                        • String ID: @
                        • API String ID: 4150878124-2766056989
                        • Opcode ID: a536e7c3c1814dfd577c0c208160cd319d4c6cadd8c454b5448659dc96c87730
                        • Instruction ID: 26ae4436d1e73cb2754805948301ca501f27daa8f68c4c8c8e0b062b992cad18
                        • Opcode Fuzzy Hash: a536e7c3c1814dfd577c0c208160cd319d4c6cadd8c454b5448659dc96c87730
                        • Instruction Fuzzy Hash: 21413B7690021CAFDB10DBA4CD82AEEBBB8EF09710F158095FA55B7181DB706E45CBB1
                        APIs
                        • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Alvise Maria CV 1.exe,00000104), ref: 00DC1769
                        • _free.LIBCMT ref: 00DC1834
                        • _free.LIBCMT ref: 00DC183E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _free$FileModuleName
                        • String ID: C:\Users\user\Desktop\Alvise Maria CV 1.exe
                        • API String ID: 2506810119-359698388
                        • Opcode ID: 521d7e71719e5f60f72fcd2d205e0c248a7aa11bd68d206056755109b3ed9dfd
                        • Instruction ID: 45ac30bffd4e0750ef36919e9dda4d10bdbc9402f47ed7e23ca6c9b522b5e44c
                        • Opcode Fuzzy Hash: 521d7e71719e5f60f72fcd2d205e0c248a7aa11bd68d206056755109b3ed9dfd
                        • Instruction Fuzzy Hash: 43319579A44229FFDB21DF959881E9EBBBCEF86350B1441AAF404D7212D6708E40DBB0
                        APIs
                        • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00DFC306
                        • DeleteMenu.USER32(?,00000007,00000000), ref: 00DFC34C
                        • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00E61990,00F46440), ref: 00DFC395
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Menu$Delete$InfoItem
                        • String ID: 0
                        • API String ID: 135850232-4108050209
                        • Opcode ID: 7f6483c3aedae6c4a526123d4cb7858f1843095e2ab213cdd0e5ba7d27e094dc
                        • Instruction ID: bb997ca6be5b837e9c5ae46246ea5d1f79e6b20bf293ea13d0e4d4477786d012
                        • Opcode Fuzzy Hash: 7f6483c3aedae6c4a526123d4cb7858f1843095e2ab213cdd0e5ba7d27e094dc
                        • Instruction Fuzzy Hash: 4641BB312043099FD720DF29D980B2ABBE4EF84360F15CA1DEAA1972D1D730E914CB72
                        APIs
                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00E2CC08,00000000,?,?,?,?), ref: 00E244AA
                        • GetWindowLongW.USER32 ref: 00E244C7
                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00E244D7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Window$Long
                        • String ID: SysTreeView32
                        • API String ID: 847901565-1698111956
                        • Opcode ID: ad78aeddc9017cd0f88188c25e91b75c246b2fea95b3767e037377a9f11deb8f
                        • Instruction ID: 7712a5c0a60314fa05bc52869463e0125ae84ac18e854188e53e7f0e228d2854
                        • Opcode Fuzzy Hash: ad78aeddc9017cd0f88188c25e91b75c246b2fea95b3767e037377a9f11deb8f
                        • Instruction Fuzzy Hash: 1631ADB2200215AFDF219E38EC45BEA7BA9EF08338F205715F975A21D0D770EC519B60
                        APIs
                          • Part of subcall function 00E1335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00E13077,?,?), ref: 00E13378
                        • inet_addr.WSOCK32(?), ref: 00E1307A
                        • _wcslen.LIBCMT ref: 00E1309B
                        • htons.WSOCK32(00000000), ref: 00E13106
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                        • String ID: 255.255.255.255
                        • API String ID: 946324512-2422070025
                        • Opcode ID: d4bfee866e0b8844f25408ca1757ac437f185264c34f55e26b53a726c6d765e4
                        • Instruction ID: 533ad6d2dbb38bec5913bdc159ea5840f06cb6bc3e2477dbf8d4c0912d6d8ad6
                        • Opcode Fuzzy Hash: d4bfee866e0b8844f25408ca1757ac437f185264c34f55e26b53a726c6d765e4
                        • Instruction Fuzzy Hash: 5A31D5396002019FCB24CF39C485EEA77E0EF58318F249099E915AB392D771EE85C770
                        APIs
                        • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00E24705
                        • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00E24713
                        • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00E2471A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: MessageSend$DestroyWindow
                        • String ID: msctls_updown32
                        • API String ID: 4014797782-2298589950
                        • Opcode ID: 542a9078d7d4b4ef2de40cddde6a971fa835e15c50c44a0bb37de93ac554df44
                        • Instruction ID: 3a95a43e7f83a9521ca9793a56c126d3bc60f2a9bffba3bc6a6828097df9d9b6
                        • Opcode Fuzzy Hash: 542a9078d7d4b4ef2de40cddde6a971fa835e15c50c44a0bb37de93ac554df44
                        • Instruction Fuzzy Hash: 55214FF5600214AFDB11DF64EC81DBB37ADEB5A398B141059FA14AB291CB70EC11CB70
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _wcslen
                        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                        • API String ID: 176396367-2734436370
                        • Opcode ID: a1b473016207142982232f308f68951721a4a20269ead8f29c23c0852be2cbcf
                        • Instruction ID: 301f0fb3da70d540cad6df3cd150984fbd1178f0cb63a7c3fda44421fc9ff9e5
                        • Opcode Fuzzy Hash: a1b473016207142982232f308f68951721a4a20269ead8f29c23c0852be2cbcf
                        • Instruction Fuzzy Hash: 76213872504265A6C731AB249C22FBBF3D8DF51310F19802AFA4AE7181EB51DD41C2B5
                        APIs
                        • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00E23840
                        • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00E23850
                        • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00E23876
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: MessageSend$MoveWindow
                        • String ID: Listbox
                        • API String ID: 3315199576-2633736733
                        • Opcode ID: 32f8185a78ac1dec2d7f1429129996707803da123a593ab6a930ce6b779a18cb
                        • Instruction ID: 24573aab4e95c32fa95c61090743faa12f64de98bc465d4fe21f4a5246cdd1bc
                        • Opcode Fuzzy Hash: 32f8185a78ac1dec2d7f1429129996707803da123a593ab6a930ce6b779a18cb
                        • Instruction Fuzzy Hash: 4421D472600228BFEF258F65EC81FBB376EEF89754F109115F904AB190C675DC528BA0
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 00E04A08
                        • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00E04A5C
                        • SetErrorMode.KERNEL32(00000000,?,?,00E2CC08), ref: 00E04AD0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ErrorMode$InformationVolume
                        • String ID: %lu
                        • API String ID: 2507767853-685833217
                        • Opcode ID: d723e0f5936307acfc0305234d7657d0dcb3f0fb123ff0f6c51d8c972f91520d
                        • Instruction ID: e7c8cb67d9932079af7b3e0d5eff4721b8cb69f67ec786017b0a3eeeee0317fb
                        • Opcode Fuzzy Hash: d723e0f5936307acfc0305234d7657d0dcb3f0fb123ff0f6c51d8c972f91520d
                        • Instruction Fuzzy Hash: 33310F75A00109AFDB10DF54C985EAAB7F8EF05308F148099E905EB292D771EE45CB71
                        APIs
                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00E2424F
                        • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00E24264
                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00E24271
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: msctls_trackbar32
                        • API String ID: 3850602802-1010561917
                        • Opcode ID: e8467210c1cf0f4c7a0d65b730aaef19c16a1dbb96ec2456492a84d905110c6d
                        • Instruction ID: fcffcac0a6a8a3be53bb4393c4792a82ba854207a3c503ed30f463ca7824e4e7
                        • Opcode Fuzzy Hash: e8467210c1cf0f4c7a0d65b730aaef19c16a1dbb96ec2456492a84d905110c6d
                        • Instruction Fuzzy Hash: 1E110672240218BEEF215F69DC06FAB3BACEF85B58F111514FA55F20E0D6B1DC219B20
                        APIs
                          • Part of subcall function 00D96B57: _wcslen.LIBCMT ref: 00D96B6A
                          • Part of subcall function 00DF2DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00DF2DC5
                          • Part of subcall function 00DF2DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00DF2DD6
