Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
NRFQFP.exe

Overview

General Information

Sample name:NRFQFP.exe
Analysis ID:1559974
MD5:1a911551867098e14d09eba0f3230e20
SHA1:505baedb0168073fd5f67637a8409b1bab84e2c4
SHA256:7925886f109959a6344123901123559f304a400dc2a2d3768d9fbe42d7d8305c
Tags:exeuser-lowmal3
Infos:

Detection

FormBook
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evaded block containing many API calls
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • NRFQFP.exe (PID: 7264 cmdline: "C:\Users\user\Desktop\NRFQFP.exe" MD5: 1A911551867098E14D09EBA0F3230E20)
    • svchost.exe (PID: 7352 cmdline: "C:\Users\user\Desktop\NRFQFP.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000003.00000002.1530564387.00000000002B0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000003.00000002.1530811604.0000000002CD0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      SourceRuleDescriptionAuthorStrings
      3.2.svchost.exe.2b0000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        3.2.svchost.exe.2b0000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

          System Summary

          barindex
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\NRFQFP.exe", CommandLine: "C:\Users\user\Desktop\NRFQFP.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\NRFQFP.exe", ParentImage: C:\Users\user\Desktop\NRFQFP.exe, ParentProcessId: 7264, ParentProcessName: NRFQFP.exe, ProcessCommandLine: "C:\Users\user\Desktop\NRFQFP.exe", ProcessId: 7352, ProcessName: svchost.exe
          Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\NRFQFP.exe", CommandLine: "C:\Users\user\Desktop\NRFQFP.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\NRFQFP.exe", ParentImage: C:\Users\user\Desktop\NRFQFP.exe, ParentProcessId: 7264, ParentProcessName: NRFQFP.exe, ProcessCommandLine: "C:\Users\user\Desktop\NRFQFP.exe", ProcessId: 7352, ProcessName: svchost.exe
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: NRFQFP.exeReversingLabs: Detection: 34%
          Source: NRFQFP.exeVirustotal: Detection: 34%Perma Link
          Source: Yara matchFile source: 3.2.svchost.exe.2b0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.svchost.exe.2b0000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.1530564387.00000000002B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.1530811604.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: NRFQFP.exeJoe Sandbox ML: detected
          Source: NRFQFP.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: Binary string: wntdll.pdbUGP source: NRFQFP.exe, 00000000.00000003.1265380491.0000000004070000.00000004.00001000.00020000.00000000.sdmp, NRFQFP.exe, 00000000.00000003.1273280159.0000000004210000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1530842420.0000000002F00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1491660538.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1494952805.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1530842420.000000000309E000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: NRFQFP.exe, 00000000.00000003.1265380491.0000000004070000.00000004.00001000.00020000.00000000.sdmp, NRFQFP.exe, 00000000.00000003.1273280159.0000000004210000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000003.00000002.1530842420.0000000002F00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1491660538.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1494952805.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1530842420.000000000309E000.00000040.00001000.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_01006CA9 GetFileAttributesW,FindFirstFileW,FindClose,0_2_01006CA9
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_010060DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_010060DD
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_010063F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_010063F9
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_0100EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0100EB60
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_0100F56F FindFirstFileW,FindClose,0_2_0100F56F
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_0100F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0100F5FA
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_01011B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_01011B2F
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_01011C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_01011C8A
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_01011F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_01011F94
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_01014EB5 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_01014EB5
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_01016B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_01016B0C
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_01016D07 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_01016D07
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_01016B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_01016B0C
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_01002B37 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_01002B37

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 3.2.svchost.exe.2b0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.svchost.exe.2b0000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.1530564387.00000000002B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.1530811604.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: This is a third-party compiled AutoIt script.0_2_00FC3D19
          Source: NRFQFP.exeString found in binary or memory: This is a third-party compiled AutoIt script.
          Source: NRFQFP.exe, 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_b66dd3dc-4
          Source: NRFQFP.exe, 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_69934bf7-f
          Source: NRFQFP.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_8d9a4f1d-3
          Source: NRFQFP.exeString found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_10b75705-7
          Source: initial sampleStatic PE information: Filename: NRFQFP.exe
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002DC8B3 NtClose,3_2_002DC8B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002B1A71 NtProtectVirtualMemory,3_2_002B1A71
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002B19A3 NtProtectVirtualMemory,3_2_002B19A3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72B60 NtClose,LdrInitializeThunk,3_2_02F72B60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72DF0 NtQuerySystemInformation,LdrInitializeThunk,3_2_02F72DF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F735C0 NtCreateMutant,LdrInitializeThunk,3_2_02F735C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F74340 NtSetContextThread,3_2_02F74340
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F74650 NtSuspendThread,3_2_02F74650
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72AF0 NtWriteFile,3_2_02F72AF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72AD0 NtReadFile,3_2_02F72AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72AB0 NtWaitForSingleObject,3_2_02F72AB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72BF0 NtAllocateVirtualMemory,3_2_02F72BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72BE0 NtQueryValueKey,3_2_02F72BE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72BA0 NtEnumerateValueKey,3_2_02F72BA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72B80 NtQueryInformationFile,3_2_02F72B80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72EE0 NtQueueApcThread,3_2_02F72EE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72EA0 NtAdjustPrivilegesToken,3_2_02F72EA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72E80 NtReadVirtualMemory,3_2_02F72E80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72E30 NtWriteVirtualMemory,3_2_02F72E30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72FE0 NtCreateFile,3_2_02F72FE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72FB0 NtResumeThread,3_2_02F72FB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72FA0 NtQuerySection,3_2_02F72FA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72F90 NtProtectVirtualMemory,3_2_02F72F90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72F60 NtCreateProcessEx,3_2_02F72F60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72F30 NtCreateSection,3_2_02F72F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72CF0 NtOpenProcess,3_2_02F72CF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72CC0 NtQueryVirtualMemory,3_2_02F72CC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72CA0 NtQueryInformationToken,3_2_02F72CA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72C70 NtFreeVirtualMemory,3_2_02F72C70
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72C60 NtCreateKey,3_2_02F72C60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72C00 NtQueryInformationProcess,3_2_02F72C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72DD0 NtDelayExecution,3_2_02F72DD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72DB0 NtEnumerateKey,3_2_02F72DB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72D30 NtUnmapViewOfSection,3_2_02F72D30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72D10 NtMapViewOfSection,3_2_02F72D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72D00 NtSetInformationFile,3_2_02F72D00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F73090 NtSetValueKey,3_2_02F73090
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F73010 NtOpenDirectoryObject,3_2_02F73010
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F739B0 NtGetContextThread,3_2_02F739B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F73D70 NtOpenThread,3_2_02F73D70
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F73D10 NtOpenProcessToken,3_2_02F73D10
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_01006713: CreateFileW,_memset,DeviceIoControl,CloseHandle,0_2_01006713
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FFACC5 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00FFACC5
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_010079D3 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_010079D3
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FEB0430_2_00FEB043
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FD32000_2_00FD3200
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FD3B700_2_00FD3B70
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FF410F0_2_00FF410F
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FE02A40_2_00FE02A4
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FCE3B00_2_00FCE3B0
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FF038E0_2_00FF038E
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FE06D90_2_00FE06D9
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FF467F0_2_00FF467F
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FF4BEF0_2_00FF4BEF
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_0102AACE0_2_0102AACE
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FECCC10_2_00FECCC1
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FCAF500_2_00FCAF50
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FC6F070_2_00FC6F07
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_010231BC0_2_010231BC
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FED1B90_2_00FED1B9
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FDB11F0_2_00FDB11F
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FF724D0_2_00FF724D
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FE123A0_2_00FE123A
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_010013CA0_2_010013CA
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FC93F00_2_00FC93F0
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FDF5630_2_00FDF563
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FC96C00_2_00FC96C0
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FC77B00_2_00FC77B0
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_0100B6CC0_2_0100B6CC
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FF79C90_2_00FF79C9
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FDFA570_2_00FDFA57
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FC9B600_2_00FC9B60
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FC7D190_2_00FC7D19
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FE9ED00_2_00FE9ED0
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FDFE6F0_2_00FDFE6F
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FC7FA30_2_00FC7FA3
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_01ADB5D80_2_01ADB5D8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002C696F3_2_002C696F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002C69733_2_002C6973
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002BE1B33_2_002BE1B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002C01C33_2_002C01C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002BE2FE3_2_002BE2FE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002B22FD3_2_002B22FD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002BE3033_2_002BE303
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002B23003_2_002B2300
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002B26603_2_002B2660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002B2E803_2_002B2E80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002DEF333_2_002DEF33
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002BFFA33_2_002BFFA3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002BFF9C3_2_002BFF9C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FC02C03_2_02FC02C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FE02743_2_02FE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030003E63_2_030003E6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F4E3F03_2_02F4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FFA3523_2_02FFA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030001AA3_2_030001AA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FD20003_2_02FD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FF81CC3_2_02FF81CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FC81583_2_02FC8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FDA1183_2_02FDA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F301003_2_02F30100
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5C6E03_2_02F5C6E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3C7C03_2_02F3C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F407703_2_02F40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F647503_2_02F64750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FEE4F63_2_02FEE4F6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030005913_2_03000591
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FF24463_2_02FF2446
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F405353_2_02F40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3EA803_2_02F3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FF6BD73_2_02FF6BD7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FFAB403_2_02FFAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6E8F03_2_02F6E8F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F268B83_2_02F268B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0300A9A63_2_0300A9A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F4A8403_2_02F4A840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F428403_2_02F42840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F429A03_2_02F429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F569623_2_02F56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FFEEDB3_2_02FFEEDB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F52E903_2_02F52E90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FFCE933_2_02FFCE93
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F40E593_2_02F40E59
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FFEE263_2_02FFEE26
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F4CFE03_2_02F4CFE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F32FC83_2_02F32FC8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FBEFA03_2_02FBEFA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB4F403_2_02FB4F40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F60F303_2_02F60F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F82F283_2_02F82F28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F30CF23_2_02F30CF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FE0CB53_2_02FE0CB5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F40C003_2_02F40C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3ADE03_2_02F3ADE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F58DBF3_2_02F58DBF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FDCD1F3_2_02FDCD1F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F4AD003_2_02F4AD00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FE12ED3_2_02FE12ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5B2C03_2_02F5B2C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F452A03_2_02F452A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F8739A3_2_02F8739A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F2D34C3_2_02F2D34C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FF132D3_2_02FF132D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FF70E93_2_02FF70E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FFF0E03_2_02FFF0E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FEF0CC3_2_02FEF0CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F470C03_2_02F470C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0300B16B3_2_0300B16B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F4B1B03_2_02F4B1B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F2F1723_2_02F2F172
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F7516C3_2_02F7516C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FF16CC3_2_02FF16CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FFF7B03_2_02FFF7B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F314603_2_02F31460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FFF43F3_2_02FFF43F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FDD5B03_2_02FDD5B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FF75713_2_02FF7571
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FEDAC63_2_02FEDAC6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FDDAAC3_2_02FDDAAC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F85AA03_2_02F85AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FE1AA33_2_02FE1AA3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB3A6C3_2_02FB3A6C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FFFA493_2_02FFFA49
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FF7A463_2_02FF7A46
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB5BF03_2_02FB5BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F7DBF93_2_02F7DBF9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5FB803_2_02F5FB80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FFFB763_2_02FFFB76
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F438E03_2_02F438E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FAD8003_2_02FAD800
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F499503_2_02F49950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5B9503_2_02F5B950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FD59103_2_02FD5910
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F49EB03_2_02F49EB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FFFFB13_2_02FFFFB1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F41F923_2_02F41F92
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FFFF093_2_02FFFF09
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FFFCF23_2_02FFFCF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB9C323_2_02FB9C32
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5FDC03_2_02F5FDC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FF7D733_2_02FF7D73
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FF1D5A3_2_02FF1D5A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F43D403_2_02F43D40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02F87E54 appears 101 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02FAEA12 appears 86 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02FBF290 appears 105 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02F75130 appears 58 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02F2B970 appears 272 times
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: String function: 00FE6AC0 appears 42 times
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: String function: 00FEF8A0 appears 35 times
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: String function: 00FDEC2F appears 68 times
          Source: NRFQFP.exe, 00000000.00000003.1266403579.0000000004193000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs NRFQFP.exe
          Source: NRFQFP.exe, 00000000.00000003.1274886140.000000000433D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs NRFQFP.exe
          Source: NRFQFP.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: classification engineClassification label: mal84.troj.evad.winEXE@3/2@0/0
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_0100CE7A GetLastError,FormatMessageW,0_2_0100CE7A
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FFAB84 AdjustTokenPrivileges,CloseHandle,0_2_00FFAB84
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FFB134 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00FFB134
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_0100E1FD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0100E1FD
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_01006532 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,CloseHandle,0_2_01006532
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_0101C18C CoInitializeSecurity,_memset,_memset,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,0_2_0101C18C
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FC406B CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00FC406B
          Source: C:\Users\user\Desktop\NRFQFP.exeFile created: C:\Users\user~1\AppData\Local\Temp\aut7D3A.tmpJump to behavior
          Source: NRFQFP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\NRFQFP.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: NRFQFP.exeReversingLabs: Detection: 34%
          Source: NRFQFP.exeVirustotal: Detection: 34%
          Source: unknownProcess created: C:\Users\user\Desktop\NRFQFP.exe "C:\Users\user\Desktop\NRFQFP.exe"
          Source: C:\Users\user\Desktop\NRFQFP.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\NRFQFP.exe"
          Source: C:\Users\user\Desktop\NRFQFP.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\NRFQFP.exe"Jump to behavior
          Source: C:\Users\user\Desktop\NRFQFP.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\NRFQFP.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\Desktop\NRFQFP.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\NRFQFP.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\NRFQFP.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\Desktop\NRFQFP.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\NRFQFP.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\NRFQFP.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\NRFQFP.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\NRFQFP.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\NRFQFP.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\NRFQFP.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\NRFQFP.exeSection loaded: ntmarta.dllJump to behavior
          Source: NRFQFP.exeStatic file information: File size 1212928 > 1048576
          Source: NRFQFP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
          Source: NRFQFP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
          Source: NRFQFP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
          Source: NRFQFP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: NRFQFP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
          Source: NRFQFP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
          Source: NRFQFP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: wntdll.pdbUGP source: NRFQFP.exe, 00000000.00000003.1265380491.0000000004070000.00000004.00001000.00020000.00000000.sdmp, NRFQFP.exe, 00000000.00000003.1273280159.0000000004210000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1530842420.0000000002F00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1491660538.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1494952805.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1530842420.000000000309E000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: NRFQFP.exe, 00000000.00000003.1265380491.0000000004070000.00000004.00001000.00020000.00000000.sdmp, NRFQFP.exe, 00000000.00000003.1273280159.0000000004210000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000003.00000002.1530842420.0000000002F00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1491660538.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1494952805.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1530842420.000000000309E000.00000040.00001000.00020000.00000000.sdmp
          Source: NRFQFP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
          Source: NRFQFP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
          Source: NRFQFP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
          Source: NRFQFP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
          Source: NRFQFP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FDE01E LoadLibraryA,GetProcAddress,0_2_00FDE01E
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FE6B05 push ecx; ret 0_2_00FE6B18
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002B3100 push eax; ret 3_2_002B3102
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002CE9B7 push esp; ret 3_2_002CE9BF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002C7333 push ecx; retf 3_2_002C7336
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002BD307 push edx; ret 3_2_002BD30E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002D7C33 push eax; iretd 3_2_002D7CA9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002C1C05 push esi; iretd 3_2_002C1C1E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002C1C13 push esi; iretd 3_2_002C1C1E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002BD53D push esi; retf 3_2_002BD53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002D5553 push ds; iretd 3_2_002D5554
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002B45F9 push ds; ret 3_2_002B45FF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002D3FC1 push ss; retf 3_2_002D3FC4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F309AD push ecx; mov dword ptr [esp], ecx3_2_02F309B6
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_01028111 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_01028111
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FDEB42 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00FDEB42
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FE123A __initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00FE123A
          Source: C:\Users\user\Desktop\NRFQFP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\NRFQFP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\NRFQFP.exeAPI/Special instruction interceptor: Address: 1ADB1FC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F7096E rdtsc 3_2_02F7096E
          Source: C:\Users\user\Desktop\NRFQFP.exeEvaded block: after key decisiongraph_0-95533
          Source: C:\Users\user\Desktop\NRFQFP.exeEvaded block: after key decisiongraph_0-94403
          Source: C:\Users\user\Desktop\NRFQFP.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-94944
          Source: C:\Users\user\Desktop\NRFQFP.exeAPI coverage: 4.5 %
          Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.6 %
          Source: C:\Windows\SysWOW64\svchost.exe TID: 7356Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_01006CA9 GetFileAttributesW,FindFirstFileW,FindClose,0_2_01006CA9
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_010060DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_010060DD
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_010063F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_010063F9
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_0100EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0100EB60
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_0100F56F FindFirstFileW,FindClose,0_2_0100F56F
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_0100F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0100F5FA
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_01011B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_01011B2F
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_01011C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_01011C8A
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_01011F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_01011F94
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FDDDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00FDDDC0
          Source: C:\Users\user\Desktop\NRFQFP.exeAPI call chain: ExitProcess graph end nodegraph_0-94157
          Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F7096E rdtsc 3_2_02F7096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_002C7903 LdrLoadDll,3_2_002C7903
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_01016AAF BlockInput,0_2_01016AAF
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FC3D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00FC3D19
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FF3920 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW,0_2_00FF3920
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FDE01E LoadLibraryA,GetProcAddress,0_2_00FDE01E
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_01ADB4C8 mov eax, dword ptr fs:[00000030h]0_2_01ADB4C8
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_01ADB468 mov eax, dword ptr fs:[00000030h]0_2_01ADB468
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_01AD9E48 mov eax, dword ptr fs:[00000030h]0_2_01AD9E48
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F402E1 mov eax, dword ptr fs:[00000030h]3_2_02F402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F402E1 mov eax, dword ptr fs:[00000030h]3_2_02F402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F402E1 mov eax, dword ptr fs:[00000030h]3_2_02F402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]3_2_02F3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]3_2_02F3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]3_2_02F3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]3_2_02F3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]3_2_02F3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F402A0 mov eax, dword ptr fs:[00000030h]3_2_02F402A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F402A0 mov eax, dword ptr fs:[00000030h]3_2_02F402A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FC62A0 mov eax, dword ptr fs:[00000030h]3_2_02FC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FC62A0 mov ecx, dword ptr fs:[00000030h]3_2_02FC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FC62A0 mov eax, dword ptr fs:[00000030h]3_2_02FC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FC62A0 mov eax, dword ptr fs:[00000030h]3_2_02FC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FC62A0 mov eax, dword ptr fs:[00000030h]3_2_02FC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FC62A0 mov eax, dword ptr fs:[00000030h]3_2_02FC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6E284 mov eax, dword ptr fs:[00000030h]3_2_02F6E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6E284 mov eax, dword ptr fs:[00000030h]3_2_02F6E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB0283 mov eax, dword ptr fs:[00000030h]3_2_02FB0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB0283 mov eax, dword ptr fs:[00000030h]3_2_02FB0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB0283 mov eax, dword ptr fs:[00000030h]3_2_02FB0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FE0274 mov eax, dword ptr fs:[00000030h]3_2_02FE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FE0274 mov eax, dword ptr fs:[00000030h]3_2_02FE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FE0274 mov eax, dword ptr fs:[00000030h]3_2_02FE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FE0274 mov eax, dword ptr fs:[00000030h]3_2_02FE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FE0274 mov eax, dword ptr fs:[00000030h]3_2_02FE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FE0274 mov eax, dword ptr fs:[00000030h]3_2_02FE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FE0274 mov eax, dword ptr fs:[00000030h]3_2_02FE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FE0274 mov eax, dword ptr fs:[00000030h]3_2_02FE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FE0274 mov eax, dword ptr fs:[00000030h]3_2_02FE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FE0274 mov eax, dword ptr fs:[00000030h]3_2_02FE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FE0274 mov eax, dword ptr fs:[00000030h]3_2_02FE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FE0274 mov eax, dword ptr fs:[00000030h]3_2_02FE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F34260 mov eax, dword ptr fs:[00000030h]3_2_02F34260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F34260 mov eax, dword ptr fs:[00000030h]3_2_02F34260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F34260 mov eax, dword ptr fs:[00000030h]3_2_02F34260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F2826B mov eax, dword ptr fs:[00000030h]3_2_02F2826B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F2A250 mov eax, dword ptr fs:[00000030h]3_2_02F2A250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F36259 mov eax, dword ptr fs:[00000030h]3_2_02F36259
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB8243 mov eax, dword ptr fs:[00000030h]3_2_02FB8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB8243 mov ecx, dword ptr fs:[00000030h]3_2_02FB8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F2823B mov eax, dword ptr fs:[00000030h]3_2_02F2823B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F4E3F0 mov eax, dword ptr fs:[00000030h]3_2_02F4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F4E3F0 mov eax, dword ptr fs:[00000030h]3_2_02F4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F4E3F0 mov eax, dword ptr fs:[00000030h]3_2_02F4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F663FF mov eax, dword ptr fs:[00000030h]3_2_02F663FF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F403E9 mov eax, dword ptr fs:[00000030h]3_2_02F403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F403E9 mov eax, dword ptr fs:[00000030h]3_2_02F403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F403E9 mov eax, dword ptr fs:[00000030h]3_2_02F403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F403E9 mov eax, dword ptr fs:[00000030h]3_2_02F403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F403E9 mov eax, dword ptr fs:[00000030h]3_2_02F403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F403E9 mov eax, dword ptr fs:[00000030h]3_2_02F403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F403E9 mov eax, dword ptr fs:[00000030h]3_2_02F403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F403E9 mov eax, dword ptr fs:[00000030h]3_2_02F403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FDE3DB mov eax, dword ptr fs:[00000030h]3_2_02FDE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FDE3DB mov eax, dword ptr fs:[00000030h]3_2_02FDE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FDE3DB mov ecx, dword ptr fs:[00000030h]3_2_02FDE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FDE3DB mov eax, dword ptr fs:[00000030h]3_2_02FDE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FD43D4 mov eax, dword ptr fs:[00000030h]3_2_02FD43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FD43D4 mov eax, dword ptr fs:[00000030h]3_2_02FD43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FEC3CD mov eax, dword ptr fs:[00000030h]3_2_02FEC3CD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]3_2_02F3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]3_2_02F3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]3_2_02F3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]3_2_02F3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]3_2_02F3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]3_2_02F3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F383C0 mov eax, dword ptr fs:[00000030h]3_2_02F383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F383C0 mov eax, dword ptr fs:[00000030h]3_2_02F383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F383C0 mov eax, dword ptr fs:[00000030h]3_2_02F383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F383C0 mov eax, dword ptr fs:[00000030h]3_2_02F383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB63C0 mov eax, dword ptr fs:[00000030h]3_2_02FB63C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F28397 mov eax, dword ptr fs:[00000030h]3_2_02F28397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F28397 mov eax, dword ptr fs:[00000030h]3_2_02F28397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F28397 mov eax, dword ptr fs:[00000030h]3_2_02F28397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F2E388 mov eax, dword ptr fs:[00000030h]3_2_02F2E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F2E388 mov eax, dword ptr fs:[00000030h]3_2_02F2E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F2E388 mov eax, dword ptr fs:[00000030h]3_2_02F2E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5438F mov eax, dword ptr fs:[00000030h]3_2_02F5438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5438F mov eax, dword ptr fs:[00000030h]3_2_02F5438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FD437C mov eax, dword ptr fs:[00000030h]3_2_02FD437C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB035C mov eax, dword ptr fs:[00000030h]3_2_02FB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB035C mov eax, dword ptr fs:[00000030h]3_2_02FB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB035C mov eax, dword ptr fs:[00000030h]3_2_02FB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB035C mov ecx, dword ptr fs:[00000030h]3_2_02FB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB035C mov eax, dword ptr fs:[00000030h]3_2_02FB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB035C mov eax, dword ptr fs:[00000030h]3_2_02FB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FFA352 mov eax, dword ptr fs:[00000030h]3_2_02FFA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FD8350 mov ecx, dword ptr fs:[00000030h]3_2_02FD8350
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB2349 mov eax, dword ptr fs:[00000030h]3_2_02FB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB2349 mov eax, dword ptr fs:[00000030h]3_2_02FB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB2349 mov eax, dword ptr fs:[00000030h]3_2_02FB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB2349 mov eax, dword ptr fs:[00000030h]3_2_02FB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB2349 mov eax, dword ptr fs:[00000030h]3_2_02FB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB2349 mov eax, dword ptr fs:[00000030h]3_2_02FB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB2349 mov eax, dword ptr fs:[00000030h]3_2_02FB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB2349 mov eax, dword ptr fs:[00000030h]3_2_02FB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB2349 mov eax, dword ptr fs:[00000030h]3_2_02FB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB2349 mov eax, dword ptr fs:[00000030h]3_2_02FB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB2349 mov eax, dword ptr fs:[00000030h]3_2_02FB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB2349 mov eax, dword ptr fs:[00000030h]3_2_02FB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB2349 mov eax, dword ptr fs:[00000030h]3_2_02FB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB2349 mov eax, dword ptr fs:[00000030h]3_2_02FB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB2349 mov eax, dword ptr fs:[00000030h]3_2_02FB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F2C310 mov ecx, dword ptr fs:[00000030h]3_2_02F2C310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F50310 mov ecx, dword ptr fs:[00000030h]3_2_02F50310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6A30B mov eax, dword ptr fs:[00000030h]3_2_02F6A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6A30B mov eax, dword ptr fs:[00000030h]3_2_02F6A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6A30B mov eax, dword ptr fs:[00000030h]3_2_02F6A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F2C0F0 mov eax, dword ptr fs:[00000030h]3_2_02F2C0F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F720F0 mov ecx, dword ptr fs:[00000030h]3_2_02F720F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F2A0E3 mov ecx, dword ptr fs:[00000030h]3_2_02F2A0E3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F380E9 mov eax, dword ptr fs:[00000030h]3_2_02F380E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB60E0 mov eax, dword ptr fs:[00000030h]3_2_02FB60E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB20DE mov eax, dword ptr fs:[00000030h]3_2_02FB20DE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FF60B8 mov eax, dword ptr fs:[00000030h]3_2_02FF60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FF60B8 mov ecx, dword ptr fs:[00000030h]3_2_02FF60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FC80A8 mov eax, dword ptr fs:[00000030h]3_2_02FC80A8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3208A mov eax, dword ptr fs:[00000030h]3_2_02F3208A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5C073 mov eax, dword ptr fs:[00000030h]3_2_02F5C073
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F32050 mov eax, dword ptr fs:[00000030h]3_2_02F32050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB6050 mov eax, dword ptr fs:[00000030h]3_2_02FB6050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FC6030 mov eax, dword ptr fs:[00000030h]3_2_02FC6030
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F2A020 mov eax, dword ptr fs:[00000030h]3_2_02F2A020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F2C020 mov eax, dword ptr fs:[00000030h]3_2_02F2C020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F4E016 mov eax, dword ptr fs:[00000030h]3_2_02F4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F4E016 mov eax, dword ptr fs:[00000030h]3_2_02F4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F4E016 mov eax, dword ptr fs:[00000030h]3_2_02F4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F4E016 mov eax, dword ptr fs:[00000030h]3_2_02F4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030061E5 mov eax, dword ptr fs:[00000030h]3_2_030061E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB4000 mov ecx, dword ptr fs:[00000030h]3_2_02FB4000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FD2000 mov eax, dword ptr fs:[00000030h]3_2_02FD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FD2000 mov eax, dword ptr fs:[00000030h]3_2_02FD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FD2000 mov eax, dword ptr fs:[00000030h]3_2_02FD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FD2000 mov eax, dword ptr fs:[00000030h]3_2_02FD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FD2000 mov eax, dword ptr fs:[00000030h]3_2_02FD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FD2000 mov eax, dword ptr fs:[00000030h]3_2_02FD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FD2000 mov eax, dword ptr fs:[00000030h]3_2_02FD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FD2000 mov eax, dword ptr fs:[00000030h]3_2_02FD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F601F8 mov eax, dword ptr fs:[00000030h]3_2_02F601F8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FAE1D0 mov eax, dword ptr fs:[00000030h]3_2_02FAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FAE1D0 mov eax, dword ptr fs:[00000030h]3_2_02FAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FAE1D0 mov ecx, dword ptr fs:[00000030h]3_2_02FAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FAE1D0 mov eax, dword ptr fs:[00000030h]3_2_02FAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FAE1D0 mov eax, dword ptr fs:[00000030h]3_2_02FAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FF61C3 mov eax, dword ptr fs:[00000030h]3_2_02FF61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FF61C3 mov eax, dword ptr fs:[00000030h]3_2_02FF61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB019F mov eax, dword ptr fs:[00000030h]3_2_02FB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB019F mov eax, dword ptr fs:[00000030h]3_2_02FB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB019F mov eax, dword ptr fs:[00000030h]3_2_02FB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB019F mov eax, dword ptr fs:[00000030h]3_2_02FB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F2A197 mov eax, dword ptr fs:[00000030h]3_2_02F2A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F2A197 mov eax, dword ptr fs:[00000030h]3_2_02F2A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F2A197 mov eax, dword ptr fs:[00000030h]3_2_02F2A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F70185 mov eax, dword ptr fs:[00000030h]3_2_02F70185
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FEC188 mov eax, dword ptr fs:[00000030h]3_2_02FEC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FEC188 mov eax, dword ptr fs:[00000030h]3_2_02FEC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FD4180 mov eax, dword ptr fs:[00000030h]3_2_02FD4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FD4180 mov eax, dword ptr fs:[00000030h]3_2_02FD4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F2C156 mov eax, dword ptr fs:[00000030h]3_2_02F2C156
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FC8158 mov eax, dword ptr fs:[00000030h]3_2_02FC8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F36154 mov eax, dword ptr fs:[00000030h]3_2_02F36154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F36154 mov eax, dword ptr fs:[00000030h]3_2_02F36154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FC4144 mov eax, dword ptr fs:[00000030h]3_2_02FC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FC4144 mov eax, dword ptr fs:[00000030h]3_2_02FC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FC4144 mov ecx, dword ptr fs:[00000030h]3_2_02FC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FC4144 mov eax, dword ptr fs:[00000030h]3_2_02FC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FC4144 mov eax, dword ptr fs:[00000030h]3_2_02FC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F60124 mov eax, dword ptr fs:[00000030h]3_2_02F60124
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FDA118 mov ecx, dword ptr fs:[00000030h]3_2_02FDA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FDA118 mov eax, dword ptr fs:[00000030h]3_2_02FDA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FDA118 mov eax, dword ptr fs:[00000030h]3_2_02FDA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FDA118 mov eax, dword ptr fs:[00000030h]3_2_02FDA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FF0115 mov eax, dword ptr fs:[00000030h]3_2_02FF0115
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FDE10E mov eax, dword ptr fs:[00000030h]3_2_02FDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FDE10E mov ecx, dword ptr fs:[00000030h]3_2_02FDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FDE10E mov eax, dword ptr fs:[00000030h]3_2_02FDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FDE10E mov eax, dword ptr fs:[00000030h]3_2_02FDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FDE10E mov ecx, dword ptr fs:[00000030h]3_2_02FDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FDE10E mov eax, dword ptr fs:[00000030h]3_2_02FDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FDE10E mov eax, dword ptr fs:[00000030h]3_2_02FDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FDE10E mov ecx, dword ptr fs:[00000030h]3_2_02FDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FDE10E mov eax, dword ptr fs:[00000030h]3_2_02FDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FDE10E mov ecx, dword ptr fs:[00000030h]3_2_02FDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FAE6F2 mov eax, dword ptr fs:[00000030h]3_2_02FAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FAE6F2 mov eax, dword ptr fs:[00000030h]3_2_02FAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FAE6F2 mov eax, dword ptr fs:[00000030h]3_2_02FAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FAE6F2 mov eax, dword ptr fs:[00000030h]3_2_02FAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB06F1 mov eax, dword ptr fs:[00000030h]3_2_02FB06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB06F1 mov eax, dword ptr fs:[00000030h]3_2_02FB06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6A6C7 mov ebx, dword ptr fs:[00000030h]3_2_02F6A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6A6C7 mov eax, dword ptr fs:[00000030h]3_2_02F6A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F666B0 mov eax, dword ptr fs:[00000030h]3_2_02F666B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6C6A6 mov eax, dword ptr fs:[00000030h]3_2_02F6C6A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F34690 mov eax, dword ptr fs:[00000030h]3_2_02F34690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F34690 mov eax, dword ptr fs:[00000030h]3_2_02F34690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F62674 mov eax, dword ptr fs:[00000030h]3_2_02F62674
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FF866E mov eax, dword ptr fs:[00000030h]3_2_02FF866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FF866E mov eax, dword ptr fs:[00000030h]3_2_02FF866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6A660 mov eax, dword ptr fs:[00000030h]3_2_02F6A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6A660 mov eax, dword ptr fs:[00000030h]3_2_02F6A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F4C640 mov eax, dword ptr fs:[00000030h]3_2_02F4C640
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F4E627 mov eax, dword ptr fs:[00000030h]3_2_02F4E627
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F66620 mov eax, dword ptr fs:[00000030h]3_2_02F66620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F68620 mov eax, dword ptr fs:[00000030h]3_2_02F68620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3262C mov eax, dword ptr fs:[00000030h]3_2_02F3262C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72619 mov eax, dword ptr fs:[00000030h]3_2_02F72619
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FAE609 mov eax, dword ptr fs:[00000030h]3_2_02FAE609
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F4260B mov eax, dword ptr fs:[00000030h]3_2_02F4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F4260B mov eax, dword ptr fs:[00000030h]3_2_02F4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F4260B mov eax, dword ptr fs:[00000030h]3_2_02F4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F4260B mov eax, dword ptr fs:[00000030h]3_2_02F4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F4260B mov eax, dword ptr fs:[00000030h]3_2_02F4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F4260B mov eax, dword ptr fs:[00000030h]3_2_02F4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F4260B mov eax, dword ptr fs:[00000030h]3_2_02F4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F347FB mov eax, dword ptr fs:[00000030h]3_2_02F347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F347FB mov eax, dword ptr fs:[00000030h]3_2_02F347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F527ED mov eax, dword ptr fs:[00000030h]3_2_02F527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F527ED mov eax, dword ptr fs:[00000030h]3_2_02F527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F527ED mov eax, dword ptr fs:[00000030h]3_2_02F527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FBE7E1 mov eax, dword ptr fs:[00000030h]3_2_02FBE7E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3C7C0 mov eax, dword ptr fs:[00000030h]3_2_02F3C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB07C3 mov eax, dword ptr fs:[00000030h]3_2_02FB07C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F307AF mov eax, dword ptr fs:[00000030h]3_2_02F307AF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FD678E mov eax, dword ptr fs:[00000030h]3_2_02FD678E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F38770 mov eax, dword ptr fs:[00000030h]3_2_02F38770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F40770 mov eax, dword ptr fs:[00000030h]3_2_02F40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F40770 mov eax, dword ptr fs:[00000030h]3_2_02F40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F40770 mov eax, dword ptr fs:[00000030h]3_2_02F40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F40770 mov eax, dword ptr fs:[00000030h]3_2_02F40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F40770 mov eax, dword ptr fs:[00000030h]3_2_02F40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F40770 mov eax, dword ptr fs:[00000030h]3_2_02F40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F40770 mov eax, dword ptr fs:[00000030h]3_2_02F40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F40770 mov eax, dword ptr fs:[00000030h]3_2_02F40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F40770 mov eax, dword ptr fs:[00000030h]3_2_02F40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F40770 mov eax, dword ptr fs:[00000030h]3_2_02F40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F40770 mov eax, dword ptr fs:[00000030h]3_2_02F40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F40770 mov eax, dword ptr fs:[00000030h]3_2_02F40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F30750 mov eax, dword ptr fs:[00000030h]3_2_02F30750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FBE75D mov eax, dword ptr fs:[00000030h]3_2_02FBE75D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72750 mov eax, dword ptr fs:[00000030h]3_2_02F72750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F72750 mov eax, dword ptr fs:[00000030h]3_2_02F72750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB4755 mov eax, dword ptr fs:[00000030h]3_2_02FB4755
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6674D mov esi, dword ptr fs:[00000030h]3_2_02F6674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6674D mov eax, dword ptr fs:[00000030h]3_2_02F6674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6674D mov eax, dword ptr fs:[00000030h]3_2_02F6674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6273C mov eax, dword ptr fs:[00000030h]3_2_02F6273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6273C mov ecx, dword ptr fs:[00000030h]3_2_02F6273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6273C mov eax, dword ptr fs:[00000030h]3_2_02F6273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FAC730 mov eax, dword ptr fs:[00000030h]3_2_02FAC730
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6C720 mov eax, dword ptr fs:[00000030h]3_2_02F6C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6C720 mov eax, dword ptr fs:[00000030h]3_2_02F6C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F30710 mov eax, dword ptr fs:[00000030h]3_2_02F30710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F60710 mov eax, dword ptr fs:[00000030h]3_2_02F60710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6C700 mov eax, dword ptr fs:[00000030h]3_2_02F6C700
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03004500 mov eax, dword ptr fs:[00000030h]3_2_03004500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03004500 mov eax, dword ptr fs:[00000030h]3_2_03004500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03004500 mov eax, dword ptr fs:[00000030h]3_2_03004500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03004500 mov eax, dword ptr fs:[00000030h]3_2_03004500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03004500 mov eax, dword ptr fs:[00000030h]3_2_03004500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03004500 mov eax, dword ptr fs:[00000030h]3_2_03004500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03004500 mov eax, dword ptr fs:[00000030h]3_2_03004500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F304E5 mov ecx, dword ptr fs:[00000030h]3_2_02F304E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F644B0 mov ecx, dword ptr fs:[00000030h]3_2_02F644B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FBA4B0 mov eax, dword ptr fs:[00000030h]3_2_02FBA4B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F364AB mov eax, dword ptr fs:[00000030h]3_2_02F364AB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5A470 mov eax, dword ptr fs:[00000030h]3_2_02F5A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5A470 mov eax, dword ptr fs:[00000030h]3_2_02F5A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5A470 mov eax, dword ptr fs:[00000030h]3_2_02F5A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FBC460 mov ecx, dword ptr fs:[00000030h]3_2_02FBC460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F2645D mov eax, dword ptr fs:[00000030h]3_2_02F2645D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5245A mov eax, dword ptr fs:[00000030h]3_2_02F5245A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6E443 mov eax, dword ptr fs:[00000030h]3_2_02F6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6E443 mov eax, dword ptr fs:[00000030h]3_2_02F6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6E443 mov eax, dword ptr fs:[00000030h]3_2_02F6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6E443 mov eax, dword ptr fs:[00000030h]3_2_02F6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6E443 mov eax, dword ptr fs:[00000030h]3_2_02F6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6E443 mov eax, dword ptr fs:[00000030h]3_2_02F6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6E443 mov eax, dword ptr fs:[00000030h]3_2_02F6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6E443 mov eax, dword ptr fs:[00000030h]3_2_02F6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6A430 mov eax, dword ptr fs:[00000030h]3_2_02F6A430
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F2E420 mov eax, dword ptr fs:[00000030h]3_2_02F2E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F2E420 mov eax, dword ptr fs:[00000030h]3_2_02F2E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F2E420 mov eax, dword ptr fs:[00000030h]3_2_02F2E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F2C427 mov eax, dword ptr fs:[00000030h]3_2_02F2C427
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB6420 mov eax, dword ptr fs:[00000030h]3_2_02FB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB6420 mov eax, dword ptr fs:[00000030h]3_2_02FB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB6420 mov eax, dword ptr fs:[00000030h]3_2_02FB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB6420 mov eax, dword ptr fs:[00000030h]3_2_02FB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB6420 mov eax, dword ptr fs:[00000030h]3_2_02FB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB6420 mov eax, dword ptr fs:[00000030h]3_2_02FB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB6420 mov eax, dword ptr fs:[00000030h]3_2_02FB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F68402 mov eax, dword ptr fs:[00000030h]3_2_02F68402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F68402 mov eax, dword ptr fs:[00000030h]3_2_02F68402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F68402 mov eax, dword ptr fs:[00000030h]3_2_02F68402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]3_2_02F5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]3_2_02F5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]3_2_02F5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]3_2_02F5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]3_2_02F5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]3_2_02F5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]3_2_02F5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]3_2_02F5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F325E0 mov eax, dword ptr fs:[00000030h]3_2_02F325E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6C5ED mov eax, dword ptr fs:[00000030h]3_2_02F6C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6C5ED mov eax, dword ptr fs:[00000030h]3_2_02F6C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F365D0 mov eax, dword ptr fs:[00000030h]3_2_02F365D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6A5D0 mov eax, dword ptr fs:[00000030h]3_2_02F6A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6A5D0 mov eax, dword ptr fs:[00000030h]3_2_02F6A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6E5CF mov eax, dword ptr fs:[00000030h]3_2_02F6E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6E5CF mov eax, dword ptr fs:[00000030h]3_2_02F6E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F545B1 mov eax, dword ptr fs:[00000030h]3_2_02F545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F545B1 mov eax, dword ptr fs:[00000030h]3_2_02F545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB05A7 mov eax, dword ptr fs:[00000030h]3_2_02FB05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB05A7 mov eax, dword ptr fs:[00000030h]3_2_02FB05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB05A7 mov eax, dword ptr fs:[00000030h]3_2_02FB05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6E59C mov eax, dword ptr fs:[00000030h]3_2_02F6E59C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F32582 mov eax, dword ptr fs:[00000030h]3_2_02F32582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F32582 mov ecx, dword ptr fs:[00000030h]3_2_02F32582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F64588 mov eax, dword ptr fs:[00000030h]3_2_02F64588
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6656A mov eax, dword ptr fs:[00000030h]3_2_02F6656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6656A mov eax, dword ptr fs:[00000030h]3_2_02F6656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6656A mov eax, dword ptr fs:[00000030h]3_2_02F6656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F38550 mov eax, dword ptr fs:[00000030h]3_2_02F38550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F38550 mov eax, dword ptr fs:[00000030h]3_2_02F38550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F40535 mov eax, dword ptr fs:[00000030h]3_2_02F40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F40535 mov eax, dword ptr fs:[00000030h]3_2_02F40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F40535 mov eax, dword ptr fs:[00000030h]3_2_02F40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F40535 mov eax, dword ptr fs:[00000030h]3_2_02F40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F40535 mov eax, dword ptr fs:[00000030h]3_2_02F40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F40535 mov eax, dword ptr fs:[00000030h]3_2_02F40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5E53E mov eax, dword ptr fs:[00000030h]3_2_02F5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5E53E mov eax, dword ptr fs:[00000030h]3_2_02F5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5E53E mov eax, dword ptr fs:[00000030h]3_2_02F5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5E53E mov eax, dword ptr fs:[00000030h]3_2_02F5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5E53E mov eax, dword ptr fs:[00000030h]3_2_02F5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FC6500 mov eax, dword ptr fs:[00000030h]3_2_02FC6500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6AAEE mov eax, dword ptr fs:[00000030h]3_2_02F6AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6AAEE mov eax, dword ptr fs:[00000030h]3_2_02F6AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F30AD0 mov eax, dword ptr fs:[00000030h]3_2_02F30AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F64AD0 mov eax, dword ptr fs:[00000030h]3_2_02F64AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F64AD0 mov eax, dword ptr fs:[00000030h]3_2_02F64AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F86ACC mov eax, dword ptr fs:[00000030h]3_2_02F86ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F86ACC mov eax, dword ptr fs:[00000030h]3_2_02F86ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F86ACC mov eax, dword ptr fs:[00000030h]3_2_02F86ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F38AA0 mov eax, dword ptr fs:[00000030h]3_2_02F38AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F38AA0 mov eax, dword ptr fs:[00000030h]3_2_02F38AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F86AA4 mov eax, dword ptr fs:[00000030h]3_2_02F86AA4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F68A90 mov edx, dword ptr fs:[00000030h]3_2_02F68A90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3EA80 mov eax, dword ptr fs:[00000030h]3_2_02F3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3EA80 mov eax, dword ptr fs:[00000030h]3_2_02F3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3EA80 mov eax, dword ptr fs:[00000030h]3_2_02F3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3EA80 mov eax, dword ptr fs:[00000030h]3_2_02F3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3EA80 mov eax, dword ptr fs:[00000030h]3_2_02F3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3EA80 mov eax, dword ptr fs:[00000030h]3_2_02F3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3EA80 mov eax, dword ptr fs:[00000030h]3_2_02F3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3EA80 mov eax, dword ptr fs:[00000030h]3_2_02F3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3EA80 mov eax, dword ptr fs:[00000030h]3_2_02F3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FACA72 mov eax, dword ptr fs:[00000030h]3_2_02FACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FACA72 mov eax, dword ptr fs:[00000030h]3_2_02FACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6CA6F mov eax, dword ptr fs:[00000030h]3_2_02F6CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6CA6F mov eax, dword ptr fs:[00000030h]3_2_02F6CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6CA6F mov eax, dword ptr fs:[00000030h]3_2_02F6CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FDEA60 mov eax, dword ptr fs:[00000030h]3_2_02FDEA60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F36A50 mov eax, dword ptr fs:[00000030h]3_2_02F36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F36A50 mov eax, dword ptr fs:[00000030h]3_2_02F36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F36A50 mov eax, dword ptr fs:[00000030h]3_2_02F36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F36A50 mov eax, dword ptr fs:[00000030h]3_2_02F36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F36A50 mov eax, dword ptr fs:[00000030h]3_2_02F36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F36A50 mov eax, dword ptr fs:[00000030h]3_2_02F36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F36A50 mov eax, dword ptr fs:[00000030h]3_2_02F36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F40A5B mov eax, dword ptr fs:[00000030h]3_2_02F40A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F40A5B mov eax, dword ptr fs:[00000030h]3_2_02F40A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F54A35 mov eax, dword ptr fs:[00000030h]3_2_02F54A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F54A35 mov eax, dword ptr fs:[00000030h]3_2_02F54A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6CA38 mov eax, dword ptr fs:[00000030h]3_2_02F6CA38
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6CA24 mov eax, dword ptr fs:[00000030h]3_2_02F6CA24
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5EA2E mov eax, dword ptr fs:[00000030h]3_2_02F5EA2E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FBCA11 mov eax, dword ptr fs:[00000030h]3_2_02FBCA11
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F38BF0 mov eax, dword ptr fs:[00000030h]3_2_02F38BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F38BF0 mov eax, dword ptr fs:[00000030h]3_2_02F38BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F38BF0 mov eax, dword ptr fs:[00000030h]3_2_02F38BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5EBFC mov eax, dword ptr fs:[00000030h]3_2_02F5EBFC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FBCBF0 mov eax, dword ptr fs:[00000030h]3_2_02FBCBF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FDEBD0 mov eax, dword ptr fs:[00000030h]3_2_02FDEBD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F50BCB mov eax, dword ptr fs:[00000030h]3_2_02F50BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F50BCB mov eax, dword ptr fs:[00000030h]3_2_02F50BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F50BCB mov eax, dword ptr fs:[00000030h]3_2_02F50BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F30BCD mov eax, dword ptr fs:[00000030h]3_2_02F30BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F30BCD mov eax, dword ptr fs:[00000030h]3_2_02F30BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F30BCD mov eax, dword ptr fs:[00000030h]3_2_02F30BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F40BBE mov eax, dword ptr fs:[00000030h]3_2_02F40BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F40BBE mov eax, dword ptr fs:[00000030h]3_2_02F40BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03004A80 mov eax, dword ptr fs:[00000030h]3_2_03004A80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F2CB7E mov eax, dword ptr fs:[00000030h]3_2_02F2CB7E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FDEB50 mov eax, dword ptr fs:[00000030h]3_2_02FDEB50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FC6B40 mov eax, dword ptr fs:[00000030h]3_2_02FC6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FC6B40 mov eax, dword ptr fs:[00000030h]3_2_02FC6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FFAB40 mov eax, dword ptr fs:[00000030h]3_2_02FFAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FD8B42 mov eax, dword ptr fs:[00000030h]3_2_02FD8B42
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5EB20 mov eax, dword ptr fs:[00000030h]3_2_02F5EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5EB20 mov eax, dword ptr fs:[00000030h]3_2_02F5EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FF8B28 mov eax, dword ptr fs:[00000030h]3_2_02FF8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FF8B28 mov eax, dword ptr fs:[00000030h]3_2_02FF8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FAEB1D mov eax, dword ptr fs:[00000030h]3_2_02FAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FAEB1D mov eax, dword ptr fs:[00000030h]3_2_02FAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FAEB1D mov eax, dword ptr fs:[00000030h]3_2_02FAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FAEB1D mov eax, dword ptr fs:[00000030h]3_2_02FAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FAEB1D mov eax, dword ptr fs:[00000030h]3_2_02FAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FAEB1D mov eax, dword ptr fs:[00000030h]3_2_02FAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FAEB1D mov eax, dword ptr fs:[00000030h]3_2_02FAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FAEB1D mov eax, dword ptr fs:[00000030h]3_2_02FAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FAEB1D mov eax, dword ptr fs:[00000030h]3_2_02FAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6C8F9 mov eax, dword ptr fs:[00000030h]3_2_02F6C8F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6C8F9 mov eax, dword ptr fs:[00000030h]3_2_02F6C8F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FFA8E4 mov eax, dword ptr fs:[00000030h]3_2_02FFA8E4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F5E8C0 mov eax, dword ptr fs:[00000030h]3_2_02F5E8C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FBC89D mov eax, dword ptr fs:[00000030h]3_2_02FBC89D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F30887 mov eax, dword ptr fs:[00000030h]3_2_02F30887
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FBE872 mov eax, dword ptr fs:[00000030h]3_2_02FBE872
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FBE872 mov eax, dword ptr fs:[00000030h]3_2_02FBE872
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FC6870 mov eax, dword ptr fs:[00000030h]3_2_02FC6870
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FC6870 mov eax, dword ptr fs:[00000030h]3_2_02FC6870
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F60854 mov eax, dword ptr fs:[00000030h]3_2_02F60854
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F34859 mov eax, dword ptr fs:[00000030h]3_2_02F34859
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F34859 mov eax, dword ptr fs:[00000030h]3_2_02F34859
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F42840 mov ecx, dword ptr fs:[00000030h]3_2_02F42840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F52835 mov eax, dword ptr fs:[00000030h]3_2_02F52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F52835 mov eax, dword ptr fs:[00000030h]3_2_02F52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F52835 mov eax, dword ptr fs:[00000030h]3_2_02F52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F52835 mov ecx, dword ptr fs:[00000030h]3_2_02F52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F52835 mov eax, dword ptr fs:[00000030h]3_2_02F52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F52835 mov eax, dword ptr fs:[00000030h]3_2_02F52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F6A830 mov eax, dword ptr fs:[00000030h]3_2_02F6A830
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FD483A mov eax, dword ptr fs:[00000030h]3_2_02FD483A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FD483A mov eax, dword ptr fs:[00000030h]3_2_02FD483A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FBC810 mov eax, dword ptr fs:[00000030h]3_2_02FBC810
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F629F9 mov eax, dword ptr fs:[00000030h]3_2_02F629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F629F9 mov eax, dword ptr fs:[00000030h]3_2_02F629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FBE9E0 mov eax, dword ptr fs:[00000030h]3_2_02FBE9E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]3_2_02F3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]3_2_02F3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]3_2_02F3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]3_2_02F3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]3_2_02F3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]3_2_02F3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F649D0 mov eax, dword ptr fs:[00000030h]3_2_02F649D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FFA9D3 mov eax, dword ptr fs:[00000030h]3_2_02FFA9D3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FC69C0 mov eax, dword ptr fs:[00000030h]3_2_02FC69C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB89B3 mov esi, dword ptr fs:[00000030h]3_2_02FB89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB89B3 mov eax, dword ptr fs:[00000030h]3_2_02FB89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB89B3 mov eax, dword ptr fs:[00000030h]3_2_02FB89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F429A0 mov eax, dword ptr fs:[00000030h]3_2_02F429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F429A0 mov eax, dword ptr fs:[00000030h]3_2_02F429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F429A0 mov eax, dword ptr fs:[00000030h]3_2_02F429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F429A0 mov eax, dword ptr fs:[00000030h]3_2_02F429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F429A0 mov eax, dword ptr fs:[00000030h]3_2_02F429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F429A0 mov eax, dword ptr fs:[00000030h]3_2_02F429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F429A0 mov eax, dword ptr fs:[00000030h]3_2_02F429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F429A0 mov eax, dword ptr fs:[00000030h]3_2_02F429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F429A0 mov eax, dword ptr fs:[00000030h]3_2_02F429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F429A0 mov eax, dword ptr fs:[00000030h]3_2_02F429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F429A0 mov eax, dword ptr fs:[00000030h]3_2_02F429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F429A0 mov eax, dword ptr fs:[00000030h]3_2_02F429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F429A0 mov eax, dword ptr fs:[00000030h]3_2_02F429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F309AD mov eax, dword ptr fs:[00000030h]3_2_02F309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F309AD mov eax, dword ptr fs:[00000030h]3_2_02F309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FD4978 mov eax, dword ptr fs:[00000030h]3_2_02FD4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FD4978 mov eax, dword ptr fs:[00000030h]3_2_02FD4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FBC97C mov eax, dword ptr fs:[00000030h]3_2_02FBC97C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F56962 mov eax, dword ptr fs:[00000030h]3_2_02F56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F56962 mov eax, dword ptr fs:[00000030h]3_2_02F56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F56962 mov eax, dword ptr fs:[00000030h]3_2_02F56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F7096E mov eax, dword ptr fs:[00000030h]3_2_02F7096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F7096E mov edx, dword ptr fs:[00000030h]3_2_02F7096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F7096E mov eax, dword ptr fs:[00000030h]3_2_02F7096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB0946 mov eax, dword ptr fs:[00000030h]3_2_02FB0946
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FB892A mov eax, dword ptr fs:[00000030h]3_2_02FB892A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FC892B mov eax, dword ptr fs:[00000030h]3_2_02FC892B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FBC912 mov eax, dword ptr fs:[00000030h]3_2_02FBC912
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F28918 mov eax, dword ptr fs:[00000030h]3_2_02F28918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F28918 mov eax, dword ptr fs:[00000030h]3_2_02F28918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FAE908 mov eax, dword ptr fs:[00000030h]3_2_02FAE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FAE908 mov eax, dword ptr fs:[00000030h]3_2_02FAE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F68EF5 mov eax, dword ptr fs:[00000030h]3_2_02F68EF5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F36EE0 mov eax, dword ptr fs:[00000030h]3_2_02F36EE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F36EE0 mov eax, dword ptr fs:[00000030h]3_2_02F36EE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F36EE0 mov eax, dword ptr fs:[00000030h]3_2_02F36EE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F36EE0 mov eax, dword ptr fs:[00000030h]3_2_02F36EE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FCAEB0 mov eax, dword ptr fs:[00000030h]3_2_02FCAEB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FCAEB0 mov eax, dword ptr fs:[00000030h]3_2_02FCAEB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FBCEA0 mov eax, dword ptr fs:[00000030h]3_2_02FBCEA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FBCEA0 mov eax, dword ptr fs:[00000030h]3_2_02FBCEA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02FBCEA0 mov eax, dword ptr fs:[00000030h]3_2_02FBCEA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F2AE90 mov eax, dword ptr fs:[00000030h]3_2_02F2AE90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F2AE90 mov eax, dword ptr fs:[00000030h]3_2_02F2AE90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_02F2AE90 mov eax, dword ptr fs:[00000030h]3_2_02F2AE90
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FFA66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00FFA66C
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FE81AC SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00FE81AC
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FE8189 SetUnhandledExceptionFilter,0_2_00FE8189

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\NRFQFP.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\NRFQFP.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 252C008Jump to behavior
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FFB106 LogonUserW,0_2_00FFB106
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FC3D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00FC3D19
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_0100411C SendInput,keybd_event,0_2_0100411C
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_01007513 mouse_event,0_2_01007513
          Source: C:\Users\user\Desktop\NRFQFP.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\NRFQFP.exe"Jump to behavior
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FFA66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00FFA66C
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_010071FA AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_010071FA
          Source: NRFQFP.exeBinary or memory string: Shell_TrayWnd
          Source: NRFQFP.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndTHISREMOVEblankinfoquestionstopwarning
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FE65C4 cpuid 0_2_00FE65C4
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_0101091D GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,__wsplitpath,_wcscat,_wcscat,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,_wcscpy,SetCurrentDirectoryW,0_2_0101091D
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_0103B340 GetUserNameW,0_2_0103B340
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FF1E8E __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00FF1E8E
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_00FDDDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00FDDDC0

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 3.2.svchost.exe.2b0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.svchost.exe.2b0000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.1530564387.00000000002B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.1530811604.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: NRFQFP.exeBinary or memory string: WIN_81
          Source: NRFQFP.exeBinary or memory string: WIN_XP
          Source: NRFQFP.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 12, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubytep
          Source: NRFQFP.exeBinary or memory string: WIN_XPe
          Source: NRFQFP.exeBinary or memory string: WIN_VISTA
          Source: NRFQFP.exeBinary or memory string: WIN_7
          Source: NRFQFP.exeBinary or memory string: WIN_8