                          • Part of subcall function 00DF2DA7: GetCurrentThreadId.KERNEL32 ref: 00DF2DDD
                          • Part of subcall function 00DF2DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00DF2DE4
                        • GetFocus.USER32 ref: 00DF2F78
                          • Part of subcall function 00DF2DEE: GetParent.USER32(00000000), ref: 00DF2DF9
                        • GetClassNameW.USER32(?,?,00000100), ref: 00DF2FC3
                        • EnumChildWindows.USER32(?,00DF303B), ref: 00DF2FEB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                        • String ID: %s%d
                        • API String ID: 1272988791-1110647743
                        • Opcode ID: 3ef8f14eca4209b0bebb3b219ea44272c2d36db12602f3fb2229f312ae05ad52
                        • Instruction ID: bf802266046f5db74fa3bac11eb21c107185ea27a312b3292c5afefd645db6d7
                        • Opcode Fuzzy Hash: 3ef8f14eca4209b0bebb3b219ea44272c2d36db12602f3fb2229f312ae05ad52
                        • Instruction Fuzzy Hash: D811A2716002096BCF147FA4CC85EFD776AEF94304F158075BE09AB152EE7099498B70
                        APIs
                        • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00E258C1
                        • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00E258EE
                        • DrawMenuBar.USER32(?), ref: 00E258FD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Menu$InfoItem$Draw
                        • String ID: 0
                        • API String ID: 3227129158-4108050209
                        • Opcode ID: a56131c969e866d6ce0cf1cfe3fe5ee859f5471740ccf8ab017e9342943dbe17
                        • Instruction ID: b145eb77874a575bb6ed70bf057b5c9e3c70dfced69858539bb282e328d1a10a
                        • Opcode Fuzzy Hash: a56131c969e866d6ce0cf1cfe3fe5ee859f5471740ccf8ab017e9342943dbe17
                        • Instruction Fuzzy Hash: 58016D32500228EFDB219F51EC44BAEBBB4FF85364F108099F859E6151DB708A88DF31
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5a07ec26d66fb94d708a69d28a7d3d5d26db19fb1f0bbd9e6d70d3a361d2dd42
                        • Instruction ID: 62cd308484bb2c96664ece48b326278e78be0b37b9cefad80915c908216a6338
                        • Opcode Fuzzy Hash: 5a07ec26d66fb94d708a69d28a7d3d5d26db19fb1f0bbd9e6d70d3a361d2dd42
                        • Instruction Fuzzy Hash: F5C14C75A0021AEFDB14CF94C894ABEBBB5FF48704F258598E605EB252D731ED41CBA0
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Variant$ClearInitInitializeUninitialize
                        • String ID:
                        • API String ID: 1998397398-0
                        • Opcode ID: 8707a4050214e145bae66995f3a33cccd9efe8dfba9ac5ac4c0d7c85f912dd84
                        • Instruction ID: 9997dead89f851babcb44bc0a6dbee248a2a9b4881e7fe53d06fd3233be703bb
                        • Opcode Fuzzy Hash: 8707a4050214e145bae66995f3a33cccd9efe8dfba9ac5ac4c0d7c85f912dd84
                        • Instruction Fuzzy Hash: 3DA15E756083009FCB50DF28C485A6AB7E5FF88714F15885DF98AAB362DB30ED45CB61
                        APIs
                        • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00E2FC08,?), ref: 00DF05F0
                        • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00E2FC08,?), ref: 00DF0608
                        • CLSIDFromProgID.OLE32(?,?,00000000,00E2CC40,000000FF,?,00000000,00000800,00000000,?,00E2FC08,?), ref: 00DF062D
                        • _memcmp.LIBVCRUNTIME ref: 00DF064E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: FromProg$FreeTask_memcmp
                        • String ID:
                        • API String ID: 314563124-0
                        • Opcode ID: 38a7f746855c3abc838ebe0f905fb7e2ddbe90cbe206fcbe84a884bd371e68e2
                        • Instruction ID: 08bac6e4cb08e131ea4baac5c5517a5e2421c401a9f9ebd6abe3290454cfb609
                        • Opcode Fuzzy Hash: 38a7f746855c3abc838ebe0f905fb7e2ddbe90cbe206fcbe84a884bd371e68e2
                        • Instruction Fuzzy Hash: 35813D71A00109EFCB04DF94C984DEEBBB9FF89315F258158E606EB251DB71AE06CB60
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _free
                        • String ID:
                        • API String ID: 269201875-0
                        • Opcode ID: 302d41aee45db53b19d1bb96412dace4aeb0a15217d8b4bac7b19d08c098bbf3
                        • Instruction ID: 44d8063c1a2ce4774a760f7c4ef740b4810e3e4a9c7c224feff884701bc39322
                        • Opcode Fuzzy Hash: 302d41aee45db53b19d1bb96412dace4aeb0a15217d8b4bac7b19d08c098bbf3
                        • Instruction Fuzzy Hash: C541393DA00611BBDB256FFD9C46BBE3AA5EF41330F28422BF419D7392E67488419671
                        APIs
                        • GetWindowRect.USER32(00F4EE98,?), ref: 00E262E2
                        • ScreenToClient.USER32(?,?), ref: 00E26315
                        • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00E26382
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Window$ClientMoveRectScreen
                        • String ID:
                        • API String ID: 3880355969-0
                        • Opcode ID: f0baee2e74677efd552e9d631bd784fb02fe207ac037b68971e8ff65e6858037
                        • Instruction ID: cbc5684744a50223526a59f6c78b7f540f3a94bef9d1a2ccea8eb43ae84d426f
                        • Opcode Fuzzy Hash: f0baee2e74677efd552e9d631bd784fb02fe207ac037b68971e8ff65e6858037
                        • Instruction Fuzzy Hash: 3C515075900215EFCF11DF68E8809AE7BB5FF95364F109259F815AB2A0D770ED41CB50
                        APIs
                        • socket.WSOCK32(00000002,00000002,00000011), ref: 00E11AFD
                        • WSAGetLastError.WSOCK32 ref: 00E11B0B
                        • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00E11B8A
                        • WSAGetLastError.WSOCK32 ref: 00E11B94
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ErrorLast$socket
                        • String ID:
                        • API String ID: 1881357543-0
                        • Opcode ID: 0911e8d5e2e48d68d96ab77d6ac222b706bab5310e7b59b6173b07e60a1a955f
                        • Instruction ID: d63a537e79498ada75e5aec2dd134b2d35668c1feaaa33b2960c339e4c24a00c
                        • Opcode Fuzzy Hash: 0911e8d5e2e48d68d96ab77d6ac222b706bab5310e7b59b6173b07e60a1a955f
                        • Instruction Fuzzy Hash: 6C418575600200AFDB20AF24C886F697BE5EF49718F548498F6199F3D2D772ED818BA1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 72baeb6219ece38551b303d27ca80e108d9d758ffff009d6a177e8aec71e3027
                        • Instruction ID: 6eafbbdb952061f71b920a1029732ccc59c07269e872c317413c15185d3a68f3
                        • Opcode Fuzzy Hash: 72baeb6219ece38551b303d27ca80e108d9d758ffff009d6a177e8aec71e3027
                        • Instruction Fuzzy Hash: 2D41B275A04705AFD7289F78CC42FAABBA9EB88724F10452FF551DB282D771D90187B0
                        APIs
                        • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00E05783
                        • GetLastError.KERNEL32(?,00000000), ref: 00E057A9
                        • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00E057CE
                        • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00E057FA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CreateHardLink$DeleteErrorFileLast
                        • String ID:
                        • API String ID: 3321077145-0
                        • Opcode ID: 1fe0f354ffa25152ac3dd78cdef00dbf502125a3a9e7ce88d2c396a9477530d4
                        • Instruction ID: 704417deb9ef22477ee37b40c39a75f1ae57017424797e9421659f40befe2dfa
                        • Opcode Fuzzy Hash: 1fe0f354ffa25152ac3dd78cdef00dbf502125a3a9e7ce88d2c396a9477530d4
                        • Instruction Fuzzy Hash: 9D411936614A10DFCB51DF15C544A5EBBE2EF89324B198498E84AAB362CB30FD41CBA1
                        APIs
                        • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00DB6D71,00000000,00000000,00DB82D9,?,00DB82D9,?,00000001,00DB6D71,8BE85006,00000001,00DB82D9,00DB82D9), ref: 00DCD910
                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00DCD999
                        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00DCD9AB
                        • __freea.LIBCMT ref: 00DCD9B4
                          • Part of subcall function 00DC3820: RtlAllocateHeap.NTDLL(00000000,?,00E61444,?,00DAFDF5,?,?,00D9A976,00000010,00E61440,00D913FC,?,00D913C6,?,00D91129), ref: 00DC3852
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                        • String ID:
                        • API String ID: 2652629310-0
                        • Opcode ID: f8d793a1941e28321fee604826f3fc5384e592b0bc5b3746e40c151f0923a749