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 3.2.svchost.exe.2b0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.svchost.exe.2b0000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.1530564387.00000000002B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.1530811604.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_01018C4F socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_01018C4F
          Source: C:\Users\user\Desktop\NRFQFP.exeCode function: 0_2_0101923B socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_0101923B
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure2
          Valid Accounts
          3
          Native API
          2
          Valid Accounts
          2
          Valid Accounts
          2
          Valid Accounts
          11
          Input Capture
          2
          System Time Discovery
          Remote Services11
          Input Capture
          1
          Encrypted Channel
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          DLL Side-Loading
          1
          Exploitation for Privilege Escalation
          1
          Disable or Modify Tools
          LSASS Memory15
          Security Software Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          1
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)21
          Access Token Manipulation
          2
          Virtualization/Sandbox Evasion
          Security Account Manager2
          Virtualization/Sandbox Evasion
          SMB/Windows Admin Shares3
          Clipboard Data
          SteganographyAutomated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook212
          Process Injection
          21
          Access Token Manipulation
          NTDS3
          Process Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
          DLL Side-Loading
          212
          Process Injection
          LSA Secrets1
          Application Window Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Deobfuscate/Decode Files or Information
          Cached Domain Credentials1
          Account Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
          Obfuscated Files or Information
          DCSync1
          System Owner/User Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          DLL Side-Loading
          Proc Filesystem1
          File and Directory Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow115
          System Information Discovery
          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          NRFQFP.exe34%ReversingLabsWin32.Trojan.AutoitInject
          NRFQFP.exe35%VirustotalBrowse
          NRFQFP.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No contacted domains info
          No contacted IP infos
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1559974
          Start date and time:2024-11-21 08:57:07 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 6m 30s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:13
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:NRFQFP.exe
          Detection:MAL
          Classification:mal84.troj.evad.winEXE@3/2@0/0
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 98%
          • Number of executed functions: 51
          • Number of non-executed functions: 293
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
          • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size exceeded maximum capacity and may have missing disassembly code.
          TimeTypeDescription
          04:02:27API Interceptor3x Sleep call for process: svchost.exe modified
          No context
          No context
          No context
          No context
          No context
          Process:C:\Users\user\Desktop\NRFQFP.exe
          File Type:data
          Category:dropped
          Size (bytes):288256
          Entropy (8bit):7.995151439528424
          Encrypted:true
          SSDEEP:6144:UQemcuyW5kMsU2K/JX7o3ADT77f9NyPRPhEiP7/zMey/B1e2hroq9J0/Yc:Uf7xwkk2K/Jc3ADTn/yPRPFTI/LecrNG
          MD5:8C0617933EFB72F7F3F65B0938865002
          SHA1:CAB711566819786E6D07A60F8277B265FBB74155
          SHA-256:AF60C22A76662C0CA015BBEDFB44076900D71F55E21404405ECF831846329EC9
          SHA-512:28302A4545F86BF5E499860480A317EF94EF32C62055E64E0E80B0EA1324C3B60518F174ECEB6C0E17905CD8924ECC9C335E200D65A89428F7AFA6FB7511E7E7
          Malicious:false
          Reputation:low
          Preview:.n.BB83K5SKW.TZ.38LX9S4r4LBA83K1SKW1FTZP38LX9S424LBA83K1SKW.FTZ^,.BX.Z...M...g#X k'C)3(1^./9W=[F..'aJF%.:%wu..z=\\)v4^>.4LBA83KHRB..&3.mS_.eY4.(..{XT.+...&3.J...dY4.`]/*|XT.1SKW1FTZ.v8L.8R4..S.A83K1SKW.FV[[23LXmW424LBA83KQGKW1VTZPC<LX9.42$LBA:3K7SKW1FTZV38LX9S42DHBA:3K1SKW3F..P3(LX)S424\BA(3K1SKW!FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S4.@):583K5.OW1VTZPg<LX)S424LBA83K1SKW.FT:P38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZ
          Process:C:\Users\user\Desktop\NRFQFP.exe
          File Type:data
          Category:modified
          Size (bytes):288256
          Entropy (8bit):7.995151439528424
          Encrypted:true
          SSDEEP:6144:UQemcuyW5kMsU2K/JX7o3ADT77f9NyPRPhEiP7/zMey/B1e2hroq9J0/Yc:Uf7xwkk2K/Jc3ADTn/yPRPFTI/LecrNG
          MD5:8C0617933EFB72F7F3F65B0938865002
          SHA1:CAB711566819786E6D07A60F8277B265FBB74155
          SHA-256:AF60C22A76662C0CA015BBEDFB44076900D71F55E21404405ECF831846329EC9
          SHA-512:28302A4545F86BF5E499860480A317EF94EF32C62055E64E0E80B0EA1324C3B60518F174ECEB6C0E17905CD8924ECC9C335E200D65A89428F7AFA6FB7511E7E7
          Malicious:false
          Reputation:low
          Preview:.n.BB83K5SKW.TZ.38LX9S4r4LBA83K1SKW1FTZP38LX9S424LBA83K1SKW.FTZ^,.BX.Z...M...g#X k'C)3(1^./9W=[F..'aJF%.:%wu..z=\\)v4^>.4LBA83KHRB..&3.mS_.eY4.(..{XT.+...&3.J...dY4.`]/*|XT.1SKW1FTZ.v8L.8R4..S.A83K1SKW.FV[[23LXmW424LBA83KQGKW1VTZPC<LX9.42$LBA:3K7SKW1FTZV38LX9S42DHBA:3K1SKW3F..P3(LX)S424\BA(3K1SKW!FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S4.@):583K5.OW1VTZPg<LX)S424LBA83K1SKW.FT:P38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZP38LX9S424LBA83K1SKW1FTZ
          File type:PE32 executable (GUI) Intel 80386, for MS Windows
          Entropy (8bit):7.145851449469695
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.96%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:NRFQFP.exe
          File size:1'212'928 bytes
          MD5:1a911551867098e14d09eba0f3230e20
          SHA1:505baedb0168073fd5f67637a8409b1bab84e2c4
          SHA256:7925886f109959a6344123901123559f304a400dc2a2d3768d9fbe42d7d8305c
          SHA512:fae4e0905641179b32ba73af7071b2ced7ba24bc5ea0f46ea30de04c84cff5d88eb7c6f54d24fe17b4668e51cc439b9c79a6789c33bf874cfce4cfc9cb09373c
          SSDEEP:24576:etb20pkaCqT5TBWgNQ7a1h61Yb6eQdBVfz/Ib06A:LVg5tQ7a1hhbOdBVfz/IY5
          TLSH:0C45C01373DD8361C3725273BA25BB01BEBF782506A5F96B2FD8093DE920122525E673
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d..............'.a.....H.k.....H.h.....H.i......}%......}5...............~.......k.......o.......1.......j.....Rich...........
          Icon Hash:aaf3e3e3938382a0
          Entrypoint:0x425f74
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
          Time Stamp:0x673E8334 [Thu Nov 21 00:47:48 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:5
          OS Version Minor:1
          File Version Major:5
          File Version Minor:1
          Subsystem Version Major:5
          Subsystem Version Minor:1
          Import Hash:3d95adbf13bbe79dc24dccb401c12091
          Instruction
          call 00007F9290D62C2Fh
          jmp 00007F9290D55C44h
          int3
          int3
          push edi
          push esi
          mov esi, dword ptr [esp+10h]
          mov ecx, dword ptr [esp+14h]
          mov edi, dword ptr [esp+0Ch]
          mov eax, ecx
          mov edx, ecx
          add eax, esi
          cmp edi, esi
          jbe 00007F9290D55DCAh
          cmp edi, eax
          jc 00007F9290D5612Eh
          bt dword ptr [004C0158h], 01h
          jnc 00007F9290D55DC9h
          rep movsb
          jmp 00007F9290D560DCh
          cmp ecx, 00000080h
          jc 00007F9290D55F94h
          mov eax, edi
          xor eax, esi
          test eax, 0000000Fh
          jne 00007F9290D55DD0h
          bt dword ptr [004BA370h], 01h
          jc 00007F9290D562A0h
          bt dword ptr [004C0158h], 00000000h
          jnc 00007F9290D55F6Dh
          test edi, 00000003h
          jne 00007F9290D55F7Eh
          test esi, 00000003h
          jne 00007F9290D55F5Dh
          bt edi, 02h
          jnc 00007F9290D55DCFh
          mov eax, dword ptr [esi]
          sub ecx, 04h
          lea esi, dword ptr [esi+04h]
          mov dword ptr [edi], eax
          lea edi, dword ptr [edi+04h]
          bt edi, 03h
          jnc 00007F9290D55DD3h
          movq xmm1, qword ptr [esi]
          sub ecx, 08h
          lea esi, dword ptr [esi+08h]
          movq qword ptr [edi], xmm1
          lea edi, dword ptr [edi+08h]
          test esi, 00000007h
          je 00007F9290D55E25h
          bt esi, 03h
          jnc 00007F9290D55E78h
          movdqa xmm1, dqword ptr [esi+00h]
          Programming Language:
          • [ C ] VS2008 SP1 build 30729
          • [IMP] VS2008 SP1 build 30729
          • [ASM] VS2012 UPD4 build 61030
          • [RES] VS2012 UPD4 build 61030
          • [LNK] VS2012 UPD4 build 61030
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0xb70040x17c.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0xc40000x5f0c8.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x1240000x6c4c.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x8d8d00x1c.rdata
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb27300x40.rdata
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x8d0000x860.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x8b54f0x8b600f437a6545e938612764dbb0a314376fcFalse0.5699499019058296data6.680413749210956IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x8d0000x2cc420x2ce00827ffd24759e8e420890ecf164be989eFalse0.330464397632312data5.770192333189168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0xba0000x9d540x6200e0a519f8e3a35fae0d9c2cfd5a4bacfcFalse0.16402264030612246data2.002691099965349IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0xc40000x5f0c80x5f2007e364056e08ee27b72b075ada2fe679fFalse0.9308321698423128data7.9012605715517195IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x1240000xa4740xa6000bc98f8631ef0bde830a7f83bb06ff08False0.5017884036144579data5.245426654116355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_ICON0xc45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
          RT_ICON0xc46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
          RT_ICON0xc47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
          RT_ICON0xc49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
          RT_ICON0xc4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
          RT_ICON0xc4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
          RT_ICON0xc5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
          RT_ICON0xc64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
          RT_ICON0xc69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
          RT_ICON0xc8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
          RT_ICON0xca0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
          RT_MENU0xca4a00x50dataEnglishGreat Britain0.9
          RT_STRING0xca4f00x594dataEnglishGreat Britain0.3333333333333333
          RT_STRING0xcaa840x68adataEnglishGreat Britain0.2747909199522103
          RT_STRING0xcb1100x490dataEnglishGreat Britain0.3715753424657534
          RT_STRING0xcb5a00x5fcdataEnglishGreat Britain0.3087467362924282
          RT_STRING0xcbb9c0x65cdataEnglishGreat Britain0.34336609336609336
          RT_STRING0xcc1f80x466dataEnglishGreat Britain0.3605683836589698
          RT_STRING0xcc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
          RT_RCDATA0xcc7b80x563cddata1.0003283988573985
          RT_GROUP_ICON0x122b880x76dataEnglishGreat Britain0.6610169491525424
          RT_GROUP_ICON0x122c000x14dataEnglishGreat Britain1.25
          RT_GROUP_ICON0x122c140x14dataEnglishGreat Britain1.15
          RT_GROUP_ICON0x122c280x14dataEnglishGreat Britain1.25
          RT_VERSION0x122c3c0xdcdataEnglishGreat Britain0.6181818181818182
          RT_MANIFEST0x122d180x3b0ASCII text, with CRLF line terminatorsEnglishGreat Britain0.5116525423728814
          DLLImport
          WSOCK32.dll__WSAFDIsSet, recv, send, setsockopt, ntohs, recvfrom, select, WSAStartup, htons, accept, listen, bind, closesocket, connect, WSACleanup, ioctlsocket, sendto, WSAGetLastError, inet_addr, gethostbyname, gethostname, socket
          VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
          COMCTL32.dllImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_Create, InitCommonControlsEx, ImageList_ReplaceIcon
          MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
          WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetConnectW, InternetQueryDataAvailable
          PSAPI.DLLGetProcessMemoryInfo
          IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
          USERENV.dllUnloadUserProfile, DestroyEnvironmentBlock, CreateEnvironmentBlock, LoadUserProfileW
          UxTheme.dllIsThemeActive
          KERNEL32.dllHeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetCurrentThread, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, DeleteCriticalSection, WaitForSingleObject, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, CloseHandle, GetLastError, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, RaiseException, InitializeCriticalSectionAndSpinCount, InterlockedDecrement, InterlockedIncrement, CreateThread, DuplicateHandle, EnterCriticalSection, GetCurrentProcess, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, HeapSize, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, SetFilePointer, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, HeapReAlloc, WriteConsoleW, SetEndOfFile, DeleteFileW, SetEnvironmentVariableA
          USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, DrawMenuBar, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, MonitorFromRect, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, CopyImage, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, UnregisterHotKey, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, DeleteMenu, PeekMessageW, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, CharLowerBuffW, GetWindowTextW
          GDI32.dllSetPixel, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, GetDeviceCaps, CloseFigure, LineTo, AngleArc, CreateCompatibleBitmap, CreateCompatibleDC, MoveToEx, Ellipse, PolyDraw, BeginPath, SelectObject, StretchBlt, GetDIBits, DeleteDC, GetPixel, CreateDCW, GetStockObject, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, EndPath
          COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
          ADVAPI32.dllGetAclInformation, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, InitiateSystemShutdownExW, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, SetSecurityDescriptorDacl, AddAce, GetAce
          SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
          ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
          OLEAUT32.dllRegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, UnRegisterTypeLib, SafeArrayCreateVector, SysAllocString, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, QueryPathOfRegTypeLib, VariantCopy, VariantClear, CreateDispTypeInfo, CreateStdDispatch, DispCallFunc, VariantChangeType, SafeArrayAllocDescriptorEx, VariantInit
          Language of compilation systemCountry where language is spokenMap
          EnglishGreat Britain
          No network behavior found

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:02:58:03
          Start date:21/11/2024
          Path:C:\Users\user\Desktop\NRFQFP.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\NRFQFP.exe"
          Imagebase:0xfc0000
          File size:1'212'928 bytes
          MD5 hash:1A911551867098E14D09EBA0F3230E20
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:3
          Start time:02:58:04
          Start date:21/11/2024
          Path:C:\Windows\SysWOW64\svchost.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\NRFQFP.exe"
          Imagebase:0x340000
          File size:46'504 bytes
          MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.1530564387.00000000002B0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.1530811604.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
          Reputation:high
          Has exited:true

          Reset < >

            Execution Graph

            Execution Coverage:3.8%
            Dynamic/Decrypted Code Coverage:0.3%
            Signature Coverage:10.8%
            Total number of Nodes:2000
            Total number of Limit Nodes:165
            execution_graph 93969 fe5dfd 93970 fe5e09 __setmbcp 93969->93970 94006 fe7eeb GetStartupInfoW 93970->94006 93972 fe5e0e 94008 fe9ca7 GetProcessHeap 93972->94008 93974 fe5e66 93975 fe5e71 93974->93975 94093 fe5f4d 47 API calls 3 library calls 93974->94093 94009 fe7b47 93975->94009 93978 fe5e77 93979 fe5e82 __RTC_Initialize 93978->93979 94094 fe5f4d 47 API calls 3 library calls 93978->94094 94030 feacb3 93979->94030 93982 fe5e91 93983 fe5e9d GetCommandLineW 93982->93983 94095 fe5f4d 47 API calls 3 library calls 93982->94095 94049 ff2e7d GetEnvironmentStringsW 93983->94049 93986 fe5e9c 93986->93983 93990 fe5ec2 94062 ff2cb4 93990->94062 93993 fe5ec8 93994 fe5ed3 93993->93994 94097 fe115b 47 API calls 3 library calls 93993->94097 94076 fe1195 93994->94076 93997 fe5edb 93998 fe5ee6 __wwincmdln 93997->93998 94098 fe115b 47 API calls 3 library calls 93997->94098 94080 fc3a0f 93998->94080 94001 fe5efa 94002 fe5f09 94001->94002 94099 fe13f1 47 API calls _doexit 94001->94099 94100 fe1186 47 API calls _doexit 94002->94100 94005 fe5f0e __setmbcp 94007 fe7f01 94006->94007 94007->93972 94008->93974 94101 fe123a 30 API calls 2 library calls 94009->94101 94011 fe7b4c 94102 fe7e23 InitializeCriticalSectionAndSpinCount 94011->94102 94013 fe7b51 94014 fe7b55 94013->94014 94104 fe7e6d TlsAlloc 94013->94104 94103 fe7bbd 50 API calls 2 library calls 94014->94103 94017 fe7b5a 94017->93978 94018 fe7b67 94018->94014 94019 fe7b72 94018->94019 94105 fe6986 94019->94105 94022 fe7bb4 94113 fe7bbd 50 API calls 2 library calls 94022->94113 94025 fe7bb9 94025->93978 94026 fe7b93 94026->94022 94027 fe7b99 94026->94027 94112 fe7a94 47 API calls 4 library calls 94027->94112 94029 fe7ba1 GetCurrentThreadId 94029->93978 94031 feacbf __setmbcp 94030->94031 94122 fe7cf4 94031->94122 94033 feacc6 94034 fe6986 __calloc_crt 47 API calls 94033->94034 94036 feacd7 94034->94036 94035 fead42 GetStartupInfoW 94044 feae80 94035->94044 94045 fead57 94035->94045 94036->94035 94037 feace2 @_EH4_CallFilterFunc@8 __setmbcp 94036->94037 94037->93982 94038 feaf44 94129 feaf58 LeaveCriticalSection _doexit 94038->94129 94040 feaec9 GetStdHandle 94040->94044 94041 fe6986 __calloc_crt 47 API calls 94041->94045 94042 feaedb GetFileType 94042->94044 94043 feada5 94043->94044 94047 feadd7 GetFileType 94043->94047 94048 feade5 InitializeCriticalSectionAndSpinCount 94043->94048 94044->94038 94044->94040 94044->94042 94046 feaf08 InitializeCriticalSectionAndSpinCount 94044->94046 94045->94041 94045->94043 94045->94044 94046->94044 94047->94043 94047->94048 94048->94043 94050 fe5ead 94049->94050 94052 ff2e8e 94049->94052 94056 ff2a7b GetModuleFileNameW 94050->94056 94168 fe69d0 47 API calls __crtLCMapStringA_stat 94052->94168 94054 ff2eb4 ___crtGetEnvironmentStringsW 94055 ff2eca FreeEnvironmentStringsW 94054->94055 94055->94050 94057 ff2aaf _wparse_cmdline 94056->94057 94058 fe5eb7 94057->94058 94059 ff2ae9 94057->94059 94058->93990 94096 fe115b 47 API calls 3 library calls 94058->94096 94169 fe69d0 47 API calls __crtLCMapStringA_stat 94059->94169 94061 ff2aef _wparse_cmdline 94061->94058 94063 ff2cc5 94062->94063 94064 ff2ccd __wsetenvp 94062->94064 94063->93993 94065 fe6986 __calloc_crt 47 API calls 94064->94065 94068 ff2cf6 __wsetenvp 94065->94068 94066 ff2d4d 94067 fe1c9d _free 47 API calls 94066->94067 94067->94063 94068->94063 94068->94066 94069 fe6986 __calloc_crt 47 API calls 94068->94069 94070 ff2d72 94068->94070 94073 ff2d89 94068->94073 94170 ff2567 47 API calls __wcsnicmp 94068->94170 94069->94068 94072 fe1c9d _free 47 API calls 94070->94072 94072->94063 94171 fe6e20 IsProcessorFeaturePresent 94073->94171 94075 ff2d95 94075->93993 94077 fe11a1 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 94076->94077 94079 fe11e0 __IsNonwritableInCurrentImage 94077->94079 94194 fe0f0a 52 API calls __cinit 94077->94194 94079->93997 94081 1031ebf 94080->94081 94082 fc3a29 94080->94082 94083 fc3a63 IsThemeActive 94082->94083 94195 fe1405 94083->94195 94087 fc3a8f 94207 fc3adb SystemParametersInfoW SystemParametersInfoW 94087->94207 94089 fc3a9b 94208 fc3d19 94089->94208 94091 fc3aa3 SystemParametersInfoW 94092 fc3ac8 94091->94092 94092->94001 94093->93975 94094->93979 94095->93986 94099->94002 94100->94005 94101->94011 94102->94013 94103->94017 94104->94018 94108 fe698d 94105->94108 94107 fe69ca 94107->94022 94111 fe7ec9 TlsSetValue 94107->94111 94108->94107 94109 fe69ab Sleep 94108->94109 94114 ff30aa 94108->94114 94110 fe69c2 94109->94110 94110->94107 94110->94108 94111->94026 94112->94029 94113->94025 94115 ff30b5 94114->94115 94120 ff30d0 __calloc_impl 94114->94120 94116 ff30c1 94115->94116 94115->94120 94121 fe7c0e 47 API calls __getptd_noexit 94116->94121 94118 ff30e0 HeapAlloc 94119 ff30c6 94118->94119 94118->94120 94119->94108 94120->94118 94120->94119 94121->94119 94123 fe7d18 EnterCriticalSection 94122->94123 94124 fe7d05 94122->94124 94123->94033 94130 fe7d7c 94124->94130 94126 fe7d0b 94126->94123 94154 fe115b 47 API calls 3 library calls 94126->94154 94129->94037 94131 fe7d88 __setmbcp 94130->94131 94132 fe7da9 94131->94132 94133 fe7d91 94131->94133 94138 fe7e11 __setmbcp 94132->94138 94148 fe7da7 94132->94148 94155 fe81c2 47 API calls __NMSG_WRITE 94133->94155 94135 fe7d96 94156 fe821f 47 API calls 7 library calls 94135->94156 94138->94126 94139 fe7dbd 94141 fe7dc4 94139->94141 94142 fe7dd3 94139->94142 94140 fe7d9d 94157 fe1145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 94140->94157 94159 fe7c0e 47 API calls __getptd_noexit 94141->94159 94143 fe7cf4 __lock 46 API calls 94142->94143 94147 fe7dda 94143->94147 94146 fe7dc9 94146->94138 94149 fe7dfe 94147->94149 94150 fe7de9 InitializeCriticalSectionAndSpinCount 94147->94150 94148->94132 94158 fe69d0 47 API calls __crtLCMapStringA_stat 94148->94158 94160 fe1c9d 94149->94160 94151 fe7e04 94150->94151 94166 fe7e1a LeaveCriticalSection _doexit 94151->94166 94155->94135 94156->94140 94158->94139 94159->94146 94161 fe1ca6 RtlFreeHeap 94160->94161 94162 fe1ccf __dosmaperr 94160->94162 94161->94162 94163 fe1cbb 94161->94163 94162->94151 94167 fe7c0e 47 API calls __getptd_noexit 94163->94167 94165 fe1cc1 GetLastError 94165->94162 94166->94138 94167->94165 94168->94054 94169->94061 94170->94068 94172 fe6e2b 94171->94172 94177 fe6cb5 94172->94177 94176 fe6e46 94176->94075 94178 fe6ccf _memset ___raise_securityfailure 94177->94178 94179 fe6cef IsDebuggerPresent 94178->94179 94185 fe81ac SetUnhandledExceptionFilter UnhandledExceptionFilter 94179->94185 94182 fe6dd6 94184 fe8197 GetCurrentProcess TerminateProcess 94182->94184 94183 fe6db3 ___raise_securityfailure 94186 fea70c 94183->94186 94184->94176 94185->94183 94187 fea716 IsProcessorFeaturePresent 94186->94187 94188 fea714 94186->94188 94190 ff37b0 94187->94190 94188->94182 94193 ff375f 5 API calls 2 library calls 94190->94193 94192 ff3893 94192->94182 94193->94192 94194->94079 94196 fe7cf4 __lock 47 API calls 94195->94196 94197 fe1410 94196->94197 94260 fe7e58 LeaveCriticalSection 94197->94260 94199 fc3a88 94200 fe146d 94199->94200 94201 fe1477 94200->94201 94202 fe1491 94200->94202 94201->94202 94261 fe7c0e 47 API calls __getptd_noexit 94201->94261 94202->94087 94204 fe1481 94262 fe6e10 8 API calls __wcsnicmp 94204->94262 94206 fe148c 94206->94087 94207->94089 94209 fc3d26 __ftell_nolock 94208->94209 94263 fcd7f7 94209->94263 94213 fc3d57 IsDebuggerPresent 94214 1031cc1 MessageBoxA 94213->94214 94215 fc3d65 94213->94215 94218 1031cd9 94214->94218 94216 fc3e3a 94215->94216 94215->94218 94219 fc3d82 94215->94219 94217 fc3e41 SetCurrentDirectoryW 94216->94217 94220 fc3e4e Mailbox 94217->94220 94465 fdc682 48 API calls 94218->94465 94342 fc40e5 94219->94342 94220->94091 94224 1031ce9 94228 1031cff SetCurrentDirectoryW 94224->94228 94225 fc3da0 GetFullPathNameW 94358 fc6a63 94225->94358 94227 fc3ddb 94369 fc6430 94227->94369 94228->94220 94231 fc3df6 94232 fc3e00 94231->94232 94466 10071fa AllocateAndInitializeSid CheckTokenMembership FreeSid 94231->94466 94385 fc3e6e GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 94232->94385 94235 1031d1c 94235->94232 94238 1031d2d 94235->94238 94467 fc5374 94238->94467 94239 fc3e0a 94241 fc3e1f 94239->94241 94393 fc4ffc 94239->94393 94403 fce8d0 94241->94403 94242 1031d35 94474 fcce19 94242->94474 94247 1031d42 94249 1031d49 94247->94249 94250 1031d6e 94247->94250 94480 fc518c 94249->94480 94251 fc518c 48 API calls 94250->94251 94253 1031d6a GetForegroundWindow ShellExecuteW 94251->94253 94258 1031d9e Mailbox 94253->94258 94258->94216 94260->94199 94261->94204 94262->94206 94499 fdf4ea 94263->94499 94265 fcd818 94266 fdf4ea 48 API calls 94265->94266 94267 fc3d31 GetCurrentDirectoryW 94266->94267 94268 fc61ca 94267->94268 94530 fde99b 94268->94530 94272 fc61eb 94273 fc5374 50 API calls 94272->94273 94274 fc61ff 94273->94274 94275 fcce19 48 API calls 94274->94275 94276 fc620c 94275->94276 94547 fc39db 94276->94547 94278 fc6216 Mailbox 94559 fc6eed 94278->94559 94283 fcce19 48 API calls 94284 fc6244 94283->94284 94566 fcd6e9 94284->94566 94286 fc6254 Mailbox 94287 fcce19 48 API calls 94286->94287 94288 fc627c 94287->94288 94289 fcd6e9 55 API calls 94288->94289 94290 fc628f Mailbox 94289->94290 94291 fcce19 48 API calls 94290->94291 94292 fc62a0 94291->94292 94570 fcd645 94292->94570 94294 fc62b2 Mailbox 94295 fcd7f7 48 API calls 94294->94295 94296 fc62c5 94295->94296 94580 fc63fc 94296->94580 94300 fc62df 94301 fc62e9 94300->94301 94302 1031c08 94300->94302 94304 fe0fa7 _W_store_winword 59 API calls 94301->94304 94303 fc63fc 48 API calls 94302->94303 94305 1031c1c 94303->94305 94306 fc62f4 94304->94306 94309 fc63fc 48 API calls 94305->94309 94306->94305 94307 fc62fe 94306->94307 94308 fe0fa7 _W_store_winword 59 API calls 94307->94308 94310 fc6309 94308->94310 94311 1031c38 94309->94311 94310->94311 94312 fc6313 94310->94312 94314 fc5374 50 API calls 94311->94314 94313 fe0fa7 _W_store_winword 59 API calls 94312->94313 94315 fc631e 94313->94315 94316 1031c5d 94314->94316 94318 fc635f 94315->94318 94320 1031c86 94315->94320 94323 fc63fc 48 API calls 94315->94323 94317 fc63fc 48 API calls 94316->94317 94319 1031c69 94317->94319 94318->94320 94321 fc636c 94318->94321 94322 fc6eed 48 API calls 94319->94322 94324 fc6eed 48 API calls 94320->94324 94596 fdc050 94321->94596 94326 1031c77 94322->94326 94327 fc6342 94323->94327 94328 1031ca8 94324->94328 94330 fc63fc 48 API calls 94326->94330 94331 fc6eed 48 API calls 94327->94331 94332 fc63fc 48 API calls 94328->94332 94329 fc6384 94607 fd1b90 94329->94607 94330->94320 94334 fc6350 94331->94334 94335 1031cb5 94332->94335 94336 fc63fc 48 API calls 94334->94336 94335->94335 94336->94318 94337 fd1b90 48 API calls 94339 fc6394 94337->94339 94339->94337 94340 fc63fc 48 API calls 94339->94340 94341 fc63d6 Mailbox 94339->94341 94623 fc6b68 48 API calls 94339->94623 94340->94339 94341->94213 94343 fc40f2 __ftell_nolock 94342->94343 94344 fc410b 94343->94344 94345 103370e _memset 94343->94345 95178 fc660f 94344->95178 94348 103372a GetOpenFileNameW 94345->94348 94350 1033779 94348->94350 94352 fc6a63 48 API calls 94350->94352 94354 103378e 94352->94354 94354->94354 94355 fc4129 95203 fc4139 94355->95203 94359 fc6adf 94358->94359 94360 fc6a6f __wsetenvp 94358->94360 94361 fcb18b 48 API calls 94359->94361 94362 fc6a8b 94360->94362 94363 fc6ad7 94360->94363 94367 fc6ab6 ___crtGetEnvironmentStringsW 94361->94367 95423 fc6b4a 94362->95423 95426 fcc369 48 API calls 94363->95426 94366 fc6a95 94368 fdee75 48 API calls 94366->94368 94367->94227 94368->94367 94370 fc643d __ftell_nolock 94369->94370 95427 fc4c75 94370->95427 94372 fc6442 94373 fc3dee 94372->94373 95438 fc5928 86 API calls 94372->95438 94373->94224 94373->94231 94375 fc644f 94375->94373 95439 fc5798 88 API calls Mailbox 94375->95439 94377 fc6458 94377->94373 94378 fc645c GetFullPathNameW 94377->94378 94379 fc6a63 48 API calls 94378->94379 94380 fc6488 94379->94380 94381 fc6a63 48 API calls 94380->94381 94382 fc6495 94381->94382 94383 1035dcf _wcscat 94382->94383 94384 fc6a63 48 API calls 94382->94384 94384->94373 94386 fc3ed8 94385->94386 94387 1031cba 94385->94387 95493 fc4024 94386->95493 94391 fc3e05 94392 fc36b8 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 94391->94392 94392->94239 94394 fc5027 _memset 94393->94394 95498 fc4c30 94394->95498 94397 fc50ac 94399 fc50ca Shell_NotifyIconW 94397->94399 94400 1033d28 Shell_NotifyIconW 94397->94400 95502 fc51af 94399->95502 94402 fc50df 94402->94241 94404 fce8f6 94403->94404 94463 fce906 Mailbox 94403->94463 94405 fced52 94404->94405 94404->94463 95697 fde3cd 335 API calls 94405->95697 94406 100cc5c 86 API calls 94406->94463 94408 fc3e2a 94408->94216 94464 fc3847 Shell_NotifyIconW _memset 94408->94464 94410 fced63 94410->94408 94412 fced70 94410->94412 94411 fce94c PeekMessageW 94411->94463 95699 fde312 335 API calls Mailbox 94412->95699 94414 fced77 LockWindowUpdate DestroyWindow GetMessageW 94414->94408 94417 fceda9 94414->94417 94415 103526e Sleep 94415->94463 94419 10359ef TranslateMessage DispatchMessageW GetMessageW 94417->94419 94418 fcebc7 94418->94408 95698 fc2ff6 16 API calls 94418->95698 94419->94419 94421 1035a1f 94419->94421 94421->94408 94422 fced21 PeekMessageW 94422->94463 94423 fc1caa 49 API calls 94423->94463 94424 fcebf7 timeGetTime 94424->94463 94426 fdf4ea 48 API calls 94426->94463 94427 fc6eed 48 API calls 94427->94463 94428 fced3a TranslateMessage DispatchMessageW 94428->94422 94429 1035557 WaitForSingleObject 94430 1035574 GetExitCodeProcess CloseHandle 94429->94430 94429->94463 94430->94463 94431 fcd7f7 48 API calls 94458 1035429 Mailbox 94431->94458 94432 103588f Sleep 94432->94458 94433 fcedae timeGetTime 95700 fc1caa 49 API calls 94433->95700 94436 1035733 Sleep 94436->94458 94438 1035926 GetExitCodeProcess 94443 1035952 CloseHandle 94438->94443 94444 103593c WaitForSingleObject 94438->94444 94440 fc2aae 311 API calls 94440->94463 94441 fddc38 timeGetTime 94441->94458 94442 1035445 Sleep 94442->94463 94443->94458 94444->94443 94444->94463 94445 1035432 Sleep 94445->94442 94446 1028c4b 108 API calls 94446->94458 94447 fc2c79 107 API calls 94447->94458 94449 10359ae Sleep 94449->94463 94451 fcce19 48 API calls 94451->94458 94455 fcd6e9 55 API calls 94455->94458 94458->94431 94458->94438 94458->94441 94458->94442 94458->94445 94458->94446 94458->94447 94458->94449 94458->94451 94458->94455 94458->94463 95702 1004cbe 49 API calls Mailbox 94458->95702 95703 fc1caa 49 API calls 94458->95703 95704 fc2aae 335 API calls 94458->95704 95734 101ccb2 50 API calls 94458->95734 95735 1007a58 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 94458->95735 95736 1006532 63 API calls 3 library calls 94458->95736 94461 fcd6e9 55 API calls 94461->94463 94462 fcce19 48 API calls 94462->94463 94463->94406 94463->94411 94463->94415 94463->94418 94463->94422 94463->94423 94463->94424 94463->94426 94463->94427 94463->94428 94463->94429 94463->94432 94463->94433 94463->94436 94463->94440 94463->94442 94463->94458 94463->94461 94463->94462 95525 fcef00 94463->95525 95532 fcf110 94463->95532 95597 fd45e0 94463->95597 95614 fde244 94463->95614 95619 fddc5f 94463->95619 95624 fceed0 335 API calls Mailbox 94463->95624 95625 fd3200 94463->95625 95701 1028d23 48 API calls 94463->95701 95705 fcfe30 94463->95705 94464->94216 94465->94224 94466->94235 94468 fef8a0 __ftell_nolock 94467->94468 94469 fc5381 GetModuleFileNameW 94468->94469 94470 fcce19 48 API calls 94469->94470 94471 fc53a7 94470->94471 94472 fc660f 49 API calls 94471->94472 94473 fc53b1 Mailbox 94472->94473 94473->94242 94475 fcce28 __wsetenvp 94474->94475 94476 fdee75 48 API calls 94475->94476 94477 fcce50 ___crtGetEnvironmentStringsW 94476->94477 94478 fdf4ea 48 API calls 94477->94478 94479 fcce66 94478->94479 94479->94247 94481 fc5197 94480->94481 94482 fc519f 94481->94482 94483 1031ace 94481->94483 96034 fc5130 94482->96034 94485 fc6b4a 48 API calls 94483->94485 94487 1031adb __wsetenvp 94485->94487 94488 fdee75 48 API calls 94487->94488 94489 1031b07 ___crtGetEnvironmentStringsW 94488->94489 94502 fdf4f2 __calloc_impl 94499->94502 94501 fdf50c 94501->94265 94502->94501 94503 fdf50e std::exception::exception 94502->94503 94508 fe395c 94502->94508 94522 fe6805 RaiseException 94503->94522 94505 fdf538 94523 fe673b 47 API calls _free 94505->94523 94507 fdf54a 94507->94265 94509 fe39d7 __calloc_impl 94508->94509 94514 fe3968 __calloc_impl 94508->94514 94529 fe7c0e 47 API calls __getptd_noexit 94509->94529 94512 fe399b RtlAllocateHeap 94512->94514 94521 fe39cf 94512->94521 94514->94512 94515 fe39c3 94514->94515 94518 fe39c1 94514->94518 94519 fe3973 94514->94519 94527 fe7c0e 47 API calls __getptd_noexit 94515->94527 94528 fe7c0e 47 API calls __getptd_noexit 94518->94528 94519->94514 94524 fe81c2 47 API calls __NMSG_WRITE 94519->94524 94525 fe821f 47 API calls 7 library calls 94519->94525 94526 fe1145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 94519->94526 94521->94502 94522->94505 94523->94507 94524->94519 94525->94519 94527->94518 94528->94521 94529->94521 94531 fcd7f7 48 API calls 94530->94531 94532 fc61db 94531->94532 94533 fc6009 94532->94533 94534 fc6016 __ftell_nolock 94533->94534 94535 fc6a63 48 API calls 94534->94535 94540 fc617c Mailbox 94534->94540 94537 fc6048 94535->94537 94544 fc607e Mailbox 94537->94544 94624 fc61a6 94537->94624 94538 fc61a6 48 API calls 94538->94544 94539 fc614f 94539->94540 94541 fcce19 48 API calls 94539->94541 94540->94272 94543 fc6170 94541->94543 94542 fcce19 48 API calls 94542->94544 94545 fc64cf 48 API calls 94543->94545 94544->94538 94544->94539 94544->94540 94544->94542 94627 fc64cf 94544->94627 94545->94540 94650 fc41a9 94547->94650 94550 fc3a06 94550->94278 94554 fe1c9d _free 47 API calls 94556 1032ffd 94554->94556 94555 1032ff0 94555->94554 94557 fc4252 84 API calls 94556->94557 94558 1033006 94557->94558 94558->94558 94560 fc6ef8 94559->94560 94561 fc622b 94559->94561 95166 fcdd47 48 API calls ___crtGetEnvironmentStringsW 94560->95166 94563 fc9048 94561->94563 94564 fdf4ea 48 API calls 94563->94564 94565 fc6237 94564->94565 94565->94283 94567 fcd6f4 94566->94567 94569 fcd71b 94567->94569 95167 fcd764 55 API calls 94567->95167 94569->94286 94571 fcd654 94570->94571 94579 fcd67e 94570->94579 94572 fcd65b 94571->94572 94574 fcd6c2 94571->94574 94573 fcd666 94572->94573 94578 fcd6ab 94572->94578 95168 fcd9a0 53 API calls __cinit 94573->95168 94574->94578 95170 fddce0 53 API calls 94574->95170 94578->94579 95169 fddce0 53 API calls 94578->95169 94579->94294 94581 fc641f 94580->94581 94582 fc6406 94580->94582 94584 fc6a63 48 API calls 94581->94584 94583 fc6eed 48 API calls 94582->94583 94585 fc62d1 94583->94585 94584->94585 94586 fe0fa7 94585->94586 94587 fe1028 94586->94587 94588 fe0fb3 94586->94588 95173 fe103a 59 API calls 3 library calls 94587->95173 94595 fe0fd8 94588->94595 95171 fe7c0e 47 API calls __getptd_noexit 94588->95171 94590 fe1035 94590->94300 94592 fe0fbf 95172 fe6e10 8 API calls __wcsnicmp 94592->95172 94594 fe0fca 94594->94300 94595->94300 94597 fdc064 94596->94597 94599 fdc069 Mailbox 94596->94599 95174 fdc1af 48 API calls 94597->95174 94605 fdc077 94599->94605 95175 fdc15c 48 API calls 94599->95175 94601 fdf4ea 48 API calls 94603 fdc108 94601->94603 94602 fdc152 94602->94329 94604 fdf4ea 48 API calls 94603->94604 94606 fdc113 94604->94606 94605->94601 94605->94602 94606->94329 94606->94606 94608 fd1cf6 94607->94608 94610 fd1ba2 94607->94610 94608->94339 94609 fd1bae 94614 fd1bb9 94609->94614 95177 fdc15c 48 API calls 94609->95177 94610->94609 94612 fdf4ea 48 API calls 94610->94612 94613 10349c4 94612->94613 94616 fdf4ea 48 API calls 94613->94616 94615 fd1c5d 94614->94615 94617 fdf4ea 48 API calls 94614->94617 94615->94339 94622 10349cf 94616->94622 94618 fd1c9f 94617->94618 94619 fd1cb2 94618->94619 95176 fc2925 48 API calls 94618->95176 94619->94339 94621 fdf4ea 48 API calls 94621->94622 94622->94609 94622->94621 94623->94339 94633 fcbdfa 94624->94633 94626 fc61b1 94626->94537 94629 fc651b 94627->94629 94632 fc64dd ___crtGetEnvironmentStringsW 94627->94632 94628 fdf4ea 48 API calls 94630 fc64e4 94628->94630 94631 fdf4ea 48 API calls 94629->94631 94630->94544 94631->94632 94632->94628 94634 fcbe0d 94633->94634 94638 fcbe0a ___crtGetEnvironmentStringsW 94633->94638 94635 fdf4ea 48 API calls 94634->94635 94636 fcbe17 94635->94636 94639 fdee75 94636->94639 94638->94626 94641 fdf4ea __calloc_impl 94639->94641 94640 fe395c __crtLCMapStringA_stat 47 API calls 94640->94641 94641->94640 94642 fdf50c 94641->94642 94643 fdf50e std::exception::exception 94641->94643 94642->94638 94648 fe6805 RaiseException 94643->94648 94645 fdf538 94649 fe673b 47 API calls _free 94645->94649 94647 fdf54a 94647->94638 94648->94645 94649->94647 94715 fc4214 94650->94715 94655 1034f73 94657 fc4252 84 API calls 94655->94657 94656 fc41d4 LoadLibraryExW 94725 fc4291 94656->94725 94659 1034f7a 94657->94659 94661 fc4291 3 API calls 94659->94661 94664 1034f82 94661->94664 94663 fc41fb 94663->94664 94665 fc4207 94663->94665 94751 fc44ed 94664->94751 94667 fc4252 84 API calls 94665->94667 94668 fc39fe 94667->94668 94668->94550 94674 100c396 94668->94674 94671 1034fa9 94759 fc4950 94671->94759 94673 1034fb6 94675 fc4517 83 API calls 94674->94675 94676 100c405 94675->94676 94940 100c56d 94676->94940 94679 fc44ed 64 API calls 94680 100c432 94679->94680 94681 fc44ed 64 API calls 94680->94681 94682 100c442 94681->94682 94683 fc44ed 64 API calls 94682->94683 94684 100c45d 94683->94684 94685 fc44ed 64 API calls 94684->94685 94686 100c478 94685->94686 94687 fc4517 83 API calls 94686->94687 94688 100c48f 94687->94688 94689 fe395c __crtLCMapStringA_stat 47 API calls 94688->94689 94690 100c496 94689->94690 94691 fe395c __crtLCMapStringA_stat 47 API calls 94690->94691 94692 100c4a0 94691->94692 94693 fc44ed 64 API calls 94692->94693 94694 100c4b4 94693->94694 94695 100bf5a GetSystemTimeAsFileTime 94694->94695 94696 100c4c7 94695->94696 94697 100c4f1 94696->94697 94698 100c4dc 94696->94698 94700 100c556 94697->94700 94701 100c4f7 94697->94701 94699 fe1c9d _free 47 API calls 94698->94699 94703 100c4e2 94699->94703 94702 fe1c9d _free 47 API calls 94700->94702 94946 100b965 118 API calls __fcloseall 94701->94946 94705 100c41b 94702->94705 94706 fe1c9d _free 47 API calls 94703->94706 94705->94555 94709 fc4252 94705->94709 94706->94705 94707 100c54e 94708 fe1c9d _free 47 API calls 94707->94708 94708->94705 94710 fc425c 94709->94710 94711 fc4263 94709->94711 94947 fe35e4 94710->94947 94713 fc4272 94711->94713 94714 fc4283 FreeLibrary 94711->94714 94713->94555 94714->94713 94764 fc4339 94715->94764 94718 fc423c 94720 fc41bb 94718->94720 94721 fc4244 FreeLibrary 94718->94721 94722 fe3499 94720->94722 94721->94720 94772 fe34ae 94722->94772 94724 fc41c8 94724->94655 94724->94656 94851 fc42e4 94725->94851 94728 fc42b8 94729 fc41ec 94728->94729 94730 fc42c1 FreeLibrary 94728->94730 94732 fc4380 94729->94732 94730->94729 94733 fdf4ea 48 API calls 94732->94733 94734 fc4395 94733->94734 94859 fc47b7 94734->94859 94736 fc43a1 ___crtGetEnvironmentStringsW 94738 fc4499 94736->94738 94739 fc44d1 94736->94739 94742 fc43dc 94736->94742 94737 fc4950 57 API calls 94747 fc43e5 94737->94747 94862 fc406b CreateStreamOnHGlobal 94738->94862 94873 100c750 93 API calls 94739->94873 94742->94737 94743 fc44ed 64 API calls 94743->94747 94745 fc4479 94745->94663 94746 1034ed7 94748 fc4517 83 API calls 94746->94748 94747->94743 94747->94745 94747->94746 94868 fc4517 94747->94868 94749 1034eeb 94748->94749 94750 fc44ed 64 API calls 94749->94750 94750->94745 94752 1034fc0 94751->94752 94753 fc44ff 94751->94753 94897 fe381e 94753->94897 94756 100bf5a 94917 100bdb4 94756->94917 94758 100bf70 94758->94671 94760 1035002 94759->94760 94761 fc495f 94759->94761 94922 fe3e65 94761->94922 94763 fc4967 94763->94673 94768 fc434b 94764->94768 94767 fc4321 LoadLibraryA GetProcAddress 94767->94718 94769 fc422f 94768->94769 94770 fc4354 LoadLibraryA 94768->94770 94769->94718 94769->94767 94770->94769 94771 fc4365 GetProcAddress 94770->94771 94771->94769 94775 fe34ba __setmbcp 94772->94775 94773 fe34cd 94820 fe7c0e 47 API calls __getptd_noexit 94773->94820 94775->94773 94777 fe34fe 94775->94777 94776 fe34d2 94821 fe6e10 8 API calls __wcsnicmp 94776->94821 94791 fee4c8 94777->94791 94780 fe3503 94781 fe350c 94780->94781 94782 fe3519 94780->94782 94822 fe7c0e 47 API calls __getptd_noexit 94781->94822 94784 fe3543 94782->94784 94785 fe3523 94782->94785 94805 fee5e0 94784->94805 94823 fe7c0e 47 API calls __getptd_noexit 94785->94823 94788 fe34dd @_EH4_CallFilterFunc@8 __setmbcp 94788->94724 94792 fee4d4 __setmbcp 94791->94792 94793 fe7cf4 __lock 47 API calls 94792->94793 94794 fee4e2 94793->94794 94795 fee559 94794->94795 94802 fe7d7c __mtinitlocknum 47 API calls 94794->94802 94803 fee552 94794->94803 94828 fe4e5b 48 API calls __lock 94794->94828 94829 fe4ec5 LeaveCriticalSection LeaveCriticalSection _doexit 94794->94829 94830 fe69d0 47 API calls __crtLCMapStringA_stat 94795->94830 94798 fee560 94800 fee56f InitializeCriticalSectionAndSpinCount EnterCriticalSection 94798->94800 94798->94803 94799 fee5cc __setmbcp 94799->94780 94800->94803 94802->94794 94825 fee5d7 94803->94825 94814 fee600 __wopenfile 94805->94814 94806 fee61a 94835 fe7c0e 47 API calls __getptd_noexit 94806->94835 94808 fee7d5 94808->94806 94812 fee838 94808->94812 94809 fee61f 94836 fe6e10 8 API calls __wcsnicmp 94809->94836 94811 fe354e 94824 fe3570 LeaveCriticalSection LeaveCriticalSection _fseek 94811->94824 94832 ff63c9 94812->94832 94814->94806 94814->94808 94837 fe185b 59 API calls 2 library calls 94814->94837 94816 fee7ce 94816->94808 94838 fe185b 59 API calls 2 library calls 94816->94838 94818 fee7ed 94818->94808 94839 fe185b 59 API calls 2 library calls 94818->94839 94820->94776 94821->94788 94822->94788 94823->94788 94824->94788 94831 fe7e58 LeaveCriticalSection 94825->94831 94827 fee5de 94827->94799 94828->94794 94829->94794 94830->94798 94831->94827 94840 ff5bb1 94832->94840 94834 ff63e2 94834->94811 94835->94809 94836->94811 94837->94816 94838->94818 94839->94808 94841 ff5bbd __setmbcp 94840->94841 94842 ff5bcf 94841->94842 94845 ff5c06 94841->94845 94843 fe7c0e __wcsnicmp 47 API calls 94842->94843 94844 ff5bd4 94843->94844 94847 fe6e10 __wcsnicmp 8 API calls 94844->94847 94846 ff5c78 __wsopen_helper 110 API calls 94845->94846 94848 ff5c23 94846->94848 94850 ff5bde __setmbcp 94847->94850 94849 ff5c4c __wsopen_helper LeaveCriticalSection 94848->94849 94849->94850 94850->94834 94855 fc42f6 94851->94855 94854 fc42cc LoadLibraryA GetProcAddress 94854->94728 94856 fc42aa 94855->94856 94857 fc42ff LoadLibraryA 94855->94857 94856->94728 94856->94854 94857->94856 94858 fc4310 GetProcAddress 94857->94858 94858->94856 94860 fdf4ea 48 API calls 94859->94860 94861 fc47c9 94860->94861 94861->94736 94863 fc4085 FindResourceExW 94862->94863 94865 fc40a2 94862->94865 94864 1034f16 LoadResource 94863->94864 94863->94865 94864->94865 94866 1034f2b SizeofResource 94864->94866 94865->94742 94866->94865 94867 1034f3f LockResource 94866->94867 94867->94865 94869 1034fe0 94868->94869 94870 fc4526 94868->94870 94874 fe3a8d 94870->94874 94872 fc4534 94872->94747 94873->94742 94875 fe3a99 __setmbcp 94874->94875 94876 fe3aa7 94875->94876 94877 fe3acd 94875->94877 94887 fe7c0e 47 API calls __getptd_noexit 94876->94887 94889 fe4e1c 94877->94889 94879 fe3aac 94888 fe6e10 8 API calls __wcsnicmp 94879->94888 94882 fe3ad3 94895 fe39fe 81 API calls 4 library calls 94882->94895 94884 fe3ae2 94896 fe3b04 LeaveCriticalSection LeaveCriticalSection _fseek 94884->94896 94886 fe3ab7 __setmbcp 94886->94872 94887->94879 94888->94886 94890 fe4e4e EnterCriticalSection 94889->94890 94891 fe4e2c 94889->94891 94893 fe4e44 94890->94893 94891->94890 94892 fe4e34 94891->94892 94894 fe7cf4 __lock 47 API calls 94892->94894 94893->94882 94894->94893 94895->94884 94896->94886 94900 fe3839 94897->94900 94899 fc4510 94899->94756 94901 fe3845 __setmbcp 94900->94901 94902 fe3880 __setmbcp 94901->94902 94903 fe385b _memset 94901->94903 94904 fe3888 94901->94904 94902->94899 94913 fe7c0e 47 API calls __getptd_noexit 94903->94913 94905 fe4e1c __lock_file 48 API calls 94904->94905 94906 fe388e 94905->94906 94915 fe365b 62 API calls 6 library calls 94906->94915 94909 fe3875 94914 fe6e10 8 API calls __wcsnicmp 94909->94914 94910 fe38a4 94916 fe38c2 LeaveCriticalSection LeaveCriticalSection _fseek 94910->94916 94913->94909 94914->94902 94915->94910 94916->94902 94920 fe344a GetSystemTimeAsFileTime 94917->94920 94919 100bdc3 94919->94758 94921 fe3478 __aulldiv 94920->94921 94921->94919 94923 fe3e71 __setmbcp 94922->94923 94924 fe3e7f 94923->94924 94925 fe3e94 94923->94925 94936 fe7c0e 47 API calls __getptd_noexit 94924->94936 94927 fe4e1c __lock_file 48 API calls 94925->94927 94929 fe3e9a 94927->94929 94928 fe3e84 94937 fe6e10 8 API calls __wcsnicmp 94928->94937 94938 fe3b0c 55 API calls 5 library calls 94929->94938 94932 fe3ea5 94939 fe3ec5 LeaveCriticalSection LeaveCriticalSection _fseek 94932->94939 94933 fe3e8f __setmbcp 94933->94763 94935 fe3eb7 94935->94933 94936->94928 94937->94933 94938->94932 94939->94935 94941 100c581 __tzset_nolock _wcscmp 94940->94941 94942 fc44ed 64 API calls 94941->94942 94943 100c417 94941->94943 94944 100bf5a GetSystemTimeAsFileTime 94941->94944 94945 fc4517 83 API calls 94941->94945 94942->94941 94943->94679 94943->94705 94944->94941 94945->94941 94946->94707 94948 fe35f0 __setmbcp 94947->94948 94949 fe361c 94948->94949 94950 fe3604 94948->94950 94952 fe4e1c __lock_file 48 API calls 94949->94952 94959 fe3614 __setmbcp 94949->94959 94976 fe7c0e 47 API calls __getptd_noexit 94950->94976 94954 fe362e 94952->94954 94953 fe3609 94977 fe6e10 8 API calls __wcsnicmp 94953->94977 94960 fe3578 94954->94960 94959->94711 94961 fe359b 94960->94961 94962 fe3587 94960->94962 94964 fe3597 94961->94964 94979 fe2c84 94961->94979 95019 fe7c0e 47 API calls __getptd_noexit 94962->95019 94978 fe3653 LeaveCriticalSection LeaveCriticalSection _fseek 94964->94978 94965 fe358c 95020 fe6e10 8 API calls __wcsnicmp 94965->95020 94972 fe35b5 94996 fee9d2 94972->94996 94974 fe35bb 94974->94964 94975 fe1c9d _free 47 API calls 94974->94975 94975->94964 94976->94953 94977->94959 94978->94959 94980 fe2c97 94979->94980 94981 fe2cbb 94979->94981 94980->94981 94982 fe2933 __stbuf 47 API calls 94980->94982 94985 feeb36 94981->94985 94983 fe2cb4 94982->94983 95021 feaf61 94983->95021 94986 fe35af 94985->94986 94987 feeb43 94985->94987 94989 fe2933 94986->94989 94987->94986 94988 fe1c9d _free 47 API calls 94987->94988 94988->94986 94990 fe293d 94989->94990 94991 fe2952 94989->94991 95127 fe7c0e 47 API calls __getptd_noexit 94990->95127 94991->94972 94993 fe2942 95128 fe6e10 8 API calls __wcsnicmp 94993->95128 94995 fe294d 94995->94972 94997 fee9de __setmbcp 94996->94997 94998 fee9fe 94997->94998 94999 fee9e6 94997->94999 95000 feea7b 94998->95000 95005 feea28 94998->95005 95144 fe7bda 47 API calls __getptd_noexit 94999->95144 95148 fe7bda 47 API calls __getptd_noexit 95000->95148 95003 fee9eb 95145 fe7c0e 47 API calls __getptd_noexit 95003->95145 95004 feea80 95149 fe7c0e 47 API calls __getptd_noexit 95004->95149 95009 fea8ed ___lock_fhandle 49 API calls 95005->95009 95007 fee9f3 __setmbcp 95007->94974 95011 feea2e 95009->95011 95010 feea88 95150 fe6e10 8 API calls __wcsnicmp 95010->95150 95013 feea4c 95011->95013 95014 feea41 95011->95014 95146 fe7c0e 47 API calls __getptd_noexit 95013->95146 95129 feea9c 95014->95129 95017 feea47 95147 feea73 LeaveCriticalSection __unlock_fhandle 95017->95147 95019->94965 95020->94964 95022 feaf6d __setmbcp 95021->95022 95023 feaf8d 95022->95023 95024 feaf75 95022->95024 95026 feb022 95023->95026 95030 feafbf 95023->95030 95119 fe7bda 47 API calls __getptd_noexit 95024->95119 95124 fe7bda 47 API calls __getptd_noexit 95026->95124 95027 feaf7a 95120 fe7c0e 47 API calls __getptd_noexit 95027->95120 95046 fea8ed 95030->95046 95031 feb027 95125 fe7c0e 47 API calls __getptd_noexit 95031->95125 95032 feaf82 __setmbcp 95032->94981 95035 feafc5 95037 feafeb 95035->95037 95038 feafd8 95035->95038 95036 feb02f 95126 fe6e10 8 API calls __wcsnicmp 95036->95126 95121 fe7c0e 47 API calls __getptd_noexit 95037->95121 95055 feb043 95038->95055 95042 feafe4 95123 feb01a LeaveCriticalSection __unlock_fhandle 95042->95123 95043 feaff0 95122 fe7bda 47 API calls __getptd_noexit 95043->95122 95047 fea8f9 __setmbcp 95046->95047 95048 fea946 EnterCriticalSection 95047->95048 95049 fe7cf4 __lock 47 API calls 95047->95049 95050 fea96c __setmbcp 95048->95050 95051 fea91d 95049->95051 95050->95035 95052 fea93a 95051->95052 95053 fea928 InitializeCriticalSectionAndSpinCount 95051->95053 95054 fea970 ___lock_fhandle LeaveCriticalSection 95052->95054 95053->95052 95054->95048 95056 feb050 __ftell_nolock 95055->95056 95057 feb0ac 95056->95057 95058 feb08d 95056->95058 95088 feb082 95056->95088 95062 feb105 95057->95062 95063 feb0e9 95057->95063 95059 fe7bda __chsize_nolock 47 API calls 95058->95059 95061 feb092 95059->95061 95060 fea70c __crtLCMapStringA_stat 6 API calls 95064 feb86b 95060->95064 95065 fe7c0e __wcsnicmp 47 API calls 95061->95065 95066 feb11c 95062->95066 95069 fef82f __lseeki64_nolock 49 API calls 95062->95069 95067 fe7bda __chsize_nolock 47 API calls 95063->95067 95064->95042 95068 feb099 95065->95068 95070 ff3bf2 __stbuf 47 API calls 95066->95070 95071 feb0ee 95067->95071 95072 fe6e10 __wcsnicmp 8 API calls 95068->95072 95069->95066 95073 feb12a 95070->95073 95074 fe7c0e __wcsnicmp 47 API calls 95071->95074 95072->95088 95075 feb44b 95073->95075 95081 fe7a0d __beginthread 47 API calls 95073->95081 95076 feb0f5 95074->95076 95077 feb7b8 WriteFile 95075->95077 95078 feb463 95075->95078 95079 fe6e10 __wcsnicmp 8 API calls 95076->95079 95080 feb7e1 GetLastError 95077->95080 95090 feb410 95077->95090 95082 feb55a 95078->95082 95087 feb479 95078->95087 95079->95088 95080->95090 95083 feb150 GetConsoleMode 95081->95083 95093 feb663 95082->95093 95096 feb565 95082->95096 95083->95075 95085 feb189 95083->95085 95084 feb81b 95084->95088 95089 fe7c0e __wcsnicmp 47 API calls 95084->95089 95085->95075 95091 feb199 GetConsoleCP 95085->95091 95086 feb4e9 WriteFile 95086->95080 95092 feb526 95086->95092 95087->95084 95087->95086 95088->95060 95094 feb843 95089->95094 95090->95084 95090->95088 95095 feb7f7 95090->95095 95091->95090 95117 feb1c2 95091->95117 95092->95087 95092->95090 95104 feb555 95092->95104 95093->95084 95097 feb6d8 WideCharToMultiByte 95093->95097 95098 fe7bda __chsize_nolock 47 API calls 95094->95098 95099 feb7fe 95095->95099 95100 feb812 95095->95100 95096->95084 95101 feb5de WriteFile 95096->95101 95097->95080 95111 feb71f 95097->95111 95098->95088 95105 fe7c0e __wcsnicmp 47 API calls 95099->95105 95102 fe7bed __dosmaperr 47 API calls 95100->95102 95101->95080 95103 feb62d 95101->95103 95102->95088 95103->95090 95103->95096 95103->95104 95104->95090 95107 feb803 95105->95107 95106 feb727 WriteFile 95109 feb77a GetLastError 95106->95109 95106->95111 95110 fe7bda __chsize_nolock 47 API calls 95107->95110 95108 fe1688 __chsize_nolock 57 API calls 95108->95117 95109->95111 95110->95088 95111->95090 95111->95093 95111->95104 95111->95106 95112 ff40f7 59 API calls __chsize_nolock 95112->95117 95113 ff5884 WriteConsoleW CreateFileW __chsize_nolock 95115 feb2f6 95113->95115 95114 feb28f WideCharToMultiByte 95114->95090 95116 feb2ca WriteFile 95114->95116 95115->95080 95115->95090 95115->95113 95115->95117 95118 feb321 WriteFile 95115->95118 95116->95080 95116->95115 95117->95090 95117->95108 95117->95112 95117->95114 95117->95115 95118->95080 95118->95115 95119->95027 95120->95032 95121->95043 95122->95042 95123->95032 95124->95031 95125->95036 95126->95032 95127->94993 95128->94995 95151 feaba4 95129->95151 95131 feeb00 95164 feab1e 48 API calls 2 library calls 95131->95164 95133 feeaaa 95133->95131 95134 feeade 95133->95134 95136 feaba4 __lseeki64_nolock 47 API calls 95133->95136 95134->95131 95137 feaba4 __lseeki64_nolock 47 API calls 95134->95137 95135 feeb08 95138 feeb2a 95135->95138 95165 fe7bed 47 API calls 3 library calls 95135->95165 95139 feead5 95136->95139 95140 feeaea CloseHandle 95137->95140 95138->95017 95143 feaba4 __lseeki64_nolock 47 API calls 95139->95143 95140->95131 95141 feeaf6 GetLastError 95140->95141 95141->95131 95143->95134 95144->95003 95145->95007 95146->95017 95147->95007 95148->95004 95149->95010 95150->95007 95152 feabaf 95151->95152 95153 feabc4 95151->95153 95154 fe7bda __chsize_nolock 47 API calls 95152->95154 95156 fe7bda __chsize_nolock 47 API calls 95153->95156 95158 feabe9 95153->95158 95155 feabb4 95154->95155 95157 fe7c0e __wcsnicmp 47 API calls 95155->95157 95159 feabf3 95156->95159 95160 feabbc 95157->95160 95158->95133 95161 fe7c0e __wcsnicmp 47 API calls 95159->95161 95160->95133 95162 feabfb 95161->95162 95163 fe6e10 __wcsnicmp 8 API calls 95162->95163 95163->95160 95164->95135 95165->95138 95166->94561 95167->94569 95168->94579 95169->94579 95170->94578 95171->94592 95172->94594 95173->94590 95174->94599 95175->94605 95176->94619 95177->94614 95237 fef8a0 95178->95237 95181 fc6a63 48 API calls 95182 fc6643 95181->95182 95239 fc6571 95182->95239 95185 fc40a7 95186 fef8a0 __ftell_nolock 95185->95186 95187 fc40b4 GetLongPathNameW 95186->95187 95188 fc6a63 48 API calls 95187->95188 95189 fc40dc 95188->95189 95190 fc49a0 95189->95190 95191 fcd7f7 48 API calls 95190->95191 95192 fc49b2 95191->95192 95193 fc660f 49 API calls 95192->95193 95194 fc49bd 95193->95194 95195 fc49c8 95194->95195 95196 1032e35 95194->95196 95197 fc64cf 48 API calls 95195->95197 95200 1032e4f 95196->95200 95253 fdd35e 60 API calls 95196->95253 95199 fc49d4 95197->95199 95247 fc28a6 95199->95247 95202 fc49e7 Mailbox 95202->94355 95204 fc41a9 136 API calls 95203->95204 95205 fc415e 95204->95205 95206 1033489 95205->95206 95208 fc41a9 136 API calls 95205->95208 95207 100c396 122 API calls 95206->95207 95209 103349e 95207->95209 95210 fc4172 95208->95210 95211 10334a2 95209->95211 95212 10334bf 95209->95212 95210->95206 95213 fc417a 95210->95213 95214 fc4252 84 API calls 95211->95214 95215 fdf4ea 48 API calls 95212->95215 95216 10334aa 95213->95216 95217 fc4186 95213->95217 95214->95216 95226 1033504 Mailbox 95215->95226 95356 1006b49 87 API calls _wprintf 95216->95356 95254 fcc833 95217->95254 95220 10334b8 95220->95212 95222 10336b4 95223 fe1c9d _free 47 API calls 95222->95223 95224 10336bc 95223->95224 95225 fc4252 84 API calls 95224->95225 95231 10336c5 95225->95231 95226->95222 95226->95231 95234 fcce19 48 API calls 95226->95234 95342 fcba85 95226->95342 95350 fc4dd9 95226->95350 95357 1002551 48 API calls ___crtGetEnvironmentStringsW 95226->95357 95358 1002472 60 API calls 2 library calls 95226->95358 95359 1009c12 48 API calls 95226->95359 95230 fe1c9d _free 47 API calls 95230->95231 95231->95230 95233 fc4252 84 API calls 95231->95233 95360 10025b5 86 API calls 4 library calls 95231->95360 95233->95231 95234->95226 95238 fc661c GetFullPathNameW 95237->95238 95238->95181 95240 fc657f 95239->95240 95243 fcb18b 95240->95243 95242 fc4114 95242->95185 95244 fcb1a2 ___crtGetEnvironmentStringsW 95243->95244 95245 fcb199 95243->95245 95244->95242 95245->95244 95246 fcbdfa 48 API calls 95245->95246 95246->95244 95248 fc28b8 95247->95248 95252 fc28d7 ___crtGetEnvironmentStringsW 95247->95252 95250 fdf4ea 48 API calls 95248->95250 95249 fdf4ea 48 API calls 95251 fc28ee 95249->95251 95250->95252 95251->95202 95252->95249 95253->95196 95255 fcc843 __ftell_nolock 95254->95255 95256 1033095 95255->95256 95257 fcc860 95255->95257 95385 10025b5 86 API calls 4 library calls 95256->95385 95366 fc48ba 49 API calls 95257->95366 95260 10330a8 95386 10025b5 86 API calls 4 library calls 95260->95386 95261 fcc882 95367 fc4550 56 API calls 95261->95367 95263 fcc897 95263->95260 95265 fcc89f 95263->95265 95267 fcd7f7 48 API calls 95265->95267 95266 10330c4 95269 fcc90c 95266->95269 95268 fcc8ab 95267->95268 95368 fde968 49 API calls __ftell_nolock 95268->95368 95271 10330d7 95269->95271 95272 fcc91a 95269->95272 95275 fc4907 CloseHandle 95271->95275 95371 fe1dfc 95272->95371 95273 fcc8b7 95276 fcd7f7 48 API calls 95273->95276 95277 10330e3 95275->95277 95278 fcc8c3 95276->95278 95280 fc41a9 136 API calls 95277->95280 95279 fc660f 49 API calls 95278->95279 95281 fcc8d1 95279->95281 95282 103310d 95280->95282 95369 fdeb66 SetFilePointerEx ReadFile 95281->95369 95285 1033136 95282->95285 95289 100c396 122 API calls 95282->95289 95284 fcc943 _wcscat _wcscpy 95288 fcc96d SetCurrentDirectoryW 95284->95288 95387 10025b5 86 API calls 4 library calls 95285->95387 95286 fcc8fd 95370 fc46ce SetFilePointerEx SetFilePointerEx 95286->95370 95293 fdf4ea 48 API calls 95288->95293 95290 1033129 95289->95290 95294 1033152 95290->95294 95295 1033131 95290->95295 95292 103314d 95326 fccad1 Mailbox 95292->95326 95296 fcc988 95293->95296 95298 fc4252 84 API calls 95294->95298 95297 fc4252 84 API calls 95295->95297 95299 fc47b7 48 API calls 95296->95299 95297->95285 95300 1033157 95298->95300 95329 fcc993 Mailbox __wsetenvp 95299->95329 95301 fdf4ea 48 API calls 95300->95301 95308 1033194 95301->95308 95302 fcca9d 95381 fc4907 95302->95381 95306 fccaa9 SetCurrentDirectoryW 95306->95326 95307 fc3d98 95307->94216 95307->94225 95310 fcba85 48 API calls 95308->95310 95339 10331dd Mailbox 95310->95339 95312 10333ce 95392 1009b72 48 API calls 95312->95392 95313 1033467 95396 10025b5 86 API calls 4 library calls 95313->95396 95317 1033480 95317->95302 95318 10333f0 95393 10229e8 48 API calls ___crtGetEnvironmentStringsW 95318->95393 95320 10333fd 95323 fe1c9d _free 47 API calls 95320->95323 95322 103345f 95395 100240b 48 API calls 3 library calls 95322->95395 95323->95326 95324 fcce19 48 API calls 95324->95329 95361 fc48dd 95326->95361 95327 fcba85 48 API calls 95327->95339 95329->95302 95329->95313 95329->95322 95329->95324 95374 fcb337 56 API calls _wcscpy 95329->95374 95375 fdc258 GetStringTypeW 95329->95375 95376 fccb93 59 API calls __wcsnicmp 95329->95376 95377 fccb5a GetStringTypeW __wsetenvp 95329->95377 95378 fe16d0 GetStringTypeW wcstoxq 95329->95378 95379 fccc24 162 API calls 3 library calls 95329->95379 95380 fdc682 48 API calls 95329->95380 95333 fcce19 48 API calls 95333->95339 95336 1033420 95394 10025b5 86 API calls 4 library calls 95336->95394 95338 1033439 95340 fe1c9d _free 47 API calls 95338->95340 95339->95312 95339->95327 95339->95333 95339->95336 95388 1002551 48 API calls ___crtGetEnvironmentStringsW 95339->95388 95389 1002472 60 API calls 2 library calls 95339->95389 95390 1009c12 48 API calls 95339->95390 95391 fdc682 48 API calls 95339->95391 95341 103344c 95340->95341 95341->95326 95343 fcbb25 95342->95343 95348 fcba98 ___crtGetEnvironmentStringsW 95342->95348 95345 fdf4ea 48 API calls 95343->95345 95344 fdf4ea 48 API calls 95346 fcba9f 95344->95346 95345->95348 95347 fcbac8 95346->95347 95349 fdf4ea 48 API calls 95346->95349 95347->95226 95348->95344 95349->95347 95351 fc4dec 95350->95351 95354 fc4e9a 95350->95354 95352 fdf4ea 48 API calls 95351->95352 95355 fc4e1e 95351->95355 95352->95355 95353 fdf4ea 48 API calls 95353->95355 95354->95226 95355->95353 95355->95354 95356->95220 95357->95226 95358->95226 95359->95226 95360->95231 95362 fc4907 CloseHandle 95361->95362 95363 fc48e5 Mailbox 95362->95363 95364 fc4907 CloseHandle 95363->95364 95365 fc48fc 95364->95365 95365->95307 95366->95261 95367->95263 95368->95273 95369->95286 95370->95269 95397 fe1e46 95371->95397 95374->95329 95375->95329 95376->95329 95377->95329 95378->95329 95379->95329 95380->95329 95382 fc4920 95381->95382 95383 fc4911 95381->95383 95382->95383 95384 fc4925 CloseHandle 95382->95384 95383->95306 95384->95383 95385->95260 95386->95266 95387->95292 95388->95339 95389->95339 95390->95339 95391->95339 95392->95318 95393->95320 95394->95338 95395->95313 95396->95317 95398 fe1e61 95397->95398 95401 fe1e55 95397->95401 95421 fe7c0e 47 API calls __getptd_noexit 95398->95421 95400 fe2019 95403 fe1e41 95400->95403 95422 fe6e10 8 API calls __wcsnicmp 95400->95422 95401->95398 95405 fe1ed4 95401->95405 95416 fe9d6b 47 API calls __wcsnicmp 95401->95416 95403->95284 95405->95398 95410 fe1f41 95405->95410 95417 fe9d6b 47 API calls __wcsnicmp 95405->95417 95406 fe1fa0 95406->95398 95406->95403 95409 fe1fb0 95406->95409 95407 fe1f5f 95407->95398 95408 fe1f7b 95407->95408 95418 fe9d6b 47 API calls __wcsnicmp 95407->95418 95408->95398 95408->95403 95413 fe1f91 95408->95413 95420 fe9d6b 47 API calls __wcsnicmp 95409->95420 95410->95406 95410->95407 95419 fe9d6b 47 API calls __wcsnicmp 95413->95419 95416->95405 95417->95410 95418->95408 95419->95403 95420->95403 95421->95400 95422->95403 95424 fdf4ea 48 API calls 95423->95424 95425 fc6b54 95424->95425 95425->94366 95426->94367 95428 fc4c8b 95427->95428 95429 fc4d94 95427->95429 95428->95429 95430 fdf4ea 48 API calls 95428->95430 95429->94372 95431 fc4cb2 95430->95431 95432 fdf4ea 48 API calls 95431->95432 95436 fc4d22 95432->95436 95435 fc4dd9 48 API calls 95435->95436 95436->95429 95436->95435 95437 fcba85 48 API calls 95436->95437 95440 fcb470 95436->95440 95468 1009af1 48 API calls 95436->95468 95437->95436 95438->94375 95439->94377 95469 fc6b0f 95440->95469 95442 fcb69b 95443 fcba85 48 API calls 95442->95443 95444 fcb6b5 Mailbox 95443->95444 95444->95436 95447 1033939 ___crtGetEnvironmentStringsW 95490 10026bc 88 API calls 4 library calls 95447->95490 95448 fcbcce 48 API calls 95450 fcb495 95448->95450 95449 fcba85 48 API calls 95449->95450 95450->95442 95450->95447 95450->95448 95450->95449 95451 103397b 95450->95451 95459 fcb9e4 95450->95459 95460 1033909 95450->95460 95465 fcbdfa 48 API calls 95450->95465 95474 fcc413 59 API calls 95450->95474 95475 fcbb85 95450->95475 95480 fcbc74 48 API calls 95450->95480 95481 fcc6a5 49 API calls 95450->95481 95482 fcc799 95450->95482 95491 10026bc 88 API calls 4 library calls 95451->95491 95455 1033973 95455->95444 95457 1033989 95458 fcba85 48 API calls 95457->95458 95458->95455 95492 10026bc 88 API calls 4 library calls 95459->95492 95462 fc6b4a 48 API calls 95460->95462 95464 1033914 95462->95464 95467 fdf4ea 48 API calls 95464->95467 95466 fcb66c CharUpperBuffW 95465->95466 95466->95450 95467->95447 95468->95436 95470 fdf4ea 48 API calls 95469->95470 95471 fc6b34 95470->95471 95472 fc6b4a 48 API calls 95471->95472 95473 fc6b43 95472->95473 95473->95450 95474->95450 95476 fcbb96 ___crtGetEnvironmentStringsW 95475->95476 95477 fcbb9b 95475->95477 95476->95450 95478 1031b77 95477->95478 95479 fdee75 48 API calls 95477->95479 95479->95476 95480->95450 95481->95450 95483 1031f17 95482->95483 95486 fcc7b0 95482->95486 95484 fc6b4a 48 API calls 95483->95484 95485 1031f21 95484->95485 95487 fdf4ea 48 API calls 95485->95487 95488 fdee75 48 API calls 95486->95488 95489 fcc7bd ___crtGetEnvironmentStringsW 95486->95489 95487->95489 95488->95489 95489->95450 95490->95455 95491->95457 95492->95455 95494 fc403c LoadImageW 95493->95494 95495 103418d EnumResourceNamesW 95493->95495 95496 fc3ee1 RegisterClassExW 95494->95496 95495->95496 95497 fc3f53 7 API calls 95496->95497 95497->94391 95499 1033c33 95498->95499 95500 fc4c44 95498->95500 95499->95500 95501 1033c3c DestroyIcon 95499->95501 95500->94397 95524 1005819 61 API calls _W_store_winword 95500->95524 95501->95500 95503 fc51cb 95502->95503 95504 fc52a2 Mailbox 95502->95504 95505 fc6b0f 48 API calls 95503->95505 95504->94402 95506 fc51d9 95505->95506 95507 1033ca1 LoadStringW 95506->95507 95508 fc51e6 95506->95508 95511 1033cbb 95507->95511 95509 fc6a63 48 API calls 95508->95509 95510 fc51fb 95509->95510 95510->95511 95512 fc520c 95510->95512 95513 fc510d 48 API calls 95511->95513 95514 fc5216 95512->95514 95515 fc52a7 95512->95515 95518 1033cc5 95513->95518 95519 fc518c 48 API calls 95518->95519 95521 fc5220 _memset _wcscpy 95518->95521 95522 fc5288 Shell_NotifyIconW 95521->95522 95522->95504 95524->94397 95526 fcef1d 95525->95526 95527 fcef2f 95525->95527 95737 fce3b0 335 API calls 2 library calls 95526->95737 95738 100cc5c 86 API calls 4 library calls 95527->95738 95530 fcef26 95530->94463 95531 10386f9 95531->95531 95533 fcf130 95532->95533 95535 fcfe30 335 API calls 95533->95535 95539 fcf199 95533->95539 95534 fcf3dd 95538 10387c8 95534->95538 95548 fcf3f2 95534->95548 95582 fcf431 Mailbox 95534->95582 95537 1038728 95535->95537 95536 fcf595 95542 fcd7f7 48 API calls 95536->95542 95536->95582 95537->95539 95740 100cc5c 86 API calls 4 library calls 95537->95740 95743 100cc5c 86 API calls 4 library calls 95538->95743 95539->95534 95539->95536 95544 fcd7f7 48 API calls 95539->95544 95576 fcf229 95539->95576 95543 10387a3 95542->95543 95742 fe0f0a 52 API calls __cinit 95543->95742 95545 1038772 95544->95545 95741 fe0f0a 52 API calls __cinit 95545->95741 95546 100cc5c 86 API calls 95546->95582 95574 fcf418 95548->95574 95744 1009af1 48 API calls 95548->95744 95549 1038b1b 95563 1038bcf 95549->95563 95564 1038b2c 95549->95564 95551 fcd6e9 55 API calls 95551->95582 95553 fcf770 95557 1038a45 95553->95557 95575 fcf77a 95553->95575 95554 1038c53 95758 100cc5c 86 API calls 4 library calls 95554->95758 95555 1038810 95745 101eef8 335 API calls 95555->95745 95556 fcfe30 335 API calls 95577 fcf6aa 95556->95577 95750 fdc1af 48 API calls 95557->95750 95558 1038b7e 95753 101e40a 335 API calls Mailbox 95558->95753 95755 100cc5c 86 API calls 4 library calls 95563->95755 95752 101f5ee 335 API calls 95564->95752 95565 1038beb 95756 101bdbd 335 API calls Mailbox 95565->95756 95567 fcfe30 335 API calls 95567->95582 95569 fd1b90 48 API calls 95569->95582 95570 fd1b90 48 API calls 95570->95582 95573 1038c00 95596 fcf537 Mailbox 95573->95596 95757 100cc5c 86 API calls 4 library calls 95573->95757 95574->95549 95574->95577 95574->95582 95575->95570 95576->95534 95576->95536 95576->95574 95576->95582 95577->95553 95577->95556 95580 fcfce0 95577->95580 95577->95582 95577->95596 95579 1038823 95579->95574 95581 103884b 95579->95581 95580->95596 95754 100cc5c 86 API calls 4 library calls 95580->95754 95746 101ccdc 48 API calls 95581->95746 95582->95546 95582->95551 95582->95554 95582->95558 95582->95565 95582->95567 95582->95569 95582->95580 95582->95596 95739 fcdd47 48 API calls ___crtGetEnvironmentStringsW 95582->95739 95751 ff97ed InterlockedDecrement 95582->95751 95759 fdc1af 48 API calls 95582->95759 95586 1038857 95588 1038865 95586->95588 95589 10388aa 95586->95589 95596->94463 95598 fd479f 95597->95598 95599 fd4637 95597->95599 95602 fcce19 48 API calls 95598->95602 95600 1036e05 95599->95600 95601 fd4643 95599->95601 95814 101e822 95600->95814 95813 fd4300 335 API calls ___crtGetEnvironmentStringsW 95601->95813 95609 fd46e4 Mailbox 95602->95609 95605 fd4659 95606 fd4739 Mailbox 95605->95606 95607 1036e11 95605->95607 95605->95609 95606->94463 95607->95606 95854 100cc5c 86 API calls 4 library calls 95607->95854 95613 fc4252 84 API calls 95609->95613 95760 1006524 95609->95760 95763 100fa0c 95609->95763 95804 1016ff0 95609->95804 95613->95606 95616 103df42 95614->95616 95618 fde253 95614->95618 95615 103df77 95616->95615 95617 103df59 TranslateAcceleratorW 95616->95617 95617->95618 95618->94463 95620 fddca3 95619->95620 95621 fddc71 95619->95621 95620->94463 95621->95620 95622 fddc96 IsDialogMessageW 95621->95622 95623 103dd1d GetClassLongW 95621->95623 95622->95620 95622->95621 95623->95621 95623->95622 95624->94463 95990 fcbd30 95625->95990 95627 fd3267 95628 fd32f8 95627->95628 95629 103907a 95627->95629 95688 fd3628 95627->95688 96002 fdc36b 86 API calls 95628->96002 96008 100cc5c 86 API calls 4 library calls 95629->96008 95633 10394df 95633->95688 96025 100cc5c 86 API calls 4 library calls 95633->96025 95634 103909a 95643 fcd645 53 API calls 95634->95643 95683 10391fa 95634->95683 95636 fd34eb Mailbox ___crtGetEnvironmentStringsW 95636->95634 95641 103926d 95636->95641 95659 1039438 95636->95659 95661 fcfe30 335 API calls 95636->95661 95667 fdc3c3 48 API calls 95636->95667 95679 fdf4ea 48 API calls 95636->95679 95682 fd351f 95636->95682 95686 1039394 95636->95686 95636->95688 95690 10393c5 95636->95690 96004 fcd9a0 53 API calls __cinit 95636->96004 96005 fcd8c0 53 API calls 95636->96005 96006 fdc2d6 48 API calls ___crtGetEnvironmentStringsW 95636->96006 96018 101cda2 82 API calls Mailbox 95636->96018 96019 10080e3 53 API calls 95636->96019 96020 fcd764 55 API calls 95636->96020 96021 fcdcae 50 API calls Mailbox 95636->96021 95637 fd3313 95637->95633 95637->95636 95637->95688 95995 fc2b7a 95637->95995 96017 100cc5c 86 API calls 4 library calls 95641->96017 95642 fcfe30 335 API calls 95645 1039407 95642->95645 95646 103910c 95643->95646 95655 fcd6e9 55 API calls 95645->95655 95645->95688 95649 1039220 95646->95649 95650 1039114 95646->95650 95647 fd33ce 95647->95636 96014 fc1caa 49 API calls 95649->96014 95662 1039128 95650->95662 95671 1039152 95650->95671 95655->95659 96022 100cc5c 86 API calls 4 library calls 95659->96022 95661->95636 95667->95636 95679->95636 95684 fc6eed 48 API calls 95682->95684 95685 fd3540 95682->95685 96013 100cc5c 86 API calls 4 library calls 95683->96013 95684->95685 95685->95688 95691 10394b0 95685->95691 95694 fd3585 95685->95694 95687 fdf4ea 48 API calls 95686->95687 95687->95690 95696 fd3635 Mailbox 95688->95696 96007 100cc5c 86 API calls 4 library calls 95688->96007 95690->95642 96024 fcdcae 50 API calls Mailbox 95691->96024 95693 fd3615 96003 fcdcae 50 API calls Mailbox 95693->96003 95694->95633 95694->95688 95694->95693 95696->94463 95697->94418 95698->94410 95699->94414 95700->94463 95701->94463 95702->94458 95703->94458 95704->94458 95706 fcfe50 95705->95706 95730 fcfe7e 95705->95730 95707 fdf4ea 48 API calls 95706->95707 95707->95730 95708 fd146e 95709 fc6eed 48 API calls 95708->95709 95731 fcffe1 95709->95731 95710 fd0509 96032 100cc5c 86 API calls 4 library calls 95710->96032 95713 fdf4ea 48 API calls 95713->95730 95715 fc6eed 48 API calls 95715->95730 95716 103a246 95719 fc6eed 48 API calls 95716->95719 95717 fd1473 96031 100cc5c 86 API calls 4 library calls 95717->96031 95718 103a922 95718->94463 95719->95731 95722 103a873 95722->94463 95723 fcd7f7 48 API calls 95723->95730 95724 103a30e 95724->95731 96029 ff97ed InterlockedDecrement 95724->96029 95725 fe0f0a 52 API calls __cinit 95725->95730 95727 ff97ed InterlockedDecrement 95727->95730 95728 103a973 96033 100cc5c 86 API calls 4 library calls 95728->96033 95730->95708 95730->95710 95730->95713 95730->95715 95730->95716 95730->95717 95730->95723 95730->95724 95730->95725 95730->95727 95730->95728 95730->95731 95733 fd15b5 95730->95733 96027 fd1820 335 API calls 2 library calls 95730->96027 96028 fd1d10 59 API calls Mailbox 95730->96028 95731->94463 95732 103a982 96030 100cc5c 86 API calls 4 library calls 95733->96030 95734->94458 95735->94458 95736->94458 95737->95530 95738->95531 95739->95582 95740->95539 95741->95576 95742->95582 95743->95596 95744->95555 95745->95579 95746->95586 95750->95582 95751->95582 95752->95582 95753->95580 95754->95596 95755->95596 95756->95573 95757->95596 95758->95596 95759->95582 95855 1006ca9 GetFileAttributesW 95760->95855 95764 100fa1c __ftell_nolock 95763->95764 95765 100fa44 95764->95765 95940 fcd286 48 API calls 95764->95940 95859 fc936c 95765->95859 95768 100fa5e 95769 100fa80 95768->95769 95770 100fb68 95768->95770 95780 100fb92 95768->95780 95771 fc936c 81 API calls 95769->95771 95772 fc41a9 136 API calls 95770->95772 95778 100fa8c _wcscpy _wcschr 95771->95778 95780->95606 95805 fc936c 81 API calls 95804->95805 95806 101702a 95805->95806 95807 fcb470 91 API calls 95806->95807 95808 101703a 95807->95808 95809 101705f 95808->95809 95810 fcfe30 335 API calls 95808->95810 95812 1017063 95809->95812 95981 fccdb9 48 API calls 95809->95981 95810->95809 95812->95606 95813->95605 95815 101e868 95814->95815 95816 101e84e 95814->95816 95983 101ccdc 48 API calls 95815->95983 95982 100cc5c 86 API calls 4 library calls 95816->95982 95819 101e871 95820 fcfe30 334 API calls 95819->95820 95821 101e8cf 95820->95821 95822 101e96a 95821->95822 95823 101e916 95821->95823 95847 101e860 Mailbox 95821->95847 95824 101e978 95822->95824 95828 101e9c7 95822->95828 95984 1009b72 48 API calls 95823->95984 95985 100a69d 48 API calls 95824->95985 95827 101e949 95830 fd45e0 334 API calls 95827->95830 95831 fc936c 81 API calls 95828->95831 95828->95847 95829 101e99b 95830->95847 95833 101e9e1 95831->95833 95847->95607 95854->95606 95856 1006529 95855->95856 95857 1006cc4 FindFirstFileW 95855->95857 95856->95606 95857->95856 95858 1006cd9 FindClose 95857->95858 95858->95856 95860 fc9384 95859->95860 95877 fc9380 95859->95877 95861 1034cbd __i64tow 95860->95861 95862 fc9398 95860->95862 95863 1034bbf 95860->95863 95869 fc93b0 __itow Mailbox _wcscpy 95860->95869 95943 fe172b 80 API calls 3 library calls 95862->95943 95864 1034ca5 95863->95864 95865 1034bc8 95863->95865 95944 fe172b 80 API calls 3 library calls 95864->95944 95865->95869 95870 1034be7 95865->95870 95868 fdf4ea 48 API calls 95871 fc93ba 95868->95871 95869->95868 95871->95877 95877->95768 95940->95765 95943->95869 95944->95869 95981->95812 95982->95847 95983->95819 95984->95827 95985->95829 95991 fcbd3f 95990->95991 95994 fcbd5a 95990->95994 95992 fcbdfa 48 API calls 95991->95992 95993 fcbd47 CharUpperBuffW 95992->95993 95993->95994 95994->95627 95996 fc2b8b 95995->95996 95997 103436a 95995->95997 95998 fdf4ea 48 API calls 95996->95998 95999 fc2b92 95998->95999 96000 fc2bb3 95999->96000 96026 fc2bce 48 API calls 95999->96026 96000->95647 96002->95637 96003->95688 96004->95636 96005->95636 96006->95636 96007->95696 96008->95637 96013->95688 96017->95688 96018->95636 96019->95636 96020->95636 96021->95636 96022->95688 96024->95633 96025->95688 96026->96000 96027->95730 96028->95730 96029->95731 96030->95731 96031->95722 96032->95718 96033->95732 96035 fc513f __wsetenvp 96034->96035 96036 1031b27 96035->96036 96037 fc5151 96035->96037 96039 fc6b4a 48 API calls 96036->96039 96038 fcbb85 48 API calls 96037->96038 96054 100bb64 96055 100bb71 96054->96055 96060 100bb77 96054->96060 96056 fe1c9d _free 47 API calls 96055->96056 96056->96060 96057 fe1c9d _free 47 API calls 96058 100bb88 96057->96058 96059 100bb9a 96058->96059 96061 fe1c9d _free 47 API calls 96058->96061 96060->96057 96060->96058 96061->96059 96062 1ada388 96063 1ada442 96062->96063 96075 1ada278 96063->96075 96076 1ada281 Sleep 96075->96076 96077 1ada28f 96076->96077 96078 1039c06 96089 fdd3be 96078->96089 96080 1039c1c 96081 1039c91 Mailbox 96080->96081 96098 fc1caa 49 API calls 96080->96098 96083 fd3200 335 API calls 96081->96083 96084 1039cc5 96083->96084 96087 103a7ab Mailbox 96084->96087 96100 100cc5c 86 API calls 4 library calls 96084->96100 96085 1039c71 96085->96084 96099 100b171 48 API calls 96085->96099 96090 fdd3dc 96089->96090 96091 fdd3ca 96089->96091 96093 fdd40b 96090->96093 96094 fdd3e2 96090->96094 96101 fcdcae 50 API calls Mailbox 96091->96101 96102 fcdcae 50 API calls Mailbox 96093->96102 96097 fdf4ea 48 API calls 96094->96097 96096 fdd3d4 96096->96080 96097->96096 96098->96085 96099->96081 96100->96087 96101->96096 96102->96096 96103 10319cb 96108 fc2322 96103->96108 96105 10319d1 96141 fe0f0a 52 API calls __cinit 96105->96141 96107 10319db 96109 fc2344 96108->96109 96142 fc26df 96109->96142 96114 fcd7f7 48 API calls 96115 fc2384 96114->96115 96116 fcd7f7 48 API calls 96115->96116 96117 fc238e 96116->96117 96118 fcd7f7 48 API calls 96117->96118 96119 fc2398 96118->96119 96120 fcd7f7 48 API calls 96119->96120 96121 fc23de 96120->96121 96122 fcd7f7 48 API calls 96121->96122 96123 fc24c1 96122->96123 96150 fc263f 96123->96150 96127 fc24f1 96128 fcd7f7 48 API calls 96127->96128 96129 fc24fb 96128->96129 96179 fc2745 96129->96179 96131 fc2546 96132 fc2556 GetStdHandle 96131->96132 96133 fc25b1 96132->96133 96134 103501d 96132->96134 96135 fc25b7 CoInitialize 96133->96135 96134->96133 96136 1035026 96134->96136 96135->96105 96186 10092d4 53 API calls 96136->96186 96138 103502d 96187 10099f9 CreateThread 96138->96187 96140 1035039 CloseHandle 96140->96135 96141->96107 96188 fc2854 96142->96188 96145 fc6a63 48 API calls 96146 fc234a 96145->96146 96147 fc272e 96146->96147 96202 fc27ec 6 API calls 96147->96202 96149 fc237a 96149->96114 96151 fcd7f7 48 API calls 96150->96151 96152 fc264f 96151->96152 96153 fcd7f7 48 API calls 96152->96153 96154 fc2657 96153->96154 96203 fc26a7 96154->96203 96157 fc26a7 48 API calls 96158 fc2667 96157->96158 96159 fcd7f7 48 API calls 96158->96159 96160 fc2672 96159->96160 96161 fdf4ea 48 API calls 96160->96161 96162 fc24cb 96161->96162 96163 fc22a4 96162->96163 96164 fc22b2 96163->96164 96165 fcd7f7 48 API calls 96164->96165 96166 fc22bd 96165->96166 96167 fcd7f7 48 API calls 96166->96167 96168 fc22c8 96167->96168 96169 fcd7f7 48 API calls 96168->96169 96170 fc22d3 96169->96170 96171 fcd7f7 48 API calls 96170->96171 96172 fc22de 96171->96172 96173 fc26a7 48 API calls 96172->96173 96174 fc22e9 96173->96174 96175 fdf4ea 48 API calls 96174->96175 96176 fc22f0 96175->96176 96177 1031fe7 96176->96177 96178 fc22f9 RegisterWindowMessageW 96176->96178 96178->96127 96180 fc2755 96179->96180 96181 1035f4d 96179->96181 96183 fdf4ea 48 API calls 96180->96183 96208 100c942 50 API calls 96181->96208 96185 fc275d 96183->96185 96184 1035f58 96185->96131 96186->96138 96187->96140 96209 10099df 54 API calls 96187->96209 96195 fc2870 96188->96195 96191 fc2870 48 API calls 96192 fc2864 96191->96192 96193 fcd7f7 48 API calls 96192->96193 96194 fc2716 96193->96194 96194->96145 96196 fcd7f7 48 API calls 96195->96196 96197 fc287b 96196->96197 96198 fcd7f7 48 API calls 96197->96198 96199 fc2883 96198->96199 96200 fcd7f7 48 API calls 96199->96200 96201 fc285c 96200->96201 96201->96191 96202->96149 96204 fcd7f7 48 API calls 96203->96204 96205 fc26b0 96204->96205 96206 fcd7f7 48 API calls 96205->96206 96207 fc265f 96206->96207 96207->96157 96208->96184 96210 fcb7b1 96219 fcc62c 96210->96219 96212 fcb7c2 96213 fcb7ec 96212->96213 96227 fcbc74 48 API calls 96212->96227 96215 fcba85 48 API calls 96213->96215 96217 fcb6b7 Mailbox 96215->96217 96216 fcb7e0 96218 fcba85 48 API calls 96216->96218 96218->96213 96228 fcbcce 96219->96228 96221 10339fd 96234 10026bc 88 API calls 4 library calls 96221->96234 96222 fcc63b 96222->96221 96224 fcc799 48 API calls 96222->96224 96225 fcc68b 96222->96225 96224->96222 96225->96212 96226 1033a0b 96227->96216 96229 fcbce8 96228->96229 96230 fcbcdb 96228->96230 96231 fdf4ea 48 API calls 96229->96231 96230->96222 96232 fcbcf2 96231->96232 96233 fdee75 48 API calls 96232->96233 96233->96230 96234->96226 96235 1039bec 96240 fd0ae0 Mailbox ___crtGetEnvironmentStringsW 96235->96240 96236 fcffe1 Mailbox 96238 fdf4ea 48 API calls 96238->96240 96239 fd1526 Mailbox 96327 100cc5c 86 API calls 4 library calls 96239->96327 96240->96236 96240->96238 96240->96239 96262 fcce19 48 API calls 96240->96262 96267 fcfec8 96240->96267 96269 101e822 335 API calls 96240->96269 96271 fcfe30 335 API calls 96240->96271 96272 103a706 96240->96272 96274 ff97ed InterlockedDecrement 96240->96274 96275 1016ff0 335 API calls 96240->96275 96278 1020d1d 96240->96278 96281 1020d09 96240->96281 96284 101f0ac 96240->96284 96316 100a6ef 96240->96316 96324 101ef61 82 API calls 2 library calls 96240->96324 96243 fdf4ea 48 API calls 96243->96267 96246 fd146e 96252 fc6eed 48 API calls 96246->96252 96248 103a246 96254 fc6eed 48 API calls 96248->96254 96249 fd1473 96329 100cc5c 86 API calls 4 library calls 96249->96329 96250 fd0509 96330 100cc5c 86 API calls 4 library calls 96250->96330 96251 103a922 96252->96236 96254->96236 96257 fc6eed 48 API calls 96257->96267 96258 103a873 96259 ff97ed InterlockedDecrement 96259->96267 96260 103a30e 96260->96236 96325 ff97ed InterlockedDecrement 96260->96325 96261 fcd7f7 48 API calls 96261->96267 96262->96240 96264 fe0f0a 52 API calls __cinit 96264->96267 96265 103a973 96331 100cc5c 86 API calls 4 library calls 96265->96331 96267->96236 96267->96243 96267->96246 96267->96248 96267->96249 96267->96250 96267->96257 96267->96259 96267->96260 96267->96261 96267->96264 96267->96265 96270 fd15b5 96267->96270 96322 fd1820 335 API calls 2 library calls 96267->96322 96323 fd1d10 59 API calls Mailbox 96267->96323 96268 103a982 96269->96240 96328 100cc5c 86 API calls 4 library calls 96270->96328 96271->96240 96326 100cc5c 86 API calls 4 library calls 96272->96326 96274->96240 96275->96240 96332 101f8ae 96278->96332 96280 1020d2d 96280->96240 96282 101f8ae 129 API calls 96281->96282 96283 1020d19 96282->96283 96283->96240 96285 fcd7f7 48 API calls 96284->96285 96286 101f0c0 96285->96286 96287 fcd7f7 48 API calls 96286->96287 96288 101f0c8 96287->96288 96289 fcd7f7 48 API calls 96288->96289 96290 101f0d0 96289->96290 96291 fc936c 81 API calls 96290->96291 96304 101f0de 96291->96304 96292 fc6a63 48 API calls 96292->96304 96293 fcc799 48 API calls 96293->96304 96294 101f2cc 96295 101f2f9 Mailbox 96294->96295 96434 fc6b68 48 API calls 96294->96434 96295->96240 96297 101f2b3 96300 fc518c 48 API calls 96297->96300 96298 101f2ce 96302 fc518c 48 API calls 96298->96302 96299 fc6eed 48 API calls 96299->96304 96301 101f2c0 96300->96301 96306 fc510d 48 API calls 96301->96306 96303 101f2dd 96302->96303 96307 fc510d 48 API calls 96303->96307 96304->96292 96304->96293 96304->96294 96304->96295 96304->96297 96304->96298 96304->96299 96305 fcbdfa 48 API calls 96304->96305 96308 fcbdfa 48 API calls 96304->96308 96313 fc518c 48 API calls 96304->96313 96314 fc936c 81 API calls 96304->96314 96315 fc510d 48 API calls 96304->96315 96309 101f175 CharUpperBuffW 96305->96309 96306->96294 96307->96294 96310 101f23a CharUpperBuffW 96308->96310 96311 fcd645 53 API calls 96309->96311 96433 fdd922 55 API calls 2 library calls 96310->96433 96311->96304 96313->96304 96314->96304 96315->96304 96317 100a6fb 96316->96317 96318 fdf4ea 48 API calls 96317->96318 96319 100a709 96318->96319 96320 100a717 96319->96320 96321 fcd7f7 48 API calls 96319->96321 96320->96240 96321->96320 96322->96267 96323->96267 96324->96240 96325->96236 96326->96239 96327->96236 96328->96236 96329->96258 96330->96251 96331->96268 96333 fc936c 81 API calls 96332->96333 96334 101f8ea 96333->96334 96357 101f92c Mailbox 96334->96357 96368 1020567 96334->96368 96336 101fb8b 96337 101fcfa 96336->96337 96342 101fb95 96336->96342 96416 1020688 89 API calls Mailbox 96337->96416 96340 101fd07 96341 101fd13 96340->96341 96340->96342 96341->96357 96381 101f70a 96342->96381 96343 fc936c 81 API calls 96353 101f984 Mailbox 96343->96353 96348 101fbc9 96395 fded18 96348->96395 96351 101fbe3 96414 100cc5c 86 API calls 4 library calls 96351->96414 96352 101fbfd 96354 fdc050 48 API calls 96352->96354 96353->96336 96353->96343 96353->96357 96412 10229e8 48 API calls ___crtGetEnvironmentStringsW 96353->96412 96413 101fda5 60 API calls 2 library calls 96353->96413 96358 101fc14 96354->96358 96356 101fbee GetCurrentProcess TerminateProcess 96356->96352 96357->96280 96359 fd1b90 48 API calls 96358->96359 96367 101fc3e 96358->96367 96360 101fc2d 96359->96360 96362 102040f 105 API calls 96360->96362 96361 101fd65 96361->96357 96364 101fd7e FreeLibrary 96361->96364 96362->96367 96363 fd1b90 48 API calls 96363->96367 96364->96357 96367->96361 96367->96363 96399 102040f 96367->96399 96415 fcdcae 50 API calls Mailbox 96367->96415 96369 fcbdfa 48 API calls 96368->96369 96370 1020582 CharLowerBuffW 96369->96370 96417 1001f11 96370->96417 96374 fcd7f7 48 API calls 96375 10205bb 96374->96375 96424 fc69e9 48 API calls ___crtGetEnvironmentStringsW 96375->96424 96377 10205d2 96378 fcb18b 48 API calls 96377->96378 96379 10205de Mailbox 96378->96379 96380 102061a Mailbox 96379->96380 96425 101fda5 60 API calls 2 library calls 96379->96425 96380->96353 96382 101f725 96381->96382 96386 101f77a 96381->96386 96383 fdf4ea 48 API calls 96382->96383 96384 101f747 96383->96384 96385 fdf4ea 48 API calls 96384->96385 96384->96386 96385->96384 96387 1020828 96386->96387 96388 1020a53 Mailbox 96387->96388 96393 102084b _strcat _wcscpy __wsetenvp 96387->96393 96388->96348 96389 fccf93 58 API calls 96389->96393 96390 fcd286 48 API calls 96390->96393 96391 fc936c 81 API calls 96391->96393 96392 fe395c 47 API calls __crtLCMapStringA_stat 96392->96393 96393->96388 96393->96389 96393->96390 96393->96391 96393->96392 96428 1008035 50 API calls __wsetenvp 96393->96428 96396 fded2d 96395->96396 96397 fdedc5 VirtualProtect 96396->96397 96398 fded93 96396->96398 96397->96398 96398->96351 96398->96352 96400 1020427 96399->96400 96411 1020443 96399->96411 96401 10204f8 96400->96401 96402 102042e 96400->96402 96403 102044f 96400->96403 96400->96411 96432 1009dc5 103 API calls 96401->96432 96429 1007c56 50 API calls _strlen 96402->96429 96431 fccdb9 48 API calls 96403->96431 96404 fe1c9d _free 47 API calls 96409 102051e 96404->96409 96408 1020438 96430 fccdb9 48 API calls 96408->96430 96409->96367 96411->96404 96411->96409 96412->96353 96413->96353 96414->96356 96415->96367 96416->96340 96418 1001f3b __wsetenvp 96417->96418 96419 1001f79 96418->96419 96420 1001ffa 96418->96420 96421 1001f6f 96418->96421 96419->96374 96419->96379 96420->96419 96427 fdd37a 60 API calls 96420->96427 96421->96419 96426 fdd37a 60 API calls 96421->96426 96424->96377 96425->96380 96426->96421 96427->96420 96428->96393 96429->96408 96430->96411 96431->96411 96432->96411 96433->96304 96434->96295 96435 103197b 96440 fddd94 96435->96440 96439 103198a 96441 fdf4ea 48 API calls 96440->96441 96442 fddd9c 96441->96442 96443 fdddb0 96442->96443 96448 fddf3d 96442->96448 96447 fe0f0a 52 API calls __cinit 96443->96447 96447->96439 96449 fddda8 96448->96449 96450 fddf46 96448->96450 96452 fdddc0 96449->96452 96480 fe0f0a 52 API calls __cinit 96450->96480 96453 fcd7f7 48 API calls 96452->96453 96454 fdddd7 GetVersionExW 96453->96454 96455 fc6a63 48 API calls 96454->96455 96456 fdde1a 96455->96456 96481 fddfb4 96456->96481 96459 fc6571 48 API calls 96463 fdde2e 96459->96463 96461 10324c8 96463->96461 96485 fddf77 96463->96485 96464 fddea4 GetCurrentProcess 96494 fddf5f LoadLibraryA GetProcAddress 96464->96494 96465 fddebb 96466 fddf31 GetSystemInfo 96465->96466 96467 fddee3 96465->96467 96470 fddf0e 96466->96470 96488 fde00c 96467->96488 96472 fddf1c FreeLibrary 96470->96472 96473 fddf21 96470->96473 96472->96473 96473->96443 96474 fddf29 GetSystemInfo 96477 fddf03 96474->96477 96475 fddef9 96491 fddff4 96475->96491 96477->96470 96479 fddf09 FreeLibrary 96477->96479 96479->96470 96480->96449 96482 fddfbd 96481->96482 96483 fcb18b 48 API calls 96482->96483 96484 fdde22 96483->96484 96484->96459 96495 fddf89 96485->96495 96499 fde01e 96488->96499 96492 fde00c 2 API calls 96491->96492 96493 fddf01 GetNativeSystemInfo 96492->96493 96493->96477 96494->96465 96496 fddea0 96495->96496 96497 fddf92 LoadLibraryA 96495->96497 96496->96464 96496->96465 96497->96496 96498 fddfa3 GetProcAddress 96497->96498 96498->96496 96500 fddef1 96499->96500 96501 fde027 LoadLibraryA 96499->96501 96500->96474 96500->96475 96501->96500 96502 fde038 GetProcAddress 96501->96502 96502->96500 96503 10319ba 96508 fdc75a 96503->96508 96507 10319c9 96509 fcd7f7 48 API calls 96508->96509 96510 fdc7c8 96509->96510 96516 fdd26c 96510->96516 96512 fdc865 96514 fdc881 96512->96514 96519 fdd1fa 48 API calls ___crtGetEnvironmentStringsW 96512->96519 96515 fe0f0a 52 API calls __cinit 96514->96515 96515->96507 96520 fdd298 96516->96520 96519->96512 96521 fdd28b 96520->96521 96522 fdd2a5 96520->96522 96521->96512 96522->96521 96523 fdd2ac RegOpenKeyExW 96522->96523 96523->96521 96524 fdd2c6 RegQueryValueExW 96523->96524 96525 fdd2fc RegCloseKey 96524->96525 96526 fdd2e7 96524->96526 96525->96521 96526->96525 96527 1038eb8 96531 100a635 96527->96531 96529 1038ec3 96530 100a635 84 API calls 96529->96530 96530->96529 96532 100a66f 96531->96532 96537 100a642 96531->96537 96532->96529 96533 100a671 96543 fdec4e 81 API calls 96533->96543 96534 100a676 96536 fc936c 81 API calls 96534->96536 96538 100a67d 96536->96538 96537->96532 96537->96533 96537->96534 96540 100a669 96537->96540 96539 fc510d 48 API calls 96538->96539 96539->96532 96542 fd4525 61 API calls ___crtGetEnvironmentStringsW 96540->96542 96542->96532 96543->96534 96544 fcef80 96547 fd3b70 96544->96547 96546 fcef8c 96548 fd3bc8 96547->96548 96549 fd42a5 96547->96549 96550 fd3bef 96548->96550 96552 1036fd1 96548->96552 96555 1036f7e 96548->96555 96561 1036f9b 96548->96561 96639 100cc5c 86 API calls 4 library calls 96549->96639 96551 fdf4ea 48 API calls 96550->96551 96553 fd3c18 96551->96553 96627 101ceca 335 API calls Mailbox 96552->96627 96556 fdf4ea 48 API calls 96553->96556 96555->96550 96557 1036f87 96555->96557 96570 fd3c2c __wsetenvp ___crtGetEnvironmentStringsW 96556->96570 96624 101d552 335 API calls Mailbox 96557->96624 96558 1036fbe 96626 100cc5c 86 API calls 4 library calls 96558->96626 96561->96558 96625 101da0e 335 API calls 2 library calls 96561->96625 96564 10373b0 96564->96546 96565 1037297 96635 100cc5c 86 API calls 4 library calls 96565->96635 96566 103737a 96645 100cc5c 86 API calls 4 library calls 96566->96645 96570->96549 96570->96565 96570->96566 96572 103707e 96570->96572 96574 fddce0 53 API calls 96570->96574 96575 fcd6e9 55 API calls 96570->96575 96578 fd40df 96570->96578 96579 fcd645 53 API calls 96570->96579 96582 10372d2 96570->96582 96584 fcfe30 335 API calls 96570->96584 96586 1037350 96570->96586 96587 10372e9 96570->96587 96588 1037363 96570->96588 96590 fd42f2 96570->96590 96593 fc6a63 48 API calls 96570->96593 96595 fdc050 48 API calls 96570->96595 96596 103714c 96570->96596 96597 fcd286 48 API calls 96570->96597 96598 fdf4ea 48 API calls 96570->96598 96600 fd3f2b 96570->96600 96601 103733f 96570->96601 96605 fdee75 48 API calls 96570->96605 96606 fc6eed 48 API calls 96570->96606 96610 10371e1 96570->96610 96619 fcd9a0 53 API calls __cinit 96570->96619 96620 fcd83d 53 API calls 96570->96620 96621 fccdb9 48 API calls 96570->96621 96622 fdc15c 48 API calls 96570->96622 96623 fdbecb 335 API calls 96570->96623 96629 fcdcae 50 API calls Mailbox 96570->96629 96630 101ccdc 48 API calls 96570->96630 96631 100a1eb 50 API calls 96570->96631 96628 100cc5c 86 API calls 4 library calls 96572->96628 96574->96570 96575->96570 96636 100cc5c 86 API calls 4 library calls 96578->96636 96579->96570 96637 100cc5c 86 API calls 4 library calls 96582->96637 96584->96570 96643 100cc5c 86 API calls 4 library calls 96586->96643 96638 100cc5c 86 API calls 4 library calls 96587->96638 96644 100cc5c 86 API calls 4 library calls 96588->96644 96646 100cc5c 86 API calls 4 library calls 96590->96646 96593->96570 96595->96570 96632 101ccdc 48 API calls 96596->96632 96597->96570 96598->96570 96600->96546 96642 100cc5c 86 API calls 4 library calls 96601->96642 96604 10371a1 96634 fdc15c 48 API calls 96604->96634 96605->96570 96606->96570 96610->96600 96641 100cc5c 86 API calls 4 library calls 96610->96641 96612 103715f 96612->96604 96633 101ccdc 48 API calls 96612->96633 96613 10371ce 96614 fdc050 48 API calls 96613->96614 96616 10371d6 96614->96616 96615 10371ab 96615->96549 96615->96613 96616->96610 96617 1037313 96616->96617 96640 100cc5c 86 API calls 4 library calls 96617->96640 96619->96570 96620->96570 96621->96570 96622->96570 96623->96570 96624->96600 96625->96558 96626->96552 96627->96570 96628->96600 96629->96570 96630->96570 96631->96570 96632->96612 96633->96612 96634->96615 96635->96578 96636->96600 96637->96587 96638->96600 96639->96600 96640->96600 96641->96600 96642->96600 96643->96600 96644->96600 96645->96600 96646->96564 96647 10319dd 96652 fc4a30 96647->96652 96649 10319f1 96672 fe0f0a 52 API calls __cinit 96649->96672 96651 10319fb 96653 fc4a40 __ftell_nolock 96652->96653 96654 fcd7f7 48 API calls 96653->96654 96655 fc4af6 96654->96655 96656 fc5374 50 API calls 96655->96656 96657 fc4aff 96656->96657 96673 fc363c 96657->96673 96660 fc518c 48 API calls 96661 fc4b18 96660->96661 96662 fc64cf 48 API calls 96661->96662 96663 fc4b29 96662->96663 96664 fcd7f7 48 API calls 96663->96664 96665 fc4b32 96664->96665 96679 fc49fb 96665->96679 96667 fc4b43 Mailbox 96667->96649 96668 fc61a6 48 API calls 96671 fc4b3d _wcscat Mailbox __wsetenvp 96668->96671 96669 fcce19 48 API calls 96669->96671 96670 fc64cf 48 API calls 96670->96671 96671->96667 96671->96668 96671->96669 96671->96670 96672->96651 96674 fc3649 __ftell_nolock 96673->96674 96693 fc366c GetFullPathNameW 96674->96693 96676 fc365a 96677 fc6a63 48 API calls 96676->96677 96678 fc3669 96677->96678 96678->96660 96680 fcbcce 48 API calls 96679->96680 96681 fc4a0a RegOpenKeyExW 96680->96681 96682 fc4a2b 96681->96682 96683 10341cc RegQueryValueExW 96681->96683 96682->96671 96684 1034246 RegCloseKey 96683->96684 96685 10341e5 96683->96685 96686 fdf4ea 48 API calls 96685->96686 96687 10341fe 96686->96687 96688 fc47b7 48 API calls 96687->96688 96689 1034208 RegQueryValueExW 96688->96689 96690 1034224 96689->96690 96692 103423b 96689->96692 96691 fc6a63 48 API calls 96690->96691 96691->96692 96692->96684 96694 fc368a 96693->96694 96694->96676 96695 fc3742 96696 fc374b 96695->96696 96697 fc37c8 96696->96697 96698 fc3769 96696->96698 96736 fc37c6 96696->96736 96702 fc37ce 96697->96702 96703 1031e00 96697->96703 96699 fc382c PostQuitMessage 96698->96699 96700 fc3776 96698->96700 96709 fc37b9 96699->96709 96707 1031e88 96700->96707 96708 fc3781 96700->96708 96701 fc37ab DefWindowProcW 96701->96709 96704 fc37f6 SetTimer RegisterWindowMessageW 96702->96704 96705 fc37d3 96702->96705 96750 fc2ff6 16 API calls 96703->96750 96704->96709 96713 fc381f CreatePopupMenu 96704->96713 96710 1031da3 96705->96710 96711 fc37da KillTimer 96705->96711 96755 1004ddd 60 API calls _memset 96707->96755 96714 fc3789 96708->96714 96715 fc3836 96708->96715 96723 1031da8 96710->96723 96724 1031ddc MoveWindow 96710->96724 96747 fc3847 Shell_NotifyIconW _memset 96711->96747 96712 1031e27 96751 fde312 335 API calls Mailbox 96712->96751 96713->96709 96719 fc3794 96714->96719 96720 1031e6d 96714->96720 96740 fdeb83 96715->96740 96726 fc379f 96719->96726 96727 1031e58 96719->96727 96720->96701 96754 ffa5f3 48 API calls 96720->96754 96721 1031e9a 96721->96701 96721->96709 96728 1031dcb SetFocus 96723->96728 96729 1031dac 96723->96729 96724->96709 96725 fc37ed 96748 fc390f DeleteObject DestroyWindow Mailbox 96725->96748 96726->96701 96752 fc3847 Shell_NotifyIconW _memset 96726->96752 96753 10055bd 70 API calls _memset 96727->96753 96728->96709 96729->96726 96733 1031db5 96729->96733 96749 fc2ff6 16 API calls 96733->96749 96735 1031e68 96735->96709 96736->96701 96738 1031e4c 96739 fc4ffc 67 API calls 96738->96739 96739->96736 96741 fdec1c 96740->96741 96742 fdeb9a _memset 96740->96742 96741->96709 96743 fc51af 50 API calls 96742->96743 96745 fdebc1 96743->96745 96744 fdec05 KillTimer SetTimer 96744->96741 96745->96744 96746 1033c7a Shell_NotifyIconW 96745->96746 96746->96744 96747->96725 96748->96709 96749->96709 96750->96712 96751->96726 96752->96738 96753->96735 96754->96736 96755->96721