                        • Instruction ID: cbb1353df79ada01722ba74cc95610d9110b8c58ffa12d665cd271e85e8ee5ee
                        • Opcode Fuzzy Hash: f8d793a1941e28321fee604826f3fc5384e592b0bc5b3746e40c151f0923a749
                        • Instruction Fuzzy Hash: F331BD72A0020AABDF24CF65DC41EAE7BA6EB41310B19426CFC0597290EB35CD54CBB0
                        APIs
                        • SendMessageW.USER32(?,00001024,00000000,?), ref: 00E25352
                        • GetWindowLongW.USER32(?,000000F0), ref: 00E25375
                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00E25382
                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00E253A8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: LongWindow$InvalidateMessageRectSend
                        • String ID:
                        • API String ID: 3340791633-0
                        • Opcode ID: 2d3554e089093af3047561966f55d39b25cad32612080a4a0d7965389190117b
                        • Instruction ID: 7f2ef9894f0dc061019d240520f27e8b52efb6cfb4f66fa9bb77d333bada3a0e
                        • Opcode Fuzzy Hash: 2d3554e089093af3047561966f55d39b25cad32612080a4a0d7965389190117b
                        • Instruction Fuzzy Hash: 2331E332A55A2CEFEB30DF14EE06BE937A1AB05394F587101FA10B62E4C7B09D409B52
                        APIs
                        • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 00DFABF1
                        • SetKeyboardState.USER32(00000080,?,00008000), ref: 00DFAC0D
                        • PostMessageW.USER32(00000000,00000101,00000000), ref: 00DFAC74
                        • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 00DFACC6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: KeyboardState$InputMessagePostSend
                        • String ID:
                        • API String ID: 432972143-0
                        • Opcode ID: aa3ea090ba3f826a3bbb0326cb1b1974d62173f9fa36c222698d9f86dbe2a5b5
                        • Instruction ID: 23e71ff5fb60973d8cccad2f88dddbe15f941f0dec9590d84581be1a385f2a61
                        • Opcode Fuzzy Hash: aa3ea090ba3f826a3bbb0326cb1b1974d62173f9fa36c222698d9f86dbe2a5b5
                        • Instruction Fuzzy Hash: DC3128B4A0071CAFEF34CB69CC147FE7BA5AB89310F19C21AE689521D0C37589858772
                        APIs
                        • ClientToScreen.USER32(?,?), ref: 00E2769A
                        • GetWindowRect.USER32(?,?), ref: 00E27710
                        • PtInRect.USER32(?,?,00E28B89), ref: 00E27720
                        • MessageBeep.USER32(00000000), ref: 00E2778C
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Rect$BeepClientMessageScreenWindow
                        • String ID:
                        • API String ID: 1352109105-0
                        • Opcode ID: d9d39e32cb27c0ce65c1a71cecc16e24bd967abcaa74fdf0bf5dad8f28684040
                        • Instruction ID: bf4b80876dabd92a6e9517c86aba5a9b76da210358452bc0a50c5b9ae65353c1
                        • Opcode Fuzzy Hash: d9d39e32cb27c0ce65c1a71cecc16e24bd967abcaa74fdf0bf5dad8f28684040
                        • Instruction Fuzzy Hash: 4241A034605229DFCB12CF59E894EA977F4FF48345F1850AAE894BB261C370E946CF90
                        APIs
                        • GetForegroundWindow.USER32 ref: 00E216EB
                          • Part of subcall function 00DF3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00DF3A57
                          • Part of subcall function 00DF3A3D: GetCurrentThreadId.KERNEL32 ref: 00DF3A5E
                          • Part of subcall function 00DF3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00DF25B3), ref: 00DF3A65
                        • GetCaretPos.USER32(?), ref: 00E216FF
                        • ClientToScreen.USER32(00000000,?), ref: 00E2174C
                        • GetForegroundWindow.USER32 ref: 00E21752
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                        • String ID:
                        • API String ID: 2759813231-0
                        • Opcode ID: 8814d060a72ae609944fc48db84550ccca3dc44bc1db01cdad7b800466765298
                        • Instruction ID: 1dae6e040e9ba3685294d9c098ee4ce06ac7bdbc0e55ee1f16e2e6df50854c10
                        • Opcode Fuzzy Hash: 8814d060a72ae609944fc48db84550ccca3dc44bc1db01cdad7b800466765298
                        • Instruction Fuzzy Hash: CB315271D00149AFCB14EFAAC881CAEB7F9EF89304B5480AAE415E7211E731DE45CBB0
                        APIs
                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00DFD501
                        • Process32FirstW.KERNEL32(00000000,?), ref: 00DFD50F
                        • Process32NextW.KERNEL32(00000000,?), ref: 00DFD52F
                        • CloseHandle.KERNEL32(00000000), ref: 00DFD5DC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                        • String ID:
                        • API String ID: 420147892-0
                        • Opcode ID: 140f47bf32d8a92c648712ba6e8b11cb10e996caae9462b6e490e1532d12e0f3
                        • Instruction ID: f0eecdc355e172f800707dc2cedd7454b29d7af33f4f8d5ae624c5b65c62864a
                        • Opcode Fuzzy Hash: 140f47bf32d8a92c648712ba6e8b11cb10e996caae9462b6e490e1532d12e0f3
                        • Instruction Fuzzy Hash: 6C31C2710083049FD700EF64C881ABFBBF9EF9A354F14092DF585922A1EB719949CBB2
                        APIs
                          • Part of subcall function 00DA9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DA9BB2
                        • GetCursorPos.USER32(?), ref: 00E29001
                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00DE7711,?,?,?,?,?), ref: 00E29016
                        • GetCursorPos.USER32(?), ref: 00E2905E
                        • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00DE7711,?,?,?), ref: 00E29094
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Cursor$LongMenuPopupProcTrackWindow
                        • String ID:
                        • API String ID: 2864067406-0
                        • Opcode ID: f6cafbffa8c4d210e876a341eaaa81b88ac4cc8613df310ae5ed26c780fc37fe
                        • Instruction ID: d175cf04f9233be06c42eb6c895288f49761895cd66fd03a52a2c86b580ae13f
                        • Opcode Fuzzy Hash: f6cafbffa8c4d210e876a341eaaa81b88ac4cc8613df310ae5ed26c780fc37fe
                        • Instruction Fuzzy Hash: 3C21D13160002CEFCB268F95EC58EFA7BB9FF89350F145155F905A72A2C3759990DB60
                        APIs
                        • GetFileAttributesW.KERNEL32(?,00E2CB68), ref: 00DFD2FB
                        • GetLastError.KERNEL32 ref: 00DFD30A
                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00DFD319
                        • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00E2CB68), ref: 00DFD376
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CreateDirectory$AttributesErrorFileLast
                        • String ID:
                        • API String ID: 2267087916-0
                        • Opcode ID: 378361ff0f38e8d8048546bcb0295d79ebae908ab91f044928a3e80f350e731e
                        • Instruction ID: 874feac97d263e9cd1292fad5e169d319d185025d0290e4b89144fbacfa51528
                        • Opcode Fuzzy Hash: 378361ff0f38e8d8048546bcb0295d79ebae908ab91f044928a3e80f350e731e
                        • Instruction Fuzzy Hash: 2421B1715043059F8710DF68D88187EB7E6EF55324F248A1DF699D32A1DB30D90ACBA3
                        APIs
                          • Part of subcall function 00DF1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00DF102A
                          • Part of subcall function 00DF1014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00DF1036
                          • Part of subcall function 00DF1014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00DF1045
                          • Part of subcall function 00DF1014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00DF104C
                          • Part of subcall function 00DF1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00DF1062
                        • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00DF15BE
                        • _memcmp.LIBVCRUNTIME ref: 00DF15E1
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00DF1617
                        • HeapFree.KERNEL32(00000000), ref: 00DF161E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                        • String ID:
                        • API String ID: 1592001646-0
                        • Opcode ID: 3fb11c5cf9ffa26a6fc7a5a1218d90d02b5c33f901739fdf6dc215cee18b04fb
                        • Instruction ID: bfab43aec14e03fdf005c02c26985000114b2bca3938df6a16f5e45718986e78
                        • Opcode Fuzzy Hash: 3fb11c5cf9ffa26a6fc7a5a1218d90d02b5c33f901739fdf6dc215cee18b04fb
                        • Instruction Fuzzy Hash: AB217835E00108EFDF10DFA4C945BFEB7B8EF44344F1A8459E541AB241E731AA49CBA0
                        APIs
                        • GetWindowLongW.USER32(?,000000EC), ref: 00E2280A
                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00E22824
                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00E22832
                        • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00E22840
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Window$Long$AttributesLayered
                        • String ID:
                        • API String ID: 2169480361-0
                        • Opcode ID: ca5a4143f45162a9ba3fdb7a070abfeb347582a545e2524a499c81759653c061
                        • Instruction ID: 303685b79b05aca38cc5eb365b9456e8731fef4ca0d145cd636b7dc09b1b5f93
                        • Opcode Fuzzy Hash: ca5a4143f45162a9ba3fdb7a070abfeb347582a545e2524a499c81759653c061
                        • Instruction Fuzzy Hash: D4210331208120BFD7189B24DC44FAA7B95EF85324F24825DF5269B6E2CB71FC42CBA0
                        APIs
                          • Part of subcall function 00DF8D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00DF790A,?,000000FF,?,00DF8754,00000000,?,0000001C,?,?), ref: 00DF8D8C
                          • Part of subcall function 00DF8D7D: lstrcpyW.KERNEL32(00000000,?,?,00DF790A,?,000000FF,?,00DF8754,00000000,?,0000001C,?,?,00000000), ref: 00DF8DB2
                          • Part of subcall function 00DF8D7D: lstrcmpiW.KERNEL32(00000000,?,00DF790A,?,000000FF,?,00DF8754,00000000,?,0000001C,?,?), ref: 00DF8DE3
                        • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00DF8754,00000000,?,0000001C,?,?,00000000), ref: 00DF7923
                        • lstrcpyW.KERNEL32(00000000,?,?,00DF8754,00000000,?,0000001C,?,?,00000000), ref: 00DF7949
                        • lstrcmpiW.KERNEL32(00000002,cdecl,?,00DF8754,00000000,?,0000001C,?,?,00000000), ref: 00DF7984
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: lstrcmpilstrcpylstrlen
                        • String ID: cdecl
                        • API String ID: 4031866154-3896280584
                        • Opcode ID: 6596d692b80a348e8b061ecb87f53b069b575ba0386475b59bbbdcc230812be7
                        • Instruction ID: ad1f908da076f584cd47cd96cb877db89cded707baa1f5d0be20c61608e11a2a
                        • Opcode Fuzzy Hash: 6596d692b80a348e8b061ecb87f53b069b575ba0386475b59bbbdcc230812be7
                        • Instruction Fuzzy Hash: 1511293A200305AFDB259F35DC45DBA77A5FF45350B50802AFA42CB2A4EB71D812CBB1
                        APIs
                        • GetWindowLongW.USER32(?,000000F0), ref: 00E27D0B
                        • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00E27D2A
                        • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00E27D42
                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00E0B7AD,00000000), ref: 00E27D6B
                          • Part of subcall function 00DA9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DA9BB2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Window$Long
                        • String ID:
                        • API String ID: 847901565-0
                        • Opcode ID: 9eedd07a414ba66fa7d762364115405fa0d241e1b2956617a409657f6630fdce
                        • Instruction ID: 159b798f2261403e14ce90f66289557158ac8f3dd2cef72f45ac6d55f1ef8c08
                        • Opcode Fuzzy Hash: 9eedd07a414ba66fa7d762364115405fa0d241e1b2956617a409657f6630fdce
                        • Instruction Fuzzy Hash: 8311E431204625AFCB108F29EC04ABA3BA5EF463A4B255724F875E72F0D730DD51CB50
                        APIs
                        • SendMessageW.USER32(?,00001060,?,00000004), ref: 00E256BB
                        • _wcslen.LIBCMT ref: 00E256CD
                        • _wcslen.LIBCMT ref: 00E256D8
                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00E25816
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: MessageSend_wcslen
                        • String ID:
                        • API String ID: 455545452-0
                        • Opcode ID: 8f3e1adeb1bd34121ed113e2cc3fd0168f10d4346aab6a1ddf871514e4534404
                        • Instruction ID: 852049f5598b6da84b0abf5b9ec04a1e63a4472665013604b19ee5ffd09621f2
                        • Opcode Fuzzy Hash: 8f3e1adeb1bd34121ed113e2cc3fd0168f10d4346aab6a1ddf871514e4534404
                        • Instruction Fuzzy Hash: 9B11A272600624D6DB209B65ED85AEE77ACFB50764B50502AF926B6081EB70C984CB60
                        APIs
                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00DF1A47
                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00DF1A59
                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00DF1A6F
                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00DF1A8A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID:
                        • API String ID: 3850602802-0
                        • Opcode ID: 02c96fb566ac56b79244eca1715aaa5b648bf1a4377695fe1a83f13f2de7d260
                        • Instruction ID: 923f1115aab15612bd6cfa36a4f5989c7b2146a11f6446e3f78ae78a4e010f8a
                        • Opcode Fuzzy Hash: 02c96fb566ac56b79244eca1715aaa5b648bf1a4377695fe1a83f13f2de7d260
                        • Instruction Fuzzy Hash: 7D11393AD01219FFEB10DBA5CD85FADBB78FB08754F214091EA00B7290D671AE51DBA4
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 00DFE1FD
                        • MessageBoxW.USER32(?,?,?,?), ref: 00DFE230
                        • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00DFE246
                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00DFE24D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                        • String ID:
                        • API String ID: 2880819207-0
                        • Opcode ID: 1de02826ee575036d61fef757df1c3a4803d01b75d89ae12a7649d7a2cf8e758
                        • Instruction ID: 3b517bc495bfc0833394ba39294d2725c4aadc5dba97cfa98bac0938cf54a089
                        • Opcode Fuzzy Hash: 1de02826ee575036d61fef757df1c3a4803d01b75d89ae12a7649d7a2cf8e758
                        • Instruction Fuzzy Hash: 78114872904208BFC7119BA9EC05AAF3FACAB41320F198655F915F3390E2B0C90887B0
                        APIs
                        • CreateThread.KERNEL32(00000000,?,00DBCFF9,00000000,00000004,00000000), ref: 00DBD218
                        • GetLastError.KERNEL32 ref: 00DBD224
                        • __dosmaperr.LIBCMT ref: 00DBD22B
                        • ResumeThread.KERNEL32(00000000), ref: 00DBD249
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Thread$CreateErrorLastResume__dosmaperr
                        • String ID:
                        • API String ID: 173952441-0
                        • Opcode ID: bdf3be8f8ba2a36b31d124b0081fdc83abd5201fc88eefc2688e23f229d94faf
                        • Instruction ID: 689915ed41bf80f0b001423c638552b98503bee07791f4f8d3f19b716c8eb946
                        • Opcode Fuzzy Hash: bdf3be8f8ba2a36b31d124b0081fdc83abd5201fc88eefc2688e23f229d94faf
                        • Instruction Fuzzy Hash: 7701F936805204FFCB215BA6DC05BEE7B6ADF81730F240259F926961D0EB71C905C7B0
                        APIs
                        • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00D9604C
                        • GetStockObject.GDI32(00000011), ref: 00D96060
                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 00D9606A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CreateMessageObjectSendStockWindow
                        • String ID:
                        • API String ID: 3970641297-0
                        • Opcode ID: 4818c7e6bd5f9a3705f68375f624a406ed65e6594b199c09c9fc535f06876307
                        • Instruction ID: c26c0f1d1cbba53438dccd4e72a1671fb116200fe249627bb3bd0bab544f3cc6
                        • Opcode Fuzzy Hash: 4818c7e6bd5f9a3705f68375f624a406ed65e6594b199c09c9fc535f06876307
                        • Instruction Fuzzy Hash: AD118072501508BFEF224FA5DC94EEABB69FF183A4F140216FA1862110D772DC61DFA1
                        APIs
                        • ___BuildCatchObject.LIBVCRUNTIME ref: 00DB3B56
                          • Part of subcall function 00DB3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00DB3AD2
                          • Part of subcall function 00DB3AA3: ___AdjustPointer.LIBCMT ref: 00DB3AED
                        • _UnwindNestedFrames.LIBCMT ref: 00DB3B6B
                        • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00DB3B7C