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 643 feb043-feb080 call fef8a0 646 feb089-feb08b 643->646 647 feb082-feb084 643->647 648 feb0ac-feb0d9 646->648 649 feb08d-feb0a7 call fe7bda call fe7c0e call fe6e10 646->649 650 feb860-feb86c call fea70c 647->650 652 feb0db-feb0de 648->652 653 feb0e0-feb0e7 648->653 649->650 652->653 656 feb10b-feb110 652->656 657 feb0e9-feb100 call fe7bda call fe7c0e call fe6e10 653->657 658 feb105 653->658 661 feb11f-feb12d call ff3bf2 656->661 662 feb112-feb11c call fef82f 656->662 686 feb851-feb854 657->686 658->656 673 feb44b-feb45d 661->673 674 feb133-feb145 661->674 662->661 677 feb7b8-feb7d5 WriteFile 673->677 678 feb463-feb473 673->678 674->673 676 feb14b-feb183 call fe7a0d GetConsoleMode 674->676 676->673 699 feb189-feb18f 676->699 681 feb7d7-feb7df 677->681 682 feb7e1-feb7e7 GetLastError 677->682 684 feb55a-feb55f 678->684 685 feb479-feb484 678->685 687 feb7e9 681->687 682->687 688 feb565-feb56e 684->688 689 feb663-feb66e 684->689 691 feb48a-feb49a 685->691 692 feb81b-feb833 685->692 698 feb85e-feb85f 686->698 696 feb7ef-feb7f1 687->696 688->692 697 feb574 688->697 689->692 695 feb674 689->695 700 feb4a0-feb4a3 691->700 693 feb83e-feb84e call fe7c0e call fe7bda 692->693 694 feb835-feb838 692->694 693->686 694->693 703 feb83a-feb83c 694->703 704 feb67e-feb693 695->704 706 feb856-feb85c 696->706 707 feb7f3-feb7f5 696->707 708 feb57e-feb595 697->708 698->650 709 feb199-feb1bc GetConsoleCP 699->709 710 feb191-feb193 699->710 701 feb4e9-feb520 WriteFile 700->701 702 feb4a5-feb4be 700->702 701->682 715 feb526-feb538 701->715 713 feb4cb-feb4e7 702->713 714 feb4c0-feb4ca 702->714 703->698 716 feb699-feb69b 704->716 706->698 707->692 718 feb7f7-feb7fc 707->718 719 feb59b-feb59e 708->719 711 feb1c2-feb1ca 709->711 712 feb440-feb446 709->712 710->673 710->709 720 feb1d4-feb1d6 711->720 712->707 713->700 713->701 714->713 715->696 721 feb53e-feb54f 715->721 722 feb69d-feb6b3 716->722 723 feb6d8-feb719 WideCharToMultiByte 716->723 725 feb7fe-feb810 call fe7c0e call fe7bda 718->725 726 feb812-feb819 call fe7bed 718->726 727 feb5de-feb627 WriteFile 719->727 728 feb5a0-feb5b6 719->728 731 feb1dc-feb1fe 720->731 732 feb36b-feb36e 720->732 721->691 733 feb555 721->733 734 feb6c7-feb6d6 722->734 735 feb6b5-feb6c4 722->735 723->682 737 feb71f-feb721 723->737 725->686 726->686 727->682 730 feb62d-feb645 727->730 739 feb5cd-feb5dc 728->739 740 feb5b8-feb5ca 728->740 730->696 742 feb64b-feb658 730->742 743 feb217-feb223 call fe1688 731->743 744 feb200-feb215 731->744 745 feb375-feb3a2 732->745 746 feb370-feb373 732->746 733->696 734->716 734->723 735->734 747 feb727-feb75a WriteFile 737->747 739->719 739->727 740->739 742->708 749 feb65e 742->749 764 feb269-feb26b 743->764 765 feb225-feb239 743->765 750 feb271-feb283 call ff40f7 744->750 752 feb3a8-feb3ab 745->752 746->745 746->752 753 feb75c-feb776 747->753 754 feb77a-feb78e GetLastError 747->754 749->696 769 feb289 750->769 770 feb435-feb43b 750->770 758 feb3ad-feb3b0 752->758 759 feb3b2-feb3c5 call ff5884 752->759 753->747 761 feb778 753->761 756 feb794-feb796 754->756 756->687 763 feb798-feb7b0 756->763 758->759 766 feb407-feb40a 758->766 759->682 776 feb3cb-feb3d5 759->776 761->756 763->704 771 feb7b6 763->771 764->750 773 feb23f-feb254 call ff40f7 765->773 774 feb412-feb42d 765->774 766->720 772 feb410 766->772 777 feb28f-feb2c4 WideCharToMultiByte 769->777 770->687 771->696 772->770 773->770 785 feb25a-feb267 773->785 774->770 779 feb3fb-feb401 776->779 780 feb3d7-feb3ee call ff5884 776->780 777->770 781 feb2ca-feb2f0 WriteFile 777->781 779->766 780->682 788 feb3f4-feb3f5 780->788 781->682 784 feb2f6-feb30e 781->784 784->770 787 feb314-feb31b 784->787 785->777 787->779 789 feb321-feb34c WriteFile 787->789 788->779 789->682 790 feb352-feb359 789->790 790->770 791 feb35f-feb366 790->791 791->779
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: deb9602fbad7b3b00e44440efd0553adc570078fe39b51305c5df5626263e8f7
            • Instruction ID: 0b9d0910f2f9dbdca100ef6fed0d370941766e53d4f2d3e6482ec0399ff8553c
            • Opcode Fuzzy Hash: deb9602fbad7b3b00e44440efd0553adc570078fe39b51305c5df5626263e8f7
            • Instruction Fuzzy Hash: B9326B75B022A88BCB24CF16DC816EAB7B5FF46310F1840D9E44AA7A85D7349E81DF52