                        • CallCatchBlock.LIBVCRUNTIME ref: 00DB3BA4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                        • String ID:
                        • API String ID: 737400349-0
                        • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                        • Instruction ID: 293490f3c6238b6c2f966848779e0e40cdbbb0f753ca52e37c6f8aa91a219eef
                        • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                        • Instruction Fuzzy Hash: 09012932100148FBDF12AE95CC42EEB7B69EF58754F044014FE4956121C732E961EBB0
                        APIs
                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00D913C6,00000000,00000000,?,00DC301A,00D913C6,00000000,00000000,00000000,?,00DC328B,00000006,FlsSetValue), ref: 00DC30A5
                        • GetLastError.KERNEL32(?,00DC301A,00D913C6,00000000,00000000,00000000,?,00DC328B,00000006,FlsSetValue,00E32290,FlsSetValue,00000000,00000364,?,00DC2E46), ref: 00DC30B1
                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00DC301A,00D913C6,00000000,00000000,00000000,?,00DC328B,00000006,FlsSetValue,00E32290,FlsSetValue,00000000), ref: 00DC30BF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: LibraryLoad$ErrorLast
                        • String ID:
                        • API String ID: 3177248105-0
                        • Opcode ID: c2babae28ab256170ab30891408c870dd080566b9054ef6a98dfe188e768d02c
                        • Instruction ID: ac33da82d79de98e5ad73a8a800fbbbf3ca63ac76cc9509ab9cbe3bfe5a61d1b
                        • Opcode Fuzzy Hash: c2babae28ab256170ab30891408c870dd080566b9054ef6a98dfe188e768d02c
                        • Instruction Fuzzy Hash: 2E01D833301623AFCB314E79EC44F677B98AF05BA1B248628F946E3190C721D906D6F0
                        APIs
                        • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00DF747F
                        • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00DF7497
                        • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00DF74AC
                        • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00DF74CA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Type$Register$FileLoadModuleNameUser
                        • String ID:
                        • API String ID: 1352324309-0
                        • Opcode ID: 46c7679f0f89f3ab03e5be1d516476b8eea80cdf43a116499fe86698dc5e8f0f
                        • Instruction ID: 5a70a45c0b6f9322a57f3b7c2f18d8561565d4f6664c23dcea01bdae9ec2645a
                        • Opcode Fuzzy Hash: 46c7679f0f89f3ab03e5be1d516476b8eea80cdf43a116499fe86698dc5e8f0f
                        • Instruction Fuzzy Hash: C2118EB12053199FE7309F14EC09BE67BFCEB00B00F21C569A666D7191D770E908DBA0
                        APIs
                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00DFACD3,?,00008000), ref: 00DFB0C4
                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00DFACD3,?,00008000), ref: 00DFB0E9
                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00DFACD3,?,00008000), ref: 00DFB0F3
                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00DFACD3,?,00008000), ref: 00DFB126
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CounterPerformanceQuerySleep
                        • String ID:
                        • API String ID: 2875609808-0
                        • Opcode ID: 8f5861c87915411e4efd0a534b1cd1d2f26502000af402979d20968ee576de54
                        • Instruction ID: 1b20c94bacf874e68d305c08d4f826469274757fcde49d5bb1029a6cda57ba45
                        • Opcode Fuzzy Hash: 8f5861c87915411e4efd0a534b1cd1d2f26502000af402979d20968ee576de54
                        • Instruction Fuzzy Hash: 8F116131C01A2CDBCF109FE5D9596FEBB78FF0A721F128086DA41B2141CB309555CB61
                        APIs
                        • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00DF2DC5
                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00DF2DD6
                        • GetCurrentThreadId.KERNEL32 ref: 00DF2DDD
                        • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00DF2DE4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                        • String ID:
                        • API String ID: 2710830443-0
                        • Opcode ID: ebe2f12630ed13011b5686c8c7d683478adcb9ad08a5e64bc23645788636cd22
                        • Instruction ID: 255be81b17dbbd16db4120ed78fa1ecc0b5d8acd3f6ac00ba04157ff787f8fb1
                        • Opcode Fuzzy Hash: ebe2f12630ed13011b5686c8c7d683478adcb9ad08a5e64bc23645788636cd22
                        • Instruction Fuzzy Hash: 85E06D711016287BE7301B63DC0EEFB7E6CEB42FA1F654115B206E10809AA4C88AC6F0
                        APIs
                          • Part of subcall function 00DA9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00DA9693
                          • Part of subcall function 00DA9639: SelectObject.GDI32(?,00000000), ref: 00DA96A2
                          • Part of subcall function 00DA9639: BeginPath.GDI32(?), ref: 00DA96B9
                          • Part of subcall function 00DA9639: SelectObject.GDI32(?,00000000), ref: 00DA96E2
                        • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00E28887
                        • LineTo.GDI32(?,?,?), ref: 00E28894
                        • EndPath.GDI32(?), ref: 00E288A4
                        • StrokePath.GDI32(?), ref: 00E288B2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                        • String ID:
                        • API String ID: 1539411459-0
                        • Opcode ID: 662815d5d367f59076d25f55d6fd9c794c1cee7088d3b980443a71f2952d2dba
                        • Instruction ID: 0c9c15c8f92c6f70275e0b2c842a930705b4d9f3cdcb8d776c53f7e02daa6f32
                        • Opcode Fuzzy Hash: 662815d5d367f59076d25f55d6fd9c794c1cee7088d3b980443a71f2952d2dba
                        • Instruction Fuzzy Hash: 44F03A36042668BAEB225F95AC0AFCE3A69AF06350F548040FA12750E1C7B55526CBE5
                        APIs
                        • GetSysColor.USER32(00000008), ref: 00DA98CC
                        • SetTextColor.GDI32(?,?), ref: 00DA98D6
                        • SetBkMode.GDI32(?,00000001), ref: 00DA98E9
                        • GetStockObject.GDI32(00000005), ref: 00DA98F1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Color$ModeObjectStockText
                        • String ID:
                        • API String ID: 4037423528-0
                        • Opcode ID: 077da0509f1b9cc795a2a578faf042156d6134d07271bdce68293fa37e5ee98c
                        • Instruction ID: e31984b9c8aa085bd43b3a94ffa21b288265c05126c8550774d09ab18e8fa4fa
                        • Opcode Fuzzy Hash: 077da0509f1b9cc795a2a578faf042156d6134d07271bdce68293fa37e5ee98c
                        • Instruction Fuzzy Hash: BAE09B31244680AEDB315B76FC09BDD3F21EB12336F188219F6F9640E1C37146559F21
                        APIs
                        • GetCurrentThread.KERNEL32 ref: 00DF1634
                        • OpenThreadToken.ADVAPI32(00000000,?,?,?,00DF11D9), ref: 00DF163B
                        • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00DF11D9), ref: 00DF1648
                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,00DF11D9), ref: 00DF164F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CurrentOpenProcessThreadToken
                        • String ID:
                        • API String ID: 3974789173-0
                        • Opcode ID: e1d6225a4cec8db6ea98a503c64cf924cacbff386d85e4a9aba989377ceb07c5
                        • Instruction ID: 69fb93720eeb5217283bfdd9d9eaac811fffb672da23f372a34454b91bcb11ce
                        • Opcode Fuzzy Hash: e1d6225a4cec8db6ea98a503c64cf924cacbff386d85e4a9aba989377ceb07c5
                        • Instruction Fuzzy Hash: 2AE08636601211DFD7301FA2DD0DF5A3B7CAF44791F298808F345EA090E634444AC764
                        APIs
                        • GetDesktopWindow.USER32 ref: 00DED858
                        • GetDC.USER32(00000000), ref: 00DED862
                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00DED882
                        • ReleaseDC.USER32(?), ref: 00DED8A3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CapsDesktopDeviceReleaseWindow
                        • String ID:
                        • API String ID: 2889604237-0
                        • Opcode ID: eb020fe516878c53298f2dca4349b9e0ffa559de2988da25145d2915cb1518f1
                        • Instruction ID: 24ff9524341ec1f7f5389bc8744d7edc7761873dc0e46d56c45d299b12259588
                        • Opcode Fuzzy Hash: eb020fe516878c53298f2dca4349b9e0ffa559de2988da25145d2915cb1518f1