            Control-flow Graph

            APIs
            • GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,00FC3AA3,?), ref: 00FC3D45
            • IsDebuggerPresent.KERNEL32(?,?,?,?,00FC3AA3,?), ref: 00FC3D57
            • GetFullPathNameW.KERNEL32(00007FFF,?,?,01081148,01081130,?,?,?,?,00FC3AA3,?), ref: 00FC3DC8
              • Part of subcall function 00FC6430: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00FC3DEE,01081148,?,?,?,?,?,00FC3AA3,?), ref: 00FC6471
            • SetCurrentDirectoryW.KERNEL32(?,?,?,00FC3AA3,?), ref: 00FC3E48
            • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,010728F4,00000010), ref: 01031CCE
            • SetCurrentDirectoryW.KERNEL32(?,01081148,?,?,?,?,?,00FC3AA3,?), ref: 01031D06
            • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,0105DAB4,01081148,?,?,?,?,?,00FC3AA3,?), ref: 01031D89
            • ShellExecuteW.SHELL32(00000000,?,?,?,?,00FC3AA3), ref: 01031D90
              • Part of subcall function 00FC3E6E: GetSysColorBrush.USER32(0000000F), ref: 00FC3E79
              • Part of subcall function 00FC3E6E: LoadCursorW.USER32(00000000,00007F00), ref: 00FC3E88
              • Part of subcall function 00FC3E6E: LoadIconW.USER32(00000063), ref: 00FC3E9E
              • Part of subcall function 00FC3E6E: LoadIconW.USER32(000000A4), ref: 00FC3EB0
              • Part of subcall function 00FC3E6E: LoadIconW.USER32(000000A2), ref: 00FC3EC2
              • Part of subcall function 00FC3E6E: RegisterClassExW.USER32(?), ref: 00FC3F30
              • Part of subcall function 00FC36B8: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00FC36E6
              • Part of subcall function 00FC36B8: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00FC3707
              • Part of subcall function 00FC36B8: ShowWindow.USER32(00000000,?,?,?,?,00FC3AA3,?), ref: 00FC371B
              • Part of subcall function 00FC36B8: ShowWindow.USER32(00000000,?,?,?,?,00FC3AA3,?), ref: 00FC3724
              • Part of subcall function 00FC4FFC: _memset.LIBCMT ref: 00FC5022
              • Part of subcall function 00FC4FFC: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00FC50CB
            Strings
            • This is a third-party compiled AutoIt script., xrefs: 01031CC8
            • runas, xrefs: 01031D84
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Window$IconLoad$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundMessageNotifyPresentRegisterShellShell__memset
            • String ID: This is a third-party compiled AutoIt script.$runas
            • API String ID: 438480954-3287110873
            • Opcode ID: 5601ecf755041798bc72fea35bf7a95e67596146294cca9a0fb74a1bf52c4ad6
            • Instruction ID: 21e67571060ffae795ede2f79a5616da27e80a5ac82aa8761cffa1871328fe16
            • Opcode Fuzzy Hash: 5601ecf755041798bc72fea35bf7a95e67596146294cca9a0fb74a1bf52c4ad6
            • Instruction Fuzzy Hash: C4510631A0824AAECF21BBF0DE46FAD7B75AF55B40F00805CF0D156146CA7D564AAB21

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1074 fdddc0-fdde4f call fcd7f7 GetVersionExW call fc6a63 call fddfb4 call fc6571 1083 fdde55-fdde56 1074->1083 1084 10324c8-10324cb 1074->1084 1085 fdde58-fdde63 1083->1085 1086 fdde92-fddea2 call fddf77 1083->1086 1087 10324e4-10324e8 1084->1087 1088 10324cd 1084->1088 1089 fdde69-fdde6b 1085->1089 1090 103244e-1032454 1085->1090 1105 fddea4-fddec1 GetCurrentProcess call fddf5f 1086->1105 1106 fddec7-fddee1 1086->1106 1093 10324d3-10324dc 1087->1093 1094 10324ea-10324f3 1087->1094 1092 10324d0 1088->1092 1096 1032469-1032475 1089->1096 1097 fdde71-fdde74 1089->1097 1099 1032456-1032459 1090->1099 1100 103245e-1032464 1090->1100 1092->1093 1093->1087 1094->1092 1095 10324f5-10324f8 1094->1095 1095->1093 1101 1032477-103247a 1096->1101 1102 103247f-1032485 1096->1102 1103 1032495-1032498 1097->1103 1104 fdde7a-fdde89 1097->1104 1099->1086 1100->1086 1101->1086 1102->1086 1103->1086 1109 103249e-10324b3 1103->1109 1110 fdde8f 1104->1110 1111 103248a-1032490 1104->1111 1105->1106 1126 fddec3 1105->1126 1107 fddf31-fddf3b GetSystemInfo 1106->1107 1108 fddee3-fddef7 call fde00c 1106->1108 1117 fddf0e-fddf1a 1107->1117 1121 fddf29-fddf2f GetSystemInfo 1108->1121 1122 fddef9-fddf01 call fddff4 GetNativeSystemInfo 1108->1122 1114 10324b5-10324b8 1109->1114 1115 10324bd-10324c3 1109->1115 1110->1086 1111->1086 1114->1086 1115->1086 1119 fddf1c-fddf1f FreeLibrary 1117->1119 1120 fddf21-fddf26 1117->1120 1119->1120 1125 fddf03-fddf07 1121->1125 1122->1125 1125->1117 1128 fddf09-fddf0c FreeLibrary 1125->1128 1126->1106 1128->1117
            APIs
            • GetVersionExW.KERNEL32(?), ref: 00FDDDEC
            • GetCurrentProcess.KERNEL32(00000000,0105DC38,?,?), ref: 00FDDEAC
            • GetNativeSystemInfo.KERNELBASE(?,0105DC38,?,?), ref: 00FDDF01
            • FreeLibrary.KERNEL32(00000000,?,?), ref: 00FDDF0C
            • FreeLibrary.KERNEL32(00000000,?,?), ref: 00FDDF1F
            • GetSystemInfo.KERNEL32(?,0105DC38,?,?), ref: 00FDDF29
            • GetSystemInfo.KERNEL32(?,0105DC38,?,?), ref: 00FDDF35
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: InfoSystem$FreeLibrary$CurrentNativeProcessVersion
            • String ID:
            • API String ID: 3851250370-0
            • Opcode ID: eac56b52fa2c455ee9fffcf38107ca470e5ce19b465587886c12f2023c976dd5
            • Instruction ID: f59fcd6744bd3f8d885fb0d520e7882456b95324b6054ff08055546ecdcc0d41
            • Opcode Fuzzy Hash: eac56b52fa2c455ee9fffcf38107ca470e5ce19b465587886c12f2023c976dd5
            • Instruction Fuzzy Hash: CC61D2B180A384DFCF16CF6898C16ED7FB56F69300B1989DAD8859F30BC624C508DB65

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1146 fc406b-fc4083 CreateStreamOnHGlobal 1147 fc4085-fc409c FindResourceExW 1146->1147 1148 fc40a3-fc40a6 1146->1148 1149 1034f16-1034f25 LoadResource 1147->1149 1150 fc40a2 1147->1150 1149->1150 1151 1034f2b-1034f39 SizeofResource 1149->1151 1150->1148 1151->1150 1152 1034f3f-1034f4a LockResource 1151->1152 1152->1150 1153 1034f50-1034f6e 1152->1153 1153->1150
            APIs
            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00FC449E,?,?,00000000,00000001), ref: 00FC407B
            • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00FC449E,?,?,00000000,00000001), ref: 00FC4092
            • LoadResource.KERNEL32(?,00000000,?,?,00FC449E,?,?,00000000,00000001,?,?,?,?,?,?,00FC41FB), ref: 01034F1A
            • SizeofResource.KERNEL32(?,00000000,?,?,00FC449E,?,?,00000000,00000001,?,?,?,?,?,?,00FC41FB), ref: 01034F2F
            • LockResource.KERNEL32(00FC449E,?,?,00FC449E,?,?,00000000,00000001,?,?,?,?,?,?,00FC41FB,00000000), ref: 01034F42
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
            • String ID: SCRIPT
            • API String ID: 3051347437-3967369404
            • Opcode ID: 6015428926915abdde9b7026d9098ceacaf9f7602bbe8e7a6d460ccff5036335
            • Instruction ID: c1ad9303798bda8d625cd595298e4d0775fbc3bb84dc6976454c701b18d4d81c
            • Opcode Fuzzy Hash: 6015428926915abdde9b7026d9098ceacaf9f7602bbe8e7a6d460ccff5036335
            • Instruction Fuzzy Hash: 27115E75240701AFE7318B65DE89F277BB9EBD5B61F10416CF64286254DA72EC009B30
            APIs
            • GetFileAttributesW.KERNELBASE(?,01032F49), ref: 01006CB9
            • FindFirstFileW.KERNELBASE(?,?), ref: 01006CCA
            • FindClose.KERNEL32(00000000), ref: 01006CDA
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: FileFind$AttributesCloseFirst
            • String ID:
            • API String ID: 48322524-0
            • Opcode ID: 885f74983d585e83ee4854da78747bd8c4a78e0d1e4aa12a56bba4df381b19b0
            • Instruction ID: 5ebc349eeb1d77ca01cb42fb75ebc910159f47fec07b41f851ad445401c7c5b0
            • Opcode Fuzzy Hash: 885f74983d585e83ee4854da78747bd8c4a78e0d1e4aa12a56bba4df381b19b0
            • Instruction Fuzzy Hash: 61E0D875C104146792256778ED4D8F937EDDA05239F100759FDB1C11D0E776D91047D5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Exception@8Throwstd::exception::exception
            • String ID: @
            • API String ID: 3728558374-2766056989
            • Opcode ID: 2261adc1e4eb12adc72c25fb6c315efc22056ab9167cb1626173a529525818eb
            • Instruction ID: 3108efbdfd08bfc1a03d9199d4bc3e0029fdf9b0f15c511af3613319cd5b38a4
            • Opcode Fuzzy Hash: 2261adc1e4eb12adc72c25fb6c315efc22056ab9167cb1626173a529525818eb
            • Instruction Fuzzy Hash: D972D171D00209DFDF14DF98C881BAEB7B6EF44310F18805AEA45AB391D735AE45EB92
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: BuffCharUpper
            • String ID:
            • API String ID: 3964851224-0
            • Opcode ID: f233375ec54271a0da7e9d48cef9e812f488f42e3567fe1b83802dd0b8bcfd3a
            • Instruction ID: bf3beff0dc2d2204da0ec3b3a26ba679a6b677820cb92c2bc0b809f8075a3618
            • Opcode Fuzzy Hash: f233375ec54271a0da7e9d48cef9e812f488f42e3567fe1b83802dd0b8bcfd3a
            • Instruction Fuzzy Hash: 9B928E716083418FD724DF18C480F6ABBE6FF84308F18885EEA8A8B352D775E945DB52
            APIs
            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00FCE959
            • timeGetTime.WINMM ref: 00FCEBFA
            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00FCED2E
            • TranslateMessage.USER32(?), ref: 00FCED3F
            • DispatchMessageW.USER32(?), ref: 00FCED4A
            • LockWindowUpdate.USER32(00000000), ref: 00FCED79
            • DestroyWindow.USER32 ref: 00FCED85
            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00FCED9F
            • Sleep.KERNEL32(0000000A), ref: 01035270
            • TranslateMessage.USER32(?), ref: 010359F7
            • DispatchMessageW.USER32(?), ref: 01035A05
            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 01035A19
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Message$DispatchPeekTranslateWindow$DestroyLockSleepTimeUpdatetime
            • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
            • API String ID: 2641332412-570651680
            • Opcode ID: eaf50373145666254745dbec63f28e2b46dfdebd8070bb53895241095e07d2d3
            • Instruction ID: b9e6b26a9331ac743ae97f591ec78713c4e232d1a399e22703b6a97fc334481a
            • Opcode Fuzzy Hash: eaf50373145666254745dbec63f28e2b46dfdebd8070bb53895241095e07d2d3
            • Instruction Fuzzy Hash: E862E470508341CFEB21DF24C986FAA77E4BF94304F08496DF9C68B292DB799848DB52
            APIs
            • ___createFile.LIBCMT ref: 00FF5EC3
            • ___createFile.LIBCMT ref: 00FF5F04
            • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00FF5F2D
            • __dosmaperr.LIBCMT ref: 00FF5F34
            • GetFileType.KERNELBASE(00000000,?,?,?,?,?,00000000,00000109), ref: 00FF5F47
            • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00FF5F6A
            • __dosmaperr.LIBCMT ref: 00FF5F73
            • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00FF5F7C
            • __set_osfhnd.LIBCMT ref: 00FF5FAC
            • __lseeki64_nolock.LIBCMT ref: 00FF6016
            • __close_nolock.LIBCMT ref: 00FF603C
            • __chsize_nolock.LIBCMT ref: 00FF606C
            • __lseeki64_nolock.LIBCMT ref: 00FF607E
            • __lseeki64_nolock.LIBCMT ref: 00FF6176
            • __lseeki64_nolock.LIBCMT ref: 00FF618B
            • __close_nolock.LIBCMT ref: 00FF61EB
              • Part of subcall function 00FEEA9C: CloseHandle.KERNELBASE(00000000,0106EEF4,00000000,?,00FF6041,0106EEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 00FEEAEC
              • Part of subcall function 00FEEA9C: GetLastError.KERNEL32(?,00FF6041,0106EEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 00FEEAF6
              • Part of subcall function 00FEEA9C: __free_osfhnd.LIBCMT ref: 00FEEB03
              • Part of subcall function 00FEEA9C: __dosmaperr.LIBCMT ref: 00FEEB25
              • Part of subcall function 00FE7C0E: __getptd_noexit.LIBCMT ref: 00FE7C0E
            • __lseeki64_nolock.LIBCMT ref: 00FF620D
            • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00FF6342
            • ___createFile.LIBCMT ref: 00FF6361
            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000109), ref: 00FF636E
            • __dosmaperr.LIBCMT ref: 00FF6375
            • __free_osfhnd.LIBCMT ref: 00FF6395
            • __invoke_watson.LIBCMT ref: 00FF63C3
            • __wsopen_helper.LIBCMT ref: 00FF63DD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: __lseeki64_nolock$ErrorFileLast__dosmaperr$CloseHandle___create$__close_nolock__free_osfhnd$Type__chsize_nolock__getptd_noexit__invoke_watson__set_osfhnd__wsopen_helper
            • String ID: @
            • API String ID: 3896587723-2766056989
            • Opcode ID: da59d181c0359f08611647a0419cbaecdb4a437ff5b61f5a07aa9ea5a45f7093
            • Instruction ID: 28c3c12906ff94cb2ea89765d7fab28699d69145e6285bca0b14fb3292b6b010
            • Opcode Fuzzy Hash: da59d181c0359f08611647a0419cbaecdb4a437ff5b61f5a07aa9ea5a45f7093
            • Instruction Fuzzy Hash: 62221071D0460E9BEF299E68CC85BBD7B61EF04724F244268E761EB2F1CA398D40E751

            Control-flow Graph

            APIs
            • _wcscpy.LIBCMT ref: 0100FA96
            • _wcschr.LIBCMT ref: 0100FAA4
            • _wcscpy.LIBCMT ref: 0100FABB
            • _wcscat.LIBCMT ref: 0100FACA
            • _wcscat.LIBCMT ref: 0100FAE8
            • _wcscpy.LIBCMT ref: 0100FB09
            • __wsplitpath.LIBCMT ref: 0100FBE6
            • _wcscpy.LIBCMT ref: 0100FC0B
            • _wcscpy.LIBCMT ref: 0100FC1D
            • _wcscpy.LIBCMT ref: 0100FC32
            • _wcscat.LIBCMT ref: 0100FC47
            • _wcscat.LIBCMT ref: 0100FC59
            • _wcscat.LIBCMT ref: 0100FC6E
              • Part of subcall function 0100BFA4: _wcscmp.LIBCMT ref: 0100C03E
              • Part of subcall function 0100BFA4: __wsplitpath.LIBCMT ref: 0100C083
              • Part of subcall function 0100BFA4: _wcscpy.LIBCMT ref: 0100C096
              • Part of subcall function 0100BFA4: _wcscat.LIBCMT ref: 0100C0A9
              • Part of subcall function 0100BFA4: __wsplitpath.LIBCMT ref: 0100C0CE
              • Part of subcall function 0100BFA4: _wcscat.LIBCMT ref: 0100C0E4
              • Part of subcall function 0100BFA4: _wcscat.LIBCMT ref: 0100C0F7
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: _wcscat$_wcscpy$__wsplitpath$_wcschr_wcscmp
            • String ID: >>>AUTOIT SCRIPT<<<
            • API String ID: 2955681530-2806939583
            • Opcode ID: e20c6f3c24779b822979da663b5cf9aa858171c59d5e03d5b6b013630c843157
            • Instruction ID: 0a4d4690bf8bce26e25b6ac3b67d2d32e7859b24d77154da5cfca8d968fe31c9
            • Opcode Fuzzy Hash: e20c6f3c24779b822979da663b5cf9aa858171c59d5e03d5b6b013630c843157
            • Instruction Fuzzy Hash: 2991F271504246AFEB21EB54CD42F9AB3E8FF84300F04485DF99987292DB79F944DB92

            Control-flow Graph

            APIs
            • GetSysColorBrush.USER32(0000000F), ref: 00FC3F86
            • RegisterClassExW.USER32(00000030), ref: 00FC3FB0
            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00FC3FC1
            • InitCommonControlsEx.COMCTL32(?), ref: 00FC3FDE
            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00FC3FEE
            • LoadIconW.USER32(000000A9), ref: 00FC4004
            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00FC4013
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
            • API String ID: 2914291525-1005189915
            • Opcode ID: a5881019a50ef577bd00789ac4d4fa46362a52dddbe4820bf7b300e4da395675
            • Instruction ID: c980aac6fda1ef8abba550ee163d7c1996e2d74f5b01d621e25964c398ed6677
            • Opcode Fuzzy Hash: a5881019a50ef577bd00789ac4d4fa46362a52dddbe4820bf7b300e4da395675
            • Instruction Fuzzy Hash: 9D21F7B5E04318AFDB60DFE4E989BCDBBB4FB18704F00421AF591A6284D7BA05458F90

            Control-flow Graph

            APIs
              • Part of subcall function 0100BDB4: __time64.LIBCMT ref: 0100BDBE
              • Part of subcall function 00FC4517: _fseek.LIBCMT ref: 00FC452F
            • __wsplitpath.LIBCMT ref: 0100C083
              • Part of subcall function 00FE1DFC: __wsplitpath_helper.LIBCMT ref: 00FE1E3C
            • _wcscpy.LIBCMT ref: 0100C096
            • _wcscat.LIBCMT ref: 0100C0A9
            • __wsplitpath.LIBCMT ref: 0100C0CE
            • _wcscat.LIBCMT ref: 0100C0E4
            • _wcscat.LIBCMT ref: 0100C0F7
            • _wcscmp.LIBCMT ref: 0100C03E
              • Part of subcall function 0100C56D: _wcscmp.LIBCMT ref: 0100C65D
              • Part of subcall function 0100C56D: _wcscmp.LIBCMT ref: 0100C670
            • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 0100C2A1
            • DeleteFileW.KERNEL32(?,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0100C338
            • CopyFileW.KERNELBASE(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0100C34E
            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 0100C35F
            • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 0100C371
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath$Copy__time64__wsplitpath_helper_fseek_wcscpy
            • String ID:
            • API String ID: 2378138488-0
            • Opcode ID: df627efc82c8af095d8da0b6db3d865b0d6c4c8d660e1480a9832d868dc1f253
            • Instruction ID: ae4630c7af44c477731747bd1b2ef0d1e82790d007439c155a2f6a60b8c28b29
            • Opcode Fuzzy Hash: df627efc82c8af095d8da0b6db3d865b0d6c4c8d660e1480a9832d868dc1f253
            • Instruction Fuzzy Hash: 30C14CB1D00219AFEF21DF95CD81EDEB7BDEF59300F0081AAE649E6151DB349A848F61

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 957 fc3742-fc3762 959 fc3764-fc3767 957->959 960 fc37c2-fc37c4 957->960 961 fc37c8 959->961 962 fc3769-fc3770 959->962 960->959 963 fc37c6 960->963 967 fc37ce-fc37d1 961->967 968 1031e00-1031e2e call fc2ff6 call fde312 961->968 964 fc382c-fc3834 PostQuitMessage 962->964 965 fc3776-fc377b 962->965 966 fc37ab-fc37b3 DefWindowProcW 963->966 974 fc37f2-fc37f4 964->974 972 1031e88-1031e9c call 1004ddd 965->972 973 fc3781-fc3783 965->973 975 fc37b9-fc37bf 966->975 969 fc37f6-fc381d SetTimer RegisterWindowMessageW 967->969 970 fc37d3-fc37d4 967->970 1003 1031e33-1031e3a 968->1003 969->974 979 fc381f-fc382a CreatePopupMenu 969->979 976 1031da3-1031da6 970->976 977 fc37da-fc37ed KillTimer call fc3847 call fc390f 970->977 972->974 996 1031ea2 972->996 980 fc3789-fc378e 973->980 981 fc3836-fc3840 call fdeb83 973->981 974->975 989 1031da8-1031daa 976->989 990 1031ddc-1031dfb MoveWindow 976->990 977->974 979->974 985 fc3794-fc3799 980->985 986 1031e6d-1031e74 980->986 997 fc3845 981->997 994 fc379f-fc37a5 985->994 995 1031e58-1031e68 call 10055bd 985->995 986->966 992 1031e7a-1031e83 call ffa5f3 986->992 998 1031dcb-1031dd7 SetFocus 989->998 999 1031dac-1031daf 989->999 990->974 992->966 994->966 994->1003 995->974 996->966 997->974 998->974 999->994 1004 1031db5-1031dc6 call fc2ff6 999->1004 1003->966 1008 1031e40-1031e53 call fc3847 call fc4ffc 1003->1008 1004->974 1008->966
            APIs
            • DefWindowProcW.USER32(?,?,?,?), ref: 00FC37B3
            • KillTimer.USER32(?,00000001), ref: 00FC37DD
            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00FC3800
            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00FC380B
            • CreatePopupMenu.USER32 ref: 00FC381F
            • PostQuitMessage.USER32(00000000), ref: 00FC382E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
            • String ID: TaskbarCreated
            • API String ID: 129472671-2362178303
            • Opcode ID: 816189ac07adba3e3f41b916dac620d375d4369be9bc2ac8e591be40396bf2e5
            • Instruction ID: c985ad7b1ff1abd599b0cb6609ad88c5cd7f2bff02222b665f30ddf8a7d8d890
            • Opcode Fuzzy Hash: 816189ac07adba3e3f41b916dac620d375d4369be9bc2ac8e591be40396bf2e5
            • Instruction Fuzzy Hash: BE412AF660C1476BEB206B68DE4BF7936A5FF58390F04811DF5C296180CA7A9902B761

            Control-flow Graph

            APIs
            • GetSysColorBrush.USER32(0000000F), ref: 00FC3E79
            • LoadCursorW.USER32(00000000,00007F00), ref: 00FC3E88
            • LoadIconW.USER32(00000063), ref: 00FC3E9E
            • LoadIconW.USER32(000000A4), ref: 00FC3EB0
            • LoadIconW.USER32(000000A2), ref: 00FC3EC2
              • Part of subcall function 00FC4024: LoadImageW.USER32(00FC0000,00000063,00000001,00000010,00000010,00000000), ref: 00FC4048
            • RegisterClassExW.USER32(?), ref: 00FC3F30
              • Part of subcall function 00FC3F53: GetSysColorBrush.USER32(0000000F), ref: 00FC3F86
              • Part of subcall function 00FC3F53: RegisterClassExW.USER32(00000030), ref: 00FC3FB0
              • Part of subcall function 00FC3F53: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00FC3FC1
              • Part of subcall function 00FC3F53: InitCommonControlsEx.COMCTL32(?), ref: 00FC3FDE
              • Part of subcall function 00FC3F53: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00FC3FEE
              • Part of subcall function 00FC3F53: LoadIconW.USER32(000000A9), ref: 00FC4004
              • Part of subcall function 00FC3F53: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00FC4013
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
            • String ID: #$0$AutoIt v3
            • API String ID: 423443420-4155596026
            • Opcode ID: 6e4faf703c63eb5af72b81f59794c0ee2f47f2103a9ad3a614810588bee7495d
            • Instruction ID: 1f10aa46dae1f4501bc0b434a0c0f3c5567e7c2f32d56eba46f36c2c4414e85b
            • Opcode Fuzzy Hash: 6e4faf703c63eb5af72b81f59794c0ee2f47f2103a9ad3a614810588bee7495d
            • Instruction Fuzzy Hash: 1E2141B4E08304AFDB24DFA9E946A9DBFF5FF48710F00411AE684A2294D37A45019F91

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1021 1ada5b8-1ada666 1023 1ada66d-1ada693 call 1adb4c8 CreateFileW 1021->1023 1026 1ada69a-1ada6aa 1023->1026 1027 1ada695 1023->1027 1034 1ada6ac 1026->1034 1035 1ada6b1-1ada6cb VirtualAlloc 1026->1035 1028 1ada7e5-1ada7e9 1027->1028 1029 1ada82b-1ada82e 1028->1029 1030 1ada7eb-1ada7ef 1028->1030 1036 1ada831-1ada838 1029->1036 1032 1ada7fb-1ada7ff 1030->1032 1033 1ada7f1-1ada7f4 1030->1033 1037 1ada80f-1ada813 1032->1037 1038 1ada801-1ada80b 1032->1038 1033->1032 1034->1028 1039 1ada6cd 1035->1039 1040 1ada6d2-1ada6e9 ReadFile 1035->1040 1041 1ada88d-1ada8a2 1036->1041 1042 1ada83a-1ada845 1036->1042 1045 1ada815-1ada81f 1037->1045 1046 1ada823 1037->1046 1038->1037 1039->1028 1047 1ada6eb 1040->1047 1048 1ada6f0-1ada730 VirtualAlloc 1040->1048 1043 1ada8a4-1ada8af VirtualFree 1041->1043 1044 1ada8b2-1ada8ba 1041->1044 1049 1ada849-1ada855 1042->1049 1050 1ada847 1042->1050 1043->1044 1045->1046 1046->1029 1047->1028 1053 1ada737-1ada752 call 1adb718 1048->1053 1054 1ada732 1048->1054 1051 1ada869-1ada875 1049->1051 1052 1ada857-1ada867 1049->1052 1050->1041 1056 1ada877-1ada880 1051->1056 1057 1ada882-1ada888 1051->1057 1055 1ada88b 1052->1055 1060 1ada75d-1ada767 1053->1060 1054->1028 1055->1036 1056->1055 1057->1055 1061 1ada769-1ada798 call 1adb718 1060->1061 1062 1ada79a-1ada7ae call 1adb528 1060->1062 1061->1060 1068 1ada7b0 1062->1068 1069 1ada7b2-1ada7b6 1062->1069 1068->1028 1070 1ada7b8-1ada7bc CloseHandle 1069->1070 1071 1ada7c2-1ada7c6 1069->1071 1070->1071 1072 1ada7c8-1ada7d3 VirtualFree 1071->1072 1073 1ada7d6-1ada7df 1071->1073 1072->1073 1073->1023 1073->1028
            APIs
            • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 01ADA689
            • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 01ADA8AF
            Memory Dump Source
            • Source File: 00000000.00000002.1276220392.0000000001AD8000.00000040.00000020.00020000.00000000.sdmp, Offset: 01AD8000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1ad8000_NRFQFP.jbxd
            Similarity
            • API ID: CreateFileFreeVirtual
            • String ID:
            • API String ID: 204039940-0
            • Opcode ID: 966174affad311d6204548a92a281b1da250bb1a2b19b4c878101ea01a330e63
            • Instruction ID: b6cc49610cfc34bf4514b5def90f94c9d3bf4da43fc8b44958b1a116095eede3
            • Opcode Fuzzy Hash: 966174affad311d6204548a92a281b1da250bb1a2b19b4c878101ea01a330e63
            • Instruction Fuzzy Hash: B2A12974E00609EBDB14CFA4C999BEEBBB5FF48304F248159E516BB280D7759A41CF90

            Control-flow Graph

            APIs
            • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 00FC4A1D
            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 010341DB
            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0103421A
            • RegCloseKey.ADVAPI32(?), ref: 01034249
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: QueryValue$CloseOpen
            • String ID: Include$Software\AutoIt v3\AutoIt
            • API String ID: 1586453840-614718249
            • Opcode ID: 32e23861149e3deb74280736b4a9c9e79bacb58f833d0a3996e70f5db7bd6dc1
            • Instruction ID: b85a74cf1246cf0ff96701b23cadf225b4a44a20221153dc395adf4b71e74efb
            • Opcode Fuzzy Hash: 32e23861149e3deb74280736b4a9c9e79bacb58f833d0a3996e70f5db7bd6dc1
            • Instruction Fuzzy Hash: 211172B5600109BFEB10EBE8CE86EBF7BBCEF04344F000059B546E7151EA75AE01A750

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1156 fc36b8-fc3728 CreateWindowExW * 2 ShowWindow * 2
            APIs
            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00FC36E6
            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00FC3707
            • ShowWindow.USER32(00000000,?,?,?,?,00FC3AA3,?), ref: 00FC371B
            • ShowWindow.USER32(00000000,?,?,?,?,00FC3AA3,?), ref: 00FC3724
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Window$CreateShow
            • String ID: AutoIt v3$edit
            • API String ID: 1584632944-3779509399
            • Opcode ID: a63f71593903e670d968625bd39c387f2d0c8d50af0f097246ee620da589e4e4
            • Instruction ID: 1e4f67fb7b1822d4326b4dab3a95f5079b0bfb12fc06248f8800cbadb8dde726
            • Opcode Fuzzy Hash: a63f71593903e670d968625bd39c387f2d0c8d50af0f097246ee620da589e4e4
            • Instruction Fuzzy Hash: 3AF03A746482D07EE7315697AC48E6B2E7DEBC6F20B00001FBA84A6194C1BA0843EFB0

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1261 1ada388-1ada4b8 call 1ada278 CreateFileW 1267 1ada4bf-1ada4cf 1261->1267 1268 1ada4ba 1261->1268 1271 1ada4d6-1ada4f0 VirtualAlloc 1267->1271 1272 1ada4d1 1267->1272 1269 1ada56f-1ada574 1268->1269 1273 1ada4f4-1ada50b ReadFile 1271->1273 1274 1ada4f2 1271->1274 1272->1269 1275 1ada50d 1273->1275 1276 1ada50f-1ada549 call 1ada2b8 call 1ad9278 1273->1276 1274->1269 1275->1269 1281 1ada54b-1ada560 call 1ada308 1276->1281 1282 1ada565-1ada56d ExitProcess 1276->1282 1281->1282 1282->1269
            APIs
              • Part of subcall function 01ADA278: Sleep.KERNELBASE(000001F4), ref: 01ADA289
            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 01ADA4AE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1276220392.0000000001AD8000.00000040.00000020.00020000.00000000.sdmp, Offset: 01AD8000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1ad8000_NRFQFP.jbxd
            Similarity
            • API ID: CreateFileSleep
            • String ID: 24LBA83K1SKW1FTZP38LX9S4
            • API String ID: 2694422964-2867489259
            • Opcode ID: ca1ae687c46467f4a2ad97251de0ddf65a119b586e40e129c62edb8ed34d9081
            • Instruction ID: 138ce7e668b801cc2bd7d06c88a316771b1da849115404fe62b85fcb4fa8241c
            • Opcode Fuzzy Hash: ca1ae687c46467f4a2ad97251de0ddf65a119b586e40e129c62edb8ed34d9081
            • Instruction Fuzzy Hash: 0D51A370D04289DAEF11DBF4C958BEEBBB8AF15304F044199E6097B2C1D7B90B49CBA5