                        • Instruction Fuzzy Hash: 37E01271800204DFCF519FA1D80866DBBB2FF08710F208005F846F7250C7348506AFA0
                        APIs
                        • GetDesktopWindow.USER32 ref: 00DED86C
                        • GetDC.USER32(00000000), ref: 00DED876
                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00DED882
                        • ReleaseDC.USER32(?), ref: 00DED8A3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CapsDesktopDeviceReleaseWindow
                        • String ID:
                        • API String ID: 2889604237-0
                        • Opcode ID: 0795abd5ef7506e9bd4ad8233d2a267217539b1eda58954edee27ba67780d432
                        • Instruction ID: 40fb2a18fc3803c0195cbc73093e72d70c4ba1d8ccfb541593b787bd791c21e7
                        • Opcode Fuzzy Hash: 0795abd5ef7506e9bd4ad8233d2a267217539b1eda58954edee27ba67780d432
                        • Instruction Fuzzy Hash: 42E09A75C00204DFCF619FA1D80866DBBB5FF48B11B249449F94AF7250D73859069F94
                        APIs
                          • Part of subcall function 00D97620: _wcslen.LIBCMT ref: 00D97625
                        • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00E04ED4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Connection_wcslen
                        • String ID: *$LPT
                        • API String ID: 1725874428-3443410124
                        • Opcode ID: b9ae293fb46fc4361f16e0e62bfedba5ae8aea1691055d5184747f53939249d1
                        • Instruction ID: f1646aa67f95b0a262340fddf56f985a16d6b1d3268e4cd7a10325f1217128fa
                        • Opcode Fuzzy Hash: b9ae293fb46fc4361f16e0e62bfedba5ae8aea1691055d5184747f53939249d1
                        • Instruction Fuzzy Hash: 2B915FB5A042059FCB14DF54C584EAABBF1EF44308F199099E50AAF3E2D731ED85CBA1
                        APIs
                        • __startOneArgErrorHandling.LIBCMT ref: 00DBE30D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ErrorHandling__start
                        • String ID: pow
                        • API String ID: 3213639722-2276729525
                        • Opcode ID: c7ab2e9c0533b1e663b7e718d78fe465b310a4a06b3517f97c893e6ac075e4ca
                        • Instruction ID: 458ef420e3fc10fd7e3c13c6e8a015c3f4f1f9bef2090495017d1eee4d27f7e6
                        • Opcode Fuzzy Hash: c7ab2e9c0533b1e663b7e718d78fe465b310a4a06b3517f97c893e6ac075e4ca
                        • Instruction Fuzzy Hash: 5E512761A0C207DACB117714C901BFA2BE8EB40741F28899CF0D7933A9DB348C959EB6
                        APIs
                        • CharUpperBuffW.USER32(00DE569E,00000000,?,00E2CC08,?,00000000,00000000), ref: 00E178DD
                          • Part of subcall function 00D96B57: _wcslen.LIBCMT ref: 00D96B6A
                        • CharUpperBuffW.USER32(00DE569E,00000000,?,00E2CC08,00000000,?,00000000,00000000), ref: 00E1783B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: BuffCharUpper$_wcslen
                        • String ID: <s
                        • API String ID: 3544283678-2940880691
                        • Opcode ID: 4db32eac53ec53e619105acedbc93b081f0bc06dff2e90e26a26dec9e92bd933
                        • Instruction ID: 146639336e5280ead982b3ca4cc256530bc4a09ebd905d16ad13a4b7f576b019
                        • Opcode Fuzzy Hash: 4db32eac53ec53e619105acedbc93b081f0bc06dff2e90e26a26dec9e92bd933
                        • Instruction Fuzzy Hash: 10611C76914129AACF04EBA4CC91DFDB378FF54B04B545529E582B7091EF30AA89CBB0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID:
                        • String ID: #
                        • API String ID: 0-1885708031
                        • Opcode ID: e9ac957d3ef360c31ddcb632b9d86ba5a8f012db25c430faa15f979de6999d5f
                        • Instruction ID: 9ff2d90ab353ac251406ae60db25863b6c6d994cd25061a2ded69ee939de89eb
                        • Opcode Fuzzy Hash: e9ac957d3ef360c31ddcb632b9d86ba5a8f012db25c430faa15f979de6999d5f
                        • Instruction Fuzzy Hash: 68512235504286DFDF25FF29C481ABA7BA9EF66310F284059EC919B2D0D630DD42CBB0
                        APIs
                        • Sleep.KERNEL32(00000000), ref: 00DAF2A2
                        • GlobalMemoryStatusEx.KERNEL32(?), ref: 00DAF2BB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: GlobalMemorySleepStatus
                        • String ID: @
                        • API String ID: 2783356886-2766056989
                        • Opcode ID: c6ec87dbbffbb23d51a1c1e0d9adc4a4fb1bc2ca812d24c109d7531c3c3b52fa
                        • Instruction ID: 3a2dd591571e867bc0c4ec09becf00c32226dc8f2cf0a168177cf2383120aa81
                        • Opcode Fuzzy Hash: c6ec87dbbffbb23d51a1c1e0d9adc4a4fb1bc2ca812d24c109d7531c3c3b52fa
                        • Instruction Fuzzy Hash: 655153724187849BD720AF11D886BAFBBF8FF85300F81884CF299511A5EB708569CB76
                        APIs
                        • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 00E157E0
                        • _wcslen.LIBCMT ref: 00E157EC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: BuffCharUpper_wcslen
                        • String ID: CALLARGARRAY
                        • API String ID: 157775604-1150593374
                        • Opcode ID: b8cdf0cc793b336565f746ce31d5eb8f77518d52e3c7c164c71a3f635ab1e3fd
                        • Instruction ID: f08fdd20458904a3be77a41f2499eb9c965cd1324b151ea3d2738800082643f0
                        • Opcode Fuzzy Hash: b8cdf0cc793b336565f746ce31d5eb8f77518d52e3c7c164c71a3f635ab1e3fd
                        • Instruction Fuzzy Hash: AA417F72A00109DFCB18DFA9C8829FEBBB5EF99314F10506DE505B7291D7709D81CBA0
                        APIs
                        • _wcslen.LIBCMT ref: 00E0D130
                        • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00E0D13A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CrackInternet_wcslen
                        • String ID: |
                        • API String ID: 596671847-2343686810
                        • Opcode ID: f61109d7b9ede3ef7664bac9aedf404b6b104f478fae4e7cc99da12afce48c74
                        • Instruction ID: 0d21da9138c73f78e587e09c0c4c8b7bcbd287f1cb74094b6d75c08de0419570
                        • Opcode Fuzzy Hash: f61109d7b9ede3ef7664bac9aedf404b6b104f478fae4e7cc99da12afce48c74
                        • Instruction Fuzzy Hash: 57312A71D01219ABCF15EFA5CC85AEEBFB9FF04344F104019F815B6266EB31AA46CB60
                        APIs
                        • DestroyWindow.USER32(?,?,?,?), ref: 00E23621
                        • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00E2365C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Window$DestroyMove
                        • String ID: static
                        • API String ID: 2139405536-2160076837
                        • Opcode ID: 8982a61d9bf1f35d268537b6ae9b999a48655eac6908bce5035c0dc5836d6344
                        • Instruction ID: 9607a27886bdc4185e9ad7f4091ac32435e068c1c7c4af7f234247d72feca913
                        • Opcode Fuzzy Hash: 8982a61d9bf1f35d268537b6ae9b999a48655eac6908bce5035c0dc5836d6344
                        • Instruction Fuzzy Hash: C531A171110614AEDB20DF34EC40EFB73A9FF48714F109619F855A7180DA34AD81CB60
                        APIs
                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00E2461F
                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00E24634
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: '
                        • API String ID: 3850602802-1997036262
                        • Opcode ID: 38854790c8b2f6a249f5f3e8e4357ea7b8547c75f88cc398e3d2020f9daf671a
                        • Instruction ID: 86aef01caf09b088b1d8737a7a1d8a0183068c7f94017bbdd98288d90b5d1902
                        • Opcode Fuzzy Hash: 38854790c8b2f6a249f5f3e8e4357ea7b8547c75f88cc398e3d2020f9daf671a
                        • Instruction Fuzzy Hash: 773137B5A0032A9FDF14CFA9D980BDABBB5FF49304F14506AE944AB381D770A941CF90
                        APIs
                        • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00DD33A2
                          • Part of subcall function 00D96B57: _wcslen.LIBCMT ref: 00D96B6A
                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00D93A04
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: IconLoadNotifyShell_String_wcslen
                        • String ID: Line:
                        • API String ID: 2289894680-1585850449
                        • Opcode ID: 4d03f665e207cfe5dc5287ef774730cf07be09c86a6c74a4deaec0de32f9d47d
                        • Instruction ID: e9ce9bdf70a55494884ce0cc5e5eed0775f64247ad35ed06efe1dff1f12973d3
                        • Opcode Fuzzy Hash: 4d03f665e207cfe5dc5287ef774730cf07be09c86a6c74a4deaec0de32f9d47d
                        • Instruction Fuzzy Hash: D531C471448300AECB21EB54DC45BEFB7D8EB40754F18455EF59A93191EB709648CBF2
                        APIs
                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00E2327C
                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E23287
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: Combobox
                        • API String ID: 3850602802-2096851135
                        • Opcode ID: dd2b4ef39b13fee98c69c9e9ce4a02a27602f8885051eef65c277ecbfccdb6e6
                        • Instruction ID: 9290415264b0811e2ec15369c2d8df635a8cd6099ab6a8b8c5def6e1979c8c7b
                        • Opcode Fuzzy Hash: dd2b4ef39b13fee98c69c9e9ce4a02a27602f8885051eef65c277ecbfccdb6e6
                        • Instruction Fuzzy Hash: 7411E672300218BFEF259E64EC80EBB376BEB54368F201524F918B72A0D6759D518B60
                        APIs
                          • Part of subcall function 00D9600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00D9604C
                          • Part of subcall function 00D9600E: GetStockObject.GDI32(00000011), ref: 00D96060
                          • Part of subcall function 00D9600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00D9606A
                        • GetWindowRect.USER32(00000000,?), ref: 00E2377A
                        • GetSysColor.USER32(00000012), ref: 00E23794
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Window$ColorCreateMessageObjectRectSendStock
                        • String ID: static
                        • API String ID: 1983116058-2160076837
                        • Opcode ID: 9b5585ec02b982a9d97b4ee4e10ea985c3ef0f33f26d75667b3217ff876e2050
                        • Instruction ID: 9740eadd2b9d6ca4d1a5b1c49fc5a15aadb9fd57ed121050ac1cda9f4b702462
                        • Opcode Fuzzy Hash: 9b5585ec02b982a9d97b4ee4e10ea985c3ef0f33f26d75667b3217ff876e2050
                        • Instruction Fuzzy Hash: 231159B2610219AFDF00DFB8DC45AEE7BB9FB08304F105915F955E2250D774E8119B60
                        APIs
                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00E0CD7D
                        • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00E0CDA6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Internet$OpenOption
                        • String ID: <local>
                        • API String ID: 942729171-4266983199
                        • Opcode ID: aa391faa978e9e0a70598264c202e05659d102e880d288d4df02378fa7f957cb
                        • Instruction ID: ba400da5abb966513a960686131ac902473e9de846c9bb2bc832ca7d2d519054
                        • Opcode Fuzzy Hash: aa391faa978e9e0a70598264c202e05659d102e880d288d4df02378fa7f957cb
                        • Instruction Fuzzy Hash: 0311C6712156317AD7344B668C45EE7BE6CEF127A8F205336B109A30C0D77099C5D6F0
                        APIs
                        • GetWindowTextLengthW.USER32(00000000), ref: 00E234AB
                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00E234BA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: LengthMessageSendTextWindow
                        • String ID: edit
                        • API String ID: 2978978980-2167791130
                        • Opcode ID: 727080cdbc4ebc183d836f477f07a0280918866d7e15ce1428cf29fadd52ec8b
                        • Instruction ID: 96da371fdd10bb5c5f3baf027ef163bcc1f65fbc6645afbe2bfc4bf716237de7
                        • Opcode Fuzzy Hash: 727080cdbc4ebc183d836f477f07a0280918866d7e15ce1428cf29fadd52ec8b
                        • Instruction Fuzzy Hash: B811BF71100228AFEB226F74EC40AEB376AEB04778F606364FA70A31D0C779DC519B60
                        APIs
                          • Part of subcall function 00D99CB3: _wcslen.LIBCMT ref: 00D99CBD
                        • CharUpperBuffW.USER32(?,?,?), ref: 00DF6CB6
                        • _wcslen.LIBCMT ref: 00DF6CC2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _wcslen$BuffCharUpper
                        • String ID: STOP
                        • API String ID: 1256254125-2411985666
                        • Opcode ID: 07ae0f30cdb593f13c5f2f171a9b4119186b6286da0caad9aea681897ffd8edd
                        • Instruction ID: 370f5834840c300c69477dc047883bd0fe8e7986e045265059b70dbcfc7747d9
                        • Opcode Fuzzy Hash: 07ae0f30cdb593f13c5f2f171a9b4119186b6286da0caad9aea681897ffd8edd
                        • Instruction Fuzzy Hash: 7F01263260052E9BCB20AFBDDC908BF77B4EB6171071A4528E9A293195EB31D840C670
                        APIs
                          • Part of subcall function 00D99CB3: _wcslen.LIBCMT ref: 00D99CBD
                          • Part of subcall function 00DF3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00DF3CCA
                        • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00DF1D4C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 624084870-1403004172
                        • Opcode ID: 12700c528d1431d887cb6ec9f8d02385910c8045d9b992e41cb22c5dff402ef5
                        • Instruction ID: b5ed7b82dd189f8437d731f8a56b59837e4378eefc9488f01f0eb0e82fe1f874
                        • Opcode Fuzzy Hash: 12700c528d1431d887cb6ec9f8d02385910c8045d9b992e41cb22c5dff402ef5
                        • Instruction Fuzzy Hash: D001B175601218AB8F18EBA4CC658FEB3B8EB46350B144A1EA972672D1EA3199088670
                        APIs
                          • Part of subcall function 00D99CB3: _wcslen.LIBCMT ref: 00D99CBD
                          • Part of subcall function 00DF3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00DF3CCA
                        • SendMessageW.USER32(?,00000180,00000000,?), ref: 00DF1C46
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 624084870-1403004172
                        • Opcode ID: 6aeac2cceb8bd1598b640aae64fd7d65969aa16c992a66ddee0ed4339a24561e
                        • Instruction ID: 2f0793625d9f649a736e2136ec41b83fc0e49996f02c22191847810b154b62f2
                        • Opcode Fuzzy Hash: 6aeac2cceb8bd1598b640aae64fd7d65969aa16c992a66ddee0ed4339a24561e
                        • Instruction Fuzzy Hash: A201A77568120CAACF14EB94CD659FFB7A8DB11340F15441DAA5677281EA209E1CC6B1
                        APIs
                          • Part of subcall function 00D99CB3: _wcslen.LIBCMT ref: 00D99CBD
                          • Part of subcall function 00DF3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00DF3CCA
                        • SendMessageW.USER32(?,00000182,?,00000000), ref: 00DF1CC8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 624084870-1403004172
                        • Opcode ID: bcc4864d51a54ecf4150213fd57a4558ab036ed1fe68de7eb92f52d0851c5d33
                        • Instruction ID: dfabed44c1ccd3b4f276f0804ce7c7884d8ef35710305250068d4efbf709f520
                        • Opcode Fuzzy Hash: bcc4864d51a54ecf4150213fd57a4558ab036ed1fe68de7eb92f52d0851c5d33
                        • Instruction Fuzzy Hash: 5E01D6B5A8021CA7CF14EBA6CE21AFEF7A8DB11340F154419B95277281EA219F18C672
                        APIs
                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00E63018,00E6305C), ref: 00E281BF
                        • CloseHandle.KERNEL32 ref: 00E281D1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CloseCreateHandleProcess
                        • String ID: \0
                        • API String ID: 3712363035-3218720685
                        • Opcode ID: d3510c6d82eca5bf925995474780ad3ff918373044c6c4e552b136736e84ebcf
                        • Instruction ID: cf353cea32edcc32fcb05980645446b3d732773358d708f9fbb2480f3d8d7355
                        • Opcode Fuzzy Hash: d3510c6d82eca5bf925995474780ad3ff918373044c6c4e552b136736e84ebcf
                        • Instruction Fuzzy Hash: 53F030B1640300BEE2606772BC45FB73A5CDB04B90F100464FA08F51A2D6A58E1882B8
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: _wcslen
                        • String ID: 3, 3, 16, 1
                        • API String ID: 176396367-3042988571
                        • Opcode ID: 4c0adeb829171c20c36e23cb9aa8d94c4f162a1772114873b5a481b3a06e65c9
                        • Instruction ID: 049c5865bb5c59da373e97919d45d54483077530b327252099a9b11e5964e742
                        • Opcode Fuzzy Hash: 4c0adeb829171c20c36e23cb9aa8d94c4f162a1772114873b5a481b3a06e65c9
                        • Instruction Fuzzy Hash: B2E02B222043205093311279ACC19FF5A99DFC9BA0714282FF9D2E2267EA948DD193B0
                        APIs
                        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00DF0B23
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Message
                        • String ID: AutoIt$Error allocating memory.
                        • API String ID: 2030045667-4017498283
                        • Opcode ID: 32704c25edfd1403c70d9aedf269485345fd7565dfb1e13a4722347c2a698a00
                        • Instruction ID: 8124d7ca67b2488937daee20c735af6f802036579eb6112fc735a40932253813
                        • Opcode Fuzzy Hash: 32704c25edfd1403c70d9aedf269485345fd7565dfb1e13a4722347c2a698a00
                        • Instruction Fuzzy Hash: 43E0D8322443186AD2213794BC03F8D7A84CF06B51F200466FB58654C38AE1649046F9
                        APIs
                          • Part of subcall function 00DAF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00DB0D71,?,?,?,00D9100A), ref: 00DAF7CE
                        • IsDebuggerPresent.KERNEL32(?,?,?,00D9100A), ref: 00DB0D75
                        • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00D9100A), ref: 00DB0D84
                        Strings
                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00DB0D7F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                        • API String ID: 55579361-631824599
                        • Opcode ID: 46e635edb68f43f119caf87b218dbb91c46709c960613f3baaf30657f0c45823
                        • Instruction ID: 95aafac79589a8e9c5ed6bb17b0e69be7c70519937e215b899c40e2e052bf654
                        • Opcode Fuzzy Hash: 46e635edb68f43f119caf87b218dbb91c46709c960613f3baaf30657f0c45823
                        • Instruction Fuzzy Hash: 5DE03970200711CFD3319FA9E4083867BE0AB00740F05896DE486D6AA1DBB0E4498BB1
                        APIs
                        • __Init_thread_footer.LIBCMT ref: 00DAE3D5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Init_thread_footer
                        • String ID: 0%$8%
                        • API String ID: 1385522511-2949748613
                        • Opcode ID: cbe207bf96e875b7a1fd6b73c4f51e417b24a0175c85cf14b46301c463cf9cfc
                        • Instruction ID: e0cb20f1df82eb0719fc6fa04815e75b98c48a0f29c32b5fba968958899cbef6
                        • Opcode Fuzzy Hash: cbe207bf96e875b7a1fd6b73c4f51e417b24a0175c85cf14b46301c463cf9cfc
                        • Instruction Fuzzy Hash: 57E02632440E10CFCE24A71DB895A8A3351EB5A3A1B10957EE303E71D1BB712845C67B
                        APIs
                        • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00E0302F
                        • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00E03044
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: Temp$FileNamePath
                        • String ID: aut
                        • API String ID: 3285503233-3010740371
                        • Opcode ID: 49739ae247c96e4db414cd6d0d6ba6e9425d2833d57b2228c2983a38696b4376
                        • Instruction ID: 7f6eb49d609c7ddb526037f5cf7c4e5ecf83e65362e32d1e4d92ad64b00effcd
                        • Opcode Fuzzy Hash: 49739ae247c96e4db414cd6d0d6ba6e9425d2833d57b2228c2983a38696b4376
                        • Instruction Fuzzy Hash: 09D05E72500328EBDA30A7A5EC0EFCB3A6CDB04751F4006A1BA55F20A1DEB09989CAD0
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: LocalTime
                        • String ID: %.3d$X64
                        • API String ID: 481472006-1077770165
                        • Opcode ID: 08ad3d4a397af1c29dacf069c490a824d74660e5c5e6569b3c4e21f58ccab63e
                        • Instruction ID: a197b8192c25e407f2c79b507e28ee32a8d2bad2271dd5389aceabd4fcc4f701
                        • Opcode Fuzzy Hash: 08ad3d4a397af1c29dacf069c490a824d74660e5c5e6569b3c4e21f58ccab63e
                        • Instruction Fuzzy Hash: 25D01261808148E9CB50ABE1DC458B9B37DEB09341F608452FA96A1050EA34C5086775
                        APIs
                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00E2236C
                        • PostMessageW.USER32(00000000), ref: 00E22373
                          • Part of subcall function 00DFE97B: Sleep.KERNEL32 ref: 00DFE9F3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: FindMessagePostSleepWindow
                        • String ID: Shell_TrayWnd
                        • API String ID: 529655941-2988720461
                        • Opcode ID: c6366c7e86d1317f88172645c77f7eb852d0b096b06d47a7312095c884c4f667
                        • Instruction ID: 8831bf5c5a66de517a2dd9c07f4066155cd8a3cf54f1c04767082dd32a30bfe3
                        • Opcode Fuzzy Hash: c6366c7e86d1317f88172645c77f7eb852d0b096b06d47a7312095c884c4f667
                        • Instruction Fuzzy Hash: 35D0C9323C1710BBE674A771EC0FFCA6615AB04B11F514A167745BA1E0C9F0A80A8A65
                        APIs
                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00E2232C
                        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00E2233F
                          • Part of subcall function 00DFE97B: Sleep.KERNEL32 ref: 00DFE9F3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2222747165.0000000000D91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D90000, based on PE: true
                        • Associated: 00000000.00000002.2222719693.0000000000D90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222850395.0000000000E52000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222940482.0000000000E5C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2222975654.0000000000E64000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_d90000_Alvise Maria CV 1.jbxd
                        Similarity
                        • API ID: FindMessagePostSleepWindow
                        • String ID: Shell_TrayWnd
                        • API String ID: 529655941-2988720461
                        • Opcode ID: d504a4e2579e6467fec2313802ac51175e978051fc18b38f6c334b88fac1562d
                        • Instruction ID: 346d8ab01c72f01805975426c0cacbf5f01c36b1a27a94d8805f60863283c0a2
                        • Opcode Fuzzy Hash: d504a4e2579e6467fec2313802ac51175e978051fc18b38f6c334b88fac1562d
                        • Instruction Fuzzy Hash: 40D012363D4710BBE674B771EC0FFDE7A15AB04B11F114A167745BA1E0C9F0A80ACA64