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1284 fc51af-fc51c5 1285 fc51cb-fc51e0 call fc6b0f 1284->1285 1286 fc52a2-fc52a6 1284->1286 1289 1033ca1-1033cb0 LoadStringW 1285->1289 1290 fc51e6-fc5206 call fc6a63 1285->1290 1293 1033cbb-1033cd3 call fc510d call fc4db1 1289->1293 1290->1293 1294 fc520c-fc5210 1290->1294 1303 fc5220-fc529d call fe0d50 call fc50e6 call fe0d23 Shell_NotifyIconW call fccb37 1293->1303 1306 1033cd9-1033cf7 call fc518c call fc4db1 call fc518c 1293->1306 1296 fc5216-fc521b call fc510d 1294->1296 1297 fc52a7-fc52b0 call fc6eed 1294->1297 1296->1303 1297->1303 1303->1286 1306->1303
            APIs
            • _memset.LIBCMT ref: 00FC522F
            • _wcscpy.LIBCMT ref: 00FC5283
            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00FC5293
            • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 01033CB0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: IconLoadNotifyShell_String_memset_wcscpy
            • String ID: Line:
            • API String ID: 1053898822-1585850449
            • Opcode ID: 0b22fc78fe2a9bd56aad4f4e5103abd78a085741eca98b4cfab0a9c9a4affd17
            • Instruction ID: f2b874494747a3e22fe4947b0646b58736797466461785aa25c3887a009f3988
            • Opcode Fuzzy Hash: 0b22fc78fe2a9bd56aad4f4e5103abd78a085741eca98b4cfab0a9c9a4affd17
            • Instruction Fuzzy Hash: 9831BE71508342AFD330EBA0DD47FDEB7D8AF84710F00451EF5C986081EBB8A589AB96
            APIs
              • Part of subcall function 00FC41A9: LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,00FC39FE,?,00000001), ref: 00FC41DB
            • _free.LIBCMT ref: 010336B7
            • _free.LIBCMT ref: 010336FE
              • Part of subcall function 00FCC833: __wsplitpath.LIBCMT ref: 00FCC93E
              • Part of subcall function 00FCC833: _wcscpy.LIBCMT ref: 00FCC953
              • Part of subcall function 00FCC833: _wcscat.LIBCMT ref: 00FCC968
              • Part of subcall function 00FCC833: SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 00FCC978
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: _free$CurrentDirectoryLibraryLoad__wsplitpath_wcscat_wcscpy
            • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
            • API String ID: 805182592-1757145024
            • Opcode ID: 09b394fd511ad190aea129be6a96e163652c439362f2e9e37d7ee51f4b7760fd
            • Instruction ID: bc26931a527692b8386f070a06f3fed244c5a0c4cfa435f0936c9ae6b42acf34
            • Opcode Fuzzy Hash: 09b394fd511ad190aea129be6a96e163652c439362f2e9e37d7ee51f4b7760fd
            • Instruction Fuzzy Hash: E491A571910219AFDF05EFA8CD92DEEB7B8BF48310F04406EF456AB291DB34A944DB50
            APIs
              • Part of subcall function 00FC5374: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,01081148,?,00FC61FF,?,00000000,00000001,00000000), ref: 00FC5392
              • Part of subcall function 00FC49FB: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 00FC4A1D
            • _wcscat.LIBCMT ref: 01032D80
            • _wcscat.LIBCMT ref: 01032DB5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: _wcscat$FileModuleNameOpen
            • String ID: \$\Include\
            • API String ID: 3592542968-2640467822
            • Opcode ID: c69460cf30ca9500c9032672e3cb084cfc3055e33a361bb8cf8dfeb7a442dee4
            • Instruction ID: 7c44f470e6b3ab253473e927a0824bf4a68b0186eb9690a79f08dd969eca2da6
            • Opcode Fuzzy Hash: c69460cf30ca9500c9032672e3cb084cfc3055e33a361bb8cf8dfeb7a442dee4
            • Instruction Fuzzy Hash: 5A51B3794083419BCB24EF59DA8299EB7F8FFA9700B50052EF6C483241DB399548DB52
            APIs
            • __getstream.LIBCMT ref: 00FE34FE
              • Part of subcall function 00FE7C0E: __getptd_noexit.LIBCMT ref: 00FE7C0E
            • @_EH4_CallFilterFunc@8.LIBCMT ref: 00FE3539
            • __wopenfile.LIBCMT ref: 00FE3549
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CallFilterFunc@8__getptd_noexit__getstream__wopenfile
            • String ID: <G
            • API String ID: 1820251861-2138716496
            • Opcode ID: 087cebe63eb135a24e0e5bb1edfb770199eed73a4f634700597ef811da940ba3
            • Instruction ID: abceff8c21ecb2c03dc61d29df89fe33e535f48ad2161682a323bad8e16f3376
            • Opcode Fuzzy Hash: 087cebe63eb135a24e0e5bb1edfb770199eed73a4f634700597ef811da940ba3
            • Instruction Fuzzy Hash: 6411E771E003869BDB11BF779C4A66E36E5AF45360F198425E415DB281EB38CA01B7A1
            APIs
            • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00FDD28B,SwapMouseButtons,00000004,?), ref: 00FDD2BC
            • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00FDD28B,SwapMouseButtons,00000004,?,?,?,?,00FDC865), ref: 00FDD2DD
            • RegCloseKey.KERNELBASE(00000000,?,?,00FDD28B,SwapMouseButtons,00000004,?,?,?,?,00FDC865), ref: 00FDD2FF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CloseOpenQueryValue
            • String ID: Control Panel\Mouse
            • API String ID: 3677997916-824357125
            • Opcode ID: 9f2d4056da2e0de929b67e240b523afdfaac4ee9011c9750d87afe4686a4237e
            • Instruction ID: 85b0849c070319b82f7e47b8bbcc31a66d0db61a7714b7b9c1c24ed459ce4a4c
            • Opcode Fuzzy Hash: 9f2d4056da2e0de929b67e240b523afdfaac4ee9011c9750d87afe4686a4237e
            • Instruction Fuzzy Hash: 11115E76A11208BFDB208FA4CC84EAF7BBDEF54754B14456AF805D7210D731DE41AB60
            APIs
            • CreateProcessW.KERNELBASE(?,00000000), ref: 01AD9A33
            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01AD9AC9
            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01AD9AEB
            Memory Dump Source
            • Source File: 00000000.00000002.1276220392.0000000001AD8000.00000040.00000020.00020000.00000000.sdmp, Offset: 01AD8000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1ad8000_NRFQFP.jbxd
            Similarity
            • API ID: Process$ContextCreateMemoryReadThreadWow64
            • String ID:
            • API String ID: 2438371351-0
            • Opcode ID: e15f4bf7b2d8a2436c426929ce02fd6b814221300437380313034c1dc15b3d9c
            • Instruction ID: b5252c4bd8982197c4d8d4fbbcf0260e29167184ea3c5501499ef8272205a8bc
            • Opcode Fuzzy Hash: e15f4bf7b2d8a2436c426929ce02fd6b814221300437380313034c1dc15b3d9c
            • Instruction Fuzzy Hash: 05620A30A14618DBEB24CFA4C840BDEB776EF58304F1091A9D20DEB394E7769E85CB59
            APIs
              • Part of subcall function 00FC4517: _fseek.LIBCMT ref: 00FC452F
              • Part of subcall function 0100C56D: _wcscmp.LIBCMT ref: 0100C65D
              • Part of subcall function 0100C56D: _wcscmp.LIBCMT ref: 0100C670
            • _free.LIBCMT ref: 0100C4DD
            • _free.LIBCMT ref: 0100C4E4
            • _free.LIBCMT ref: 0100C54F
              • Part of subcall function 00FE1C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,00FE7A85), ref: 00FE1CB1
              • Part of subcall function 00FE1C9D: GetLastError.KERNEL32(00000000,?,00FE7A85), ref: 00FE1CC3
            • _free.LIBCMT ref: 0100C557
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
            • String ID:
            • API String ID: 1552873950-0
            • Opcode ID: acbc9bddfc27afc87d88584c9959c104a0ea567534d53ec5d359cc2505f852cb
            • Instruction ID: 32fcc7371bb086534ae3876fe55e3bb5e4267d0751a26fdbe2f82e0feba98458
            • Opcode Fuzzy Hash: acbc9bddfc27afc87d88584c9959c104a0ea567534d53ec5d359cc2505f852cb
            • Instruction Fuzzy Hash: 575180B5904219AFEF159F68DC81BEDBBB9FF08304F10009EF648A3291DB755A808F18
            APIs
            • _memset.LIBCMT ref: 00FDEBB2
              • Part of subcall function 00FC51AF: _memset.LIBCMT ref: 00FC522F
              • Part of subcall function 00FC51AF: _wcscpy.LIBCMT ref: 00FC5283
              • Part of subcall function 00FC51AF: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00FC5293
            • KillTimer.USER32(?,00000001,?,?), ref: 00FDEC07
            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00FDEC16
            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 01033C88
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
            • String ID:
            • API String ID: 1378193009-0
            • Opcode ID: 02f6c0bea78ca890b8e512d41a00d4ed9ed370df6764af76754e0db8d44fa448
            • Instruction ID: fb573068061333449a37ea38a3c7cdfe62b0a2a3b93e70a2ce6d1a3d2b043fec
            • Opcode Fuzzy Hash: 02f6c0bea78ca890b8e512d41a00d4ed9ed370df6764af76754e0db8d44fa448
            • Instruction Fuzzy Hash: 2B212C709047849FE7339728C895BEBBFECAF41308F04008EE6CE5A241C7752984CB51
            APIs
            • _memset.LIBCMT ref: 01033725
            • GetOpenFileNameW.COMDLG32 ref: 0103376F
              • Part of subcall function 00FC660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00FC53B1,?,?,00FC61FF,?,00000000,00000001,00000000), ref: 00FC662F
              • Part of subcall function 00FC40A7: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00FC40C6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Name$Path$FileFullLongOpen_memset
            • String ID: X
            • API String ID: 3777226403-3081909835
            • Opcode ID: c17575a95acd81d1c6306615d1dfd34405aa861a08c31729ecf338687cc06b4e
            • Instruction ID: 20c517c89f2fa294413c4954457366d98487112e50e22bdc5b21640b8a5aa7c5
            • Opcode Fuzzy Hash: c17575a95acd81d1c6306615d1dfd34405aa861a08c31729ecf338687cc06b4e
            • Instruction Fuzzy Hash: 1521D871A101989FDB16DFD8CC46BDE7BF8AF88304F00405DE544EB241DBB866899F65
            APIs
            • GetTempPathW.KERNEL32(00000104,?), ref: 0100C72F
            • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 0100C746
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Temp$FileNamePath
            • String ID: aut
            • API String ID: 3285503233-3010740371
            • Opcode ID: c5eaaecda3f782fcbf2ca0a2ff284bcf5a2698514816215622145df26f6bb015
            • Instruction ID: 9082e87aefa5bd0b89a358256504ab9249c9cfa6abaaf4cec5288b06e0f5b640
            • Opcode Fuzzy Hash: c5eaaecda3f782fcbf2ca0a2ff284bcf5a2698514816215622145df26f6bb015
            • Instruction Fuzzy Hash: 89D0A57550030E7BDB5097E0DD4DFC6777C5710704F000150B7D0D50A1D779D5958B55
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: dc0b66c79e8fafab27ee0ab3f394cfb8390c59d82b246bde31bd1962d443927d
            • Instruction ID: 48130eca2155feae413dd64f4d8a4fb71ce0c204aa77e724948c5693c2674260
            • Opcode Fuzzy Hash: dc0b66c79e8fafab27ee0ab3f394cfb8390c59d82b246bde31bd1962d443927d
            • Instruction Fuzzy Hash: 6EF16B716043029FD710DF28C984B6EB7E5BF88314F14896EF9959B391DB39E909CB82
            APIs
            • _memset.LIBCMT ref: 00FC5022
            • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00FC50CB
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: IconNotifyShell__memset
            • String ID:
            • API String ID: 928536360-0
            • Opcode ID: c026f718d918659a1b4d9bc55659d7d1d462579faadc4d61857aced9f8e66691
            • Instruction ID: 5715a32215b9612a51a9a640f393d4543ae963204ae9b3007dabda5211288635
            • Opcode Fuzzy Hash: c026f718d918659a1b4d9bc55659d7d1d462579faadc4d61857aced9f8e66691
            • Instruction Fuzzy Hash: 6631ADB1908702CFC721DF64D985B9BBBE8BF48704F00092EE5DAC2240E7766985CB92
            APIs
            • __FF_MSGBANNER.LIBCMT ref: 00FE3973
              • Part of subcall function 00FE81C2: __NMSG_WRITE.LIBCMT ref: 00FE81E9
              • Part of subcall function 00FE81C2: __NMSG_WRITE.LIBCMT ref: 00FE81F3
            • __NMSG_WRITE.LIBCMT ref: 00FE397A
              • Part of subcall function 00FE821F: GetModuleFileNameW.KERNEL32(00000000,01080312,00000104,00000000,00000001,00000000), ref: 00FE82B1
              • Part of subcall function 00FE821F: ___crtMessageBoxW.LIBCMT ref: 00FE835F
              • Part of subcall function 00FE1145: ___crtCorExitProcess.LIBCMT ref: 00FE114B
              • Part of subcall function 00FE1145: ExitProcess.KERNEL32 ref: 00FE1154
              • Part of subcall function 00FE7C0E: __getptd_noexit.LIBCMT ref: 00FE7C0E
            • RtlAllocateHeap.NTDLL(018A0000,00000000,00000001,00000001,00000000,?,?,00FDF507,?,0000000E), ref: 00FE399F
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
            • String ID:
            • API String ID: 1372826849-0
            • Opcode ID: b87a259abf68ea53afc3f67ac13931d289153583b1e9f8f34fc02dc9b340ae8b
            • Instruction ID: 852aee923a689c8563a268e0a8fd4ccdece41078eb1158376a3fd820a0ece713
            • Opcode Fuzzy Hash: b87a259abf68ea53afc3f67ac13931d289153583b1e9f8f34fc02dc9b340ae8b
            • Instruction Fuzzy Hash: C401F9327453819AE7213B2BDC4EB2E339A9B81770F210026F545DB286DFBDDD006661
            APIs
            • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,0100C385,?,?,?,?,?,00000004), ref: 0100C6F2
            • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,0100C385,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 0100C708
            • CloseHandle.KERNEL32(00000000,?,0100C385,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 0100C70F
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: File$CloseCreateHandleTime
            • String ID:
            • API String ID: 3397143404-0
            • Opcode ID: 750ee12562edc9bed8c4c1e32adef8cb14bcc68b0ab63ce96d55d15e597904e7
            • Instruction ID: f6d2c430cf01dce4150db33b0e03422f2ef5419c41ce7ca0dd56cdbf16b49f53
            • Opcode Fuzzy Hash: 750ee12562edc9bed8c4c1e32adef8cb14bcc68b0ab63ce96d55d15e597904e7
            • Instruction Fuzzy Hash: 1DE08636181214B7E7321A94AD49FCA7F58AB15B61F104210FF94690E497B625118798
            APIs
            • _free.LIBCMT ref: 0100BB72
              • Part of subcall function 00FE1C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,00FE7A85), ref: 00FE1CB1
              • Part of subcall function 00FE1C9D: GetLastError.KERNEL32(00000000,?,00FE7A85), ref: 00FE1CC3
            • _free.LIBCMT ref: 0100BB83
            • _free.LIBCMT ref: 0100BB95
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: _free$ErrorFreeHeapLast
            • String ID:
            • API String ID: 776569668-0
            • Opcode ID: 8d6c99314b0704041c66cbc9d98ad607d1a0ae96d99a55b8255782f8bd4ba31d
            • Instruction ID: 774e5e4f8c5ef652111c2d7cdfbca1bbab82d3e6b9a3284f7bdadd6f1812e574
            • Opcode Fuzzy Hash: 8d6c99314b0704041c66cbc9d98ad607d1a0ae96d99a55b8255782f8bd4ba31d
            • Instruction Fuzzy Hash: 72E0C2B1240B8043FA31653F6E48EF333CC1F04310B24084DB699E3182CE78E44094A4
            APIs
              • Part of subcall function 00FC22A4: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00FC24F1), ref: 00FC2303
            • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00FC25A1
            • CoInitialize.OLE32(00000000), ref: 00FC2618
            • CloseHandle.KERNEL32(00000000), ref: 0103503A
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Handle$CloseInitializeMessageRegisterWindow
            • String ID:
            • API String ID: 3815369404-0
            • Opcode ID: 52a6dee7613484692f4da307feaac3d6f09e0ee5ec86a0f4fcf03a2b54cfb74a
            • Instruction ID: 14313c55a4d9c3cdcd44c8b62110c039c83e7e069d08a94eb1ff54cd2a46e92d
            • Opcode Fuzzy Hash: 52a6dee7613484692f4da307feaac3d6f09e0ee5ec86a0f4fcf03a2b54cfb74a
            • Instruction Fuzzy Hash: 2271ADF49092418FC764EF5AE59199DBBA5FF68344B84812ED0C9C7399CB3E4422DF14
            APIs
            • IsThemeActive.UXTHEME ref: 00FC3A73
              • Part of subcall function 00FE1405: __lock.LIBCMT ref: 00FE140B
              • Part of subcall function 00FC3ADB: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00FC3AF3
              • Part of subcall function 00FC3ADB: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00FC3B08
              • Part of subcall function 00FC3D19: GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,00FC3AA3,?), ref: 00FC3D45
              • Part of subcall function 00FC3D19: IsDebuggerPresent.KERNEL32(?,?,?,?,00FC3AA3,?), ref: 00FC3D57
              • Part of subcall function 00FC3D19: GetFullPathNameW.KERNEL32(00007FFF,?,?,01081148,01081130,?,?,?,?,00FC3AA3,?), ref: 00FC3DC8
              • Part of subcall function 00FC3D19: SetCurrentDirectoryW.KERNEL32(?,?,?,00FC3AA3,?), ref: 00FC3E48
            • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00FC3AB3
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme__lock
            • String ID:
            • API String ID: 924797094-0
            • Opcode ID: 1cd233f4f39db60b53547612655e7b1564c695c74406eb91915bca28a00fef09
            • Instruction ID: b55777f57a38cefbd668ada431a972e302798344a50e30aac474da061bec7da9
            • Opcode Fuzzy Hash: 1cd233f4f39db60b53547612655e7b1564c695c74406eb91915bca28a00fef09
            • Instruction Fuzzy Hash: 23119D755083419FC310EF6AE845A0EBBE9FFA4760F00891EB5C4832A1DBB98542DF92
            APIs
            • ___lock_fhandle.LIBCMT ref: 00FEEA29
            • __close_nolock.LIBCMT ref: 00FEEA42
              • Part of subcall function 00FE7BDA: __getptd_noexit.LIBCMT ref: 00FE7BDA
              • Part of subcall function 00FE7C0E: __getptd_noexit.LIBCMT ref: 00FE7C0E
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: __getptd_noexit$___lock_fhandle__close_nolock
            • String ID:
            • API String ID: 1046115767-0
            • Opcode ID: 3696f1e6c5e622ca0079644fa89560d3e2086231c4966ea008a63ba6a7bf4107
            • Instruction ID: fc8254b8e8eea4021c973d0a09e4f27f8b6c82a0e3cb7008b27ebb7adb91125e
            • Opcode Fuzzy Hash: 3696f1e6c5e622ca0079644fa89560d3e2086231c4966ea008a63ba6a7bf4107
            • Instruction Fuzzy Hash: 3911E572809BD08AD311BF6AEC4135C3A616F81731F264368E4A05F1E2CBBC9C00F7A5
            APIs
              • Part of subcall function 00FE395C: __FF_MSGBANNER.LIBCMT ref: 00FE3973
              • Part of subcall function 00FE395C: __NMSG_WRITE.LIBCMT ref: 00FE397A
              • Part of subcall function 00FE395C: RtlAllocateHeap.NTDLL(018A0000,00000000,00000001,00000001,00000000,?,?,00FDF507,?,0000000E), ref: 00FE399F
            • std::exception::exception.LIBCMT ref: 00FDF51E
            • __CxxThrowException@8.LIBCMT ref: 00FDF533
              • Part of subcall function 00FE6805: RaiseException.KERNEL32(?,?,0000000E,01076A30,?,?,?,00FDF538,0000000E,01076A30,?,00000001), ref: 00FE6856
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
            • String ID:
            • API String ID: 3902256705-0
            • Opcode ID: b294cb06f3f4695b8d4849e54d217506c0f1b3882e2c3a56a0fc740438477b3f
            • Instruction ID: 176896fd978d908fca81bd071c9b26ff3f00ad62f718546c27d97523344dc557
            • Opcode Fuzzy Hash: b294cb06f3f4695b8d4849e54d217506c0f1b3882e2c3a56a0fc740438477b3f
            • Instruction Fuzzy Hash: 97F0F47150424E67D704FF9AEC01EDE77A9AF11364F284136F906D2381CB709654A7A5
            APIs
              • Part of subcall function 00FE7C0E: __getptd_noexit.LIBCMT ref: 00FE7C0E
            • __lock_file.LIBCMT ref: 00FE3629
              • Part of subcall function 00FE4E1C: __lock.LIBCMT ref: 00FE4E3F
            • __fclose_nolock.LIBCMT ref: 00FE3634
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
            • String ID:
            • API String ID: 2800547568-0
            • Opcode ID: fb3be41bacf79b0ec1869cf33a699d839d417e3f5b1b24de54dd665754ae3bfc
            • Instruction ID: 9468142635bbab670eba5fc709b8bb6c55322800036aeaa450f5c1c4e598effb
            • Opcode Fuzzy Hash: fb3be41bacf79b0ec1869cf33a699d839d417e3f5b1b24de54dd665754ae3bfc
            • Instruction Fuzzy Hash: 1AF02432C01384AAD7117B778C0EB6E7AA06F50330F25810AE424EB2C1CB7C8A01BF55
            APIs
            • CreateProcessW.KERNELBASE(?,00000000), ref: 01AD9A33
            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01AD9AC9
            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01AD9AEB
            Memory Dump Source
            • Source File: 00000000.00000002.1276220392.0000000001AD8000.00000040.00000020.00020000.00000000.sdmp, Offset: 01AD8000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1ad8000_NRFQFP.jbxd
            Similarity
            • API ID: Process$ContextCreateMemoryReadThreadWow64
            • String ID:
            • API String ID: 2438371351-0
            • Opcode ID: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
            • Instruction ID: b3254cef00fc160913454ddf077bcf3b4f90b81927ab1634ec119820693db7bc
            • Opcode Fuzzy Hash: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
            • Instruction Fuzzy Hash: E312CE24E14658C6EB24DF64D8507DEB232EF68300F10A4E9910DEB7A5E77A4F81CF5A
            APIs
            • __flush.LIBCMT ref: 00FE2A0B
              • Part of subcall function 00FE7C0E: __getptd_noexit.LIBCMT ref: 00FE7C0E
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: __flush__getptd_noexit
            • String ID:
            • API String ID: 4101623367-0
            • Opcode ID: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
            • Instruction ID: 8eb94e7e149a928de818e98cadb71949269179b6bc4fbb155c8a7a5f326f87b7
            • Opcode Fuzzy Hash: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
            • Instruction Fuzzy Hash: 1F41A471A007869FDB6C8F6BC88056E77AEAF44760B24853DE845C7241FB74DD41BB40
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ProtectVirtual
            • String ID:
            • API String ID: 544645111-0
            • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
            • Instruction ID: e5ae77b95d9ece87b2c59ffeec7fcd0d319544b0e6b179d37762529b36311034
            • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
            • Instruction Fuzzy Hash: FF31D571A001059BC719EF58C480A69FBB7FF49350B6886A6E809CF356DB30EDC1EB90
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: _free
            • String ID:
            • API String ID: 269201875-0
            • Opcode ID: 4f4f27e9daa84a8a212d428f39ec0a091cbd4701a48bafbd777493ec6b3b9db4
            • Instruction ID: 6308a1a4d380f5f515976bafd870c5d3eefd2d6de5f57b0c36f67692ac0dd60c
            • Opcode Fuzzy Hash: 4f4f27e9daa84a8a212d428f39ec0a091cbd4701a48bafbd777493ec6b3b9db4
            • Instruction Fuzzy Hash: C531A275204638DFCB01AF10D4917AEBBB1FF49320F14844AE9D92B389DB74A905CBC1
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ClearVariant
            • String ID:
            • API String ID: 1473721057-0
            • Opcode ID: e0025cef4afb6422609013f6709b5e6a2ea246b81f95533c191c87191e7d55c3
            • Instruction ID: 365846031f5e3d0cff3767dc49ed7298f603f6e8d2695c07bb1c3cc35940c9be
            • Opcode Fuzzy Hash: e0025cef4afb6422609013f6709b5e6a2ea246b81f95533c191c87191e7d55c3
            • Instruction Fuzzy Hash: D0418A745046018FDB25DF18C484B1ABBE2BF85308F1889ADE99A4B362C776F845DF42
            APIs
              • Part of subcall function 00FC4214: FreeLibrary.KERNEL32(00000000,?), ref: 00FC4247
            • LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,00FC39FE,?,00000001), ref: 00FC41DB
              • Part of subcall function 00FC4291: FreeLibrary.KERNEL32(00000000), ref: 00FC42C4
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Library$Free$Load
            • String ID:
            • API String ID: 2391024519-0
            • Opcode ID: 9f5754bacaddfe98fd89fa05db8e874d64f08e01c1d292ce5e0979e533fac5fd
            • Instruction ID: 61672deac653bfb3cde1bc95d82af29855de2e3c2f91ad289e80e1262a8af469
            • Opcode Fuzzy Hash: 9f5754bacaddfe98fd89fa05db8e874d64f08e01c1d292ce5e0979e533fac5fd
            • Instruction Fuzzy Hash: 99119431600207AADB14EB64DE27F9E77A99F50700F10842DB596EA1C1DA79AA05AB60
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ClearVariant
            • String ID:
            • API String ID: 1473721057-0
            • Opcode ID: 5a39f5dbedcc69993ca9b3e857af1a0345bb0e8a51c9d210085d168a0820c031
            • Instruction ID: c9dd13b9a8846e1c26ba36d93aaf7e67cc98994718ebb8a71aca4cfd7cdf6bf9
            • Opcode Fuzzy Hash: 5a39f5dbedcc69993ca9b3e857af1a0345bb0e8a51c9d210085d168a0820c031
            • Instruction Fuzzy Hash: 62214674508201CFDB25DF68D844F1ABBE2BF84304F18496EE9964B321CB36E845EF52
            APIs
            • ___lock_fhandle.LIBCMT ref: 00FEAFC0
              • Part of subcall function 00FE7BDA: __getptd_noexit.LIBCMT ref: 00FE7BDA
              • Part of subcall function 00FE7C0E: __getptd_noexit.LIBCMT ref: 00FE7C0E
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: __getptd_noexit$___lock_fhandle
            • String ID:
            • API String ID: 1144279405-0
            • Opcode ID: 7c7ee7091f87ae03e1aed31f5f31d2897b4b6f4a90837ae583fdeac404012921
            • Instruction ID: 6680f693ce3556ecc58ce91ac914635b629c6a42ed331a8f6a93ba492f764b6a
            • Opcode Fuzzy Hash: 7c7ee7091f87ae03e1aed31f5f31d2897b4b6f4a90837ae583fdeac404012921
            • Instruction Fuzzy Hash: A111B2728086C09FD7127FA69C0135E3A619F81331F254240E5B05F1E2C7BDAD00BBA1
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: LibraryLoad
            • String ID:
            • API String ID: 1029625771-0
            • Opcode ID: e908df7db2011151d19b897d4a4948494f90a1a3426dd436a38c65c5f4b6a17e
            • Instruction ID: 73625752952f899a66eeadd8fc7efd8b9314c6bd42b45e56eaaf45b7e4ec1612
            • Opcode Fuzzy Hash: e908df7db2011151d19b897d4a4948494f90a1a3426dd436a38c65c5f4b6a17e
            • Instruction Fuzzy Hash: 3301123150010AAE9B05EF64CD92DEEBB78AB20344F108169A566961A5EA34A649DB60
            APIs
            • __lock_file.LIBCMT ref: 00FE2AED
              • Part of subcall function 00FE7C0E: __getptd_noexit.LIBCMT ref: 00FE7C0E
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: __getptd_noexit__lock_file
            • String ID:
            • API String ID: 2597487223-0
            • Opcode ID: 7f49e30c22dcff2b862ff7b2fa450afaac344b3a1106b5f5d3c2d00838d4e51a
            • Instruction ID: 41cc2788c9a153a40ce99c7ab2e4cb379e21f8a14f5babf4c323fd745493e977
            • Opcode Fuzzy Hash: 7f49e30c22dcff2b862ff7b2fa450afaac344b3a1106b5f5d3c2d00838d4e51a
            • Instruction Fuzzy Hash: 3BF0C231900289EADF61BF678C0239F36A9BF40720F144429B410DB191EB7C8A92FB51
            APIs
            • FreeLibrary.KERNEL32(?,?,?,?,?,00FC39FE,?,00000001), ref: 00FC4286
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: FreeLibrary
            • String ID:
            • API String ID: 3664257935-0
            • Opcode ID: 2513ea2ce0699ad877daa63db7480cef01e510d99cd92a9e54568f8992dc2e2f
            • Instruction ID: 58d59bdc1b09a3272b64145d077d165fb05e3bf7fdbf040feb110d6eff3c3793
            • Opcode Fuzzy Hash: 2513ea2ce0699ad877daa63db7480cef01e510d99cd92a9e54568f8992dc2e2f
            • Instruction Fuzzy Hash: EAF03071905703DFCB349F65D9A6E96B7E4BF153253248A3EF1D682610C732A844EF50
            APIs
            • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00FC40C6
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: LongNamePath
            • String ID:
            • API String ID: 82841172-0
            • Opcode ID: 2eb71682e2f5e7db42a9add31715e14eb81a9d771fff93a1368e8220c2350518
            • Instruction ID: ebc774f60cd3d6f9d15e20a48725388168dd039bfd8e3d57b5b92dda6e492d90
            • Opcode Fuzzy Hash: 2eb71682e2f5e7db42a9add31715e14eb81a9d771fff93a1368e8220c2350518
            • Instruction Fuzzy Hash: D3E0CD766001245BC7119654CC46FEA779DDFC8690F050075F905D7244D968D9819790
            APIs
            • Sleep.KERNELBASE(000001F4), ref: 01ADA289
            Memory Dump Source
            • Source File: 00000000.00000002.1276220392.0000000001AD8000.00000040.00000020.00020000.00000000.sdmp, Offset: 01AD8000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1ad8000_NRFQFP.jbxd
            Similarity
            • API ID: Sleep
            • String ID:
            • API String ID: 3472027048-0
            • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
            • Instruction ID: 0f7d62332c9ee4b49351c73db7aebc2b3ddea842495b6f535dba80f75f535c1c
            • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
            • Instruction Fuzzy Hash: F6E0E67494010DDFDB00DFB5D54969D7BB4EF04301F100161FD01D2280D6319E508A62
            APIs
            • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 0102B1CD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: %d/%02d/%02d
            • API String ID: 3850602802-328681919
            • Opcode ID: 6b9e53186f6c26e7bc3b69db6e64ee6cb8bbe95ee8c1f016f8a561e00a3c7f6d
            • Instruction ID: 7428aca31fd74d4c73853f6aedd0ab6946edb176c50c3bff6494fd64e0a2e4d0
            • Opcode Fuzzy Hash: 6b9e53186f6c26e7bc3b69db6e64ee6cb8bbe95ee8c1f016f8a561e00a3c7f6d
            • Instruction Fuzzy Hash: FF12F3B1600229ABEB259FA8CC49FAE7BF8FF45310F104159FA96DB2D1DB798541CB10
            APIs
            • GetForegroundWindow.USER32(00000000,00000000), ref: 00FDEB4A
            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 01033AEA
            • IsIconic.USER32(000000FF), ref: 01033AF3
            • ShowWindow.USER32(000000FF,00000009), ref: 01033B00
            • SetForegroundWindow.USER32(000000FF), ref: 01033B0A
            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 01033B20
            • GetCurrentThreadId.KERNEL32 ref: 01033B27
            • GetWindowThreadProcessId.USER32(000000FF,00000000), ref: 01033B33
            • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 01033B44
            • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 01033B4C
            • AttachThreadInput.USER32(00000000,?,00000001), ref: 01033B54
            • SetForegroundWindow.USER32(000000FF), ref: 01033B57
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 01033B6C
            • keybd_event.USER32(00000012,00000000), ref: 01033B77
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 01033B81
            • keybd_event.USER32(00000012,00000000), ref: 01033B86
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 01033B8F
            • keybd_event.USER32(00000012,00000000), ref: 01033B94
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 01033B9E
            • keybd_event.USER32(00000012,00000000), ref: 01033BA3
            • SetForegroundWindow.USER32(000000FF), ref: 01033BA6
            • AttachThreadInput.USER32(000000FF,?,00000000), ref: 01033BCD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
            • String ID: Shell_TrayWnd
            • API String ID: 4125248594-2988720461
            • Opcode ID: 9e259fb510575fb2fd552d24f147339bbfa234df69687f5a8115c746b83835b6
            • Instruction ID: 8525c24e0c4e9a36b24e4535526d04c4474b23fcde0fe948d1108aa44d6ef96f
            • Opcode Fuzzy Hash: 9e259fb510575fb2fd552d24f147339bbfa234df69687f5a8115c746b83835b6
            • Instruction Fuzzy Hash: 6E31B2B5A40318BBEB316BA59DC9F7F7E6CEB84B50F104055FB44EA1C1DAB55800ABA0
            APIs
              • Part of subcall function 00FFB134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00FFB180
              • Part of subcall function 00FFB134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00FFB1AD
              • Part of subcall function 00FFB134: GetLastError.KERNEL32 ref: 00FFB1BA
            • _memset.LIBCMT ref: 00FFAD08
            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00FFAD5A
            • CloseHandle.KERNEL32(?), ref: 00FFAD6B
            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00FFAD82
            • GetProcessWindowStation.USER32 ref: 00FFAD9B
            • SetProcessWindowStation.USER32(00000000), ref: 00FFADA5
            • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00FFADBF
              • Part of subcall function 00FFAB84: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00FFACC0), ref: 00FFAB99
              • Part of subcall function 00FFAB84: CloseHandle.KERNEL32(?,?,00FFACC0), ref: 00FFABAB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
            • String ID: $default$winsta0
            • API String ID: 2063423040-1027155976
            • Opcode ID: a2562be2655e2001dfb1530560cfe9cbc683b3e7b700453c04ad34416b263423
            • Instruction ID: 1ef70092197c52f9e34b865f216c0f9070dc59cead3b690ea735468503749dbc
            • Opcode Fuzzy Hash: a2562be2655e2001dfb1530560cfe9cbc683b3e7b700453c04ad34416b263423
            • Instruction Fuzzy Hash: DE818AB1C0020DAFDF219FA4CD88AFE7BB8EF18314F044119FA18A61A1D7758E54EB21
            APIs
              • Part of subcall function 01006EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,01005FA6,?), ref: 01006ED8
              • Part of subcall function 01006EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,01005FA6,?), ref: 01006EF1
              • Part of subcall function 0100725E: __wsplitpath.LIBCMT ref: 0100727B
              • Part of subcall function 0100725E: __wsplitpath.LIBCMT ref: 0100728E
              • Part of subcall function 010072CB: GetFileAttributesW.KERNEL32(?,01006019), ref: 010072CC
            • _wcscat.LIBCMT ref: 01006149
            • _wcscat.LIBCMT ref: 01006167
            • __wsplitpath.LIBCMT ref: 0100618E
            • FindFirstFileW.KERNEL32(?,?), ref: 010061A4
            • _wcscpy.LIBCMT ref: 01006209
            • _wcscat.LIBCMT ref: 0100621C
            • _wcscat.LIBCMT ref: 0100622F
            • lstrcmpiW.KERNEL32(?,?), ref: 0100625D
            • DeleteFileW.KERNEL32(?), ref: 0100626E
            • MoveFileW.KERNEL32(?,?), ref: 01006289
            • MoveFileW.KERNEL32(?,?), ref: 01006298
            • CopyFileW.KERNEL32(?,?,00000000), ref: 010062AD
            • DeleteFileW.KERNEL32(?), ref: 010062BE
            • FindNextFileW.KERNEL32(00000000,00000010), ref: 010062E1
            • FindClose.KERNEL32(00000000), ref: 010062FD
            • FindClose.KERNEL32(00000000), ref: 0100630B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: File$Find_wcscat$__wsplitpath$CloseDeleteFullMoveNamePath$AttributesCopyFirstNext_wcscpylstrcmpi
            • String ID: \*.*
            • API String ID: 1917200108-1173974218
            • Opcode ID: cca4fb9fca6f07cabcb80726d4c3e90547a1030d7689b62c7de6168d3f22aab1
            • Instruction ID: cf4c567dc83d8bf8bbf46eae7efd8c204b577c1cb9a3873df686955bf3e1e19f
            • Opcode Fuzzy Hash: cca4fb9fca6f07cabcb80726d4c3e90547a1030d7689b62c7de6168d3f22aab1
            • Instruction Fuzzy Hash: FF5150B280811C6AEB22EB95CD44DDF77FDAF14200F0900EAE6C5E2041DE7797898FA4
            APIs
            • OpenClipboard.USER32(0105DC00), ref: 01016B36
            • IsClipboardFormatAvailable.USER32(0000000D), ref: 01016B44
            • GetClipboardData.USER32(0000000D), ref: 01016B4C
            • CloseClipboard.USER32 ref: 01016B58
            • GlobalLock.KERNEL32(00000000), ref: 01016B74
            • CloseClipboard.USER32 ref: 01016B7E
            • GlobalUnlock.KERNEL32(00000000), ref: 01016B93
            • IsClipboardFormatAvailable.USER32(00000001), ref: 01016BA0
            • GetClipboardData.USER32(00000001), ref: 01016BA8
            • GlobalLock.KERNEL32(00000000), ref: 01016BB5
            • GlobalUnlock.KERNEL32(00000000), ref: 01016BE9
            • CloseClipboard.USER32 ref: 01016CF6
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
            • String ID:
            • API String ID: 3222323430-0
            • Opcode ID: c723ce689945fd0a06b52b2c659271ec5b83451f83bbdc7443795db68f98089a
            • Instruction ID: 38dabb6093d51cd783287b00dd1d772df69584e20f9c30ddaea153af7f82a737
            • Opcode Fuzzy Hash: c723ce689945fd0a06b52b2c659271ec5b83451f83bbdc7443795db68f98089a
            • Instruction Fuzzy Hash: 1C51B6752002065BD310AFA4DE86F7E77A8AFA4B10F00002DF6D6D71C4DFBAE8058B62
            APIs
            • FindFirstFileW.KERNEL32(?,?), ref: 0100F62B
            • FindClose.KERNEL32(00000000), ref: 0100F67F
            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0100F6A4
            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0100F6BB
            • FileTimeToSystemTime.KERNEL32(?,?), ref: 0100F6E2
            • __swprintf.LIBCMT ref: 0100F72E
            • __swprintf.LIBCMT ref: 0100F767
            • __swprintf.LIBCMT ref: 0100F7BB
              • Part of subcall function 00FE172B: __woutput_l.LIBCMT ref: 00FE1784
            • __swprintf.LIBCMT ref: 0100F809
            • __swprintf.LIBCMT ref: 0100F858
            • __swprintf.LIBCMT ref: 0100F8A7
            • __swprintf.LIBCMT ref: 0100F8F6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: __swprintf$FileTime$FindLocal$CloseFirstSystem__woutput_l
            • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
            • API String ID: 835046349-2428617273
            • Opcode ID: cf4b29782701634402f78070edc0b8506a4ee17c1a5f1d4be5b836d52d9a8a68
            • Instruction ID: 7070570f925873ef2b621eaa4068caeddc0fcd8f2d71ca66705d7d05a7834f4e
            • Opcode Fuzzy Hash: cf4b29782701634402f78070edc0b8506a4ee17c1a5f1d4be5b836d52d9a8a68
            • Instruction Fuzzy Hash: 11A12FB2408345ABD350EBA5CD86EAFB7ECBF98700F44081EF585C2151EB38D949D7A2
            APIs
            • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 01011B50
            • _wcscmp.LIBCMT ref: 01011B65
            • _wcscmp.LIBCMT ref: 01011B7C
            • GetFileAttributesW.KERNEL32(?), ref: 01011B8E
            • SetFileAttributesW.KERNEL32(?,?), ref: 01011BA8
            • FindNextFileW.KERNEL32(00000000,?), ref: 01011BC0
            • FindClose.KERNEL32(00000000), ref: 01011BCB
            • FindFirstFileW.KERNEL32(*.*,?), ref: 01011BE7
            • _wcscmp.LIBCMT ref: 01011C0E
            • _wcscmp.LIBCMT ref: 01011C25
            • SetCurrentDirectoryW.KERNEL32(?), ref: 01011C37
            • SetCurrentDirectoryW.KERNEL32(010739FC), ref: 01011C55
            • FindNextFileW.KERNEL32(00000000,00000010), ref: 01011C5F
            • FindClose.KERNEL32(00000000), ref: 01011C6C
            • FindClose.KERNEL32(00000000), ref: 01011C7C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
            • String ID: *.*
            • API String ID: 1803514871-438819550
            • Opcode ID: 7e171bffed56ec961b4da61577b2f9d70cb4cedb6a2174ae9da3b0240c70d315
            • Instruction ID: c1b5c868ce14f1a3e8ddfeda825dc65ea4b8986e5e76b5d23c36dcd7f2c554aa
            • Opcode Fuzzy Hash: 7e171bffed56ec961b4da61577b2f9d70cb4cedb6a2174ae9da3b0240c70d315
            • Instruction Fuzzy Hash: 7331E87560021A7FEF64DFF5DD88ADE77ECAF05220F000196EA81D3094EB39DA458B64
            APIs
            • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 01011CAB
            • _wcscmp.LIBCMT ref: 01011CC0
            • _wcscmp.LIBCMT ref: 01011CD7
              • Part of subcall function 01006BD4: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 01006BEF
            • FindNextFileW.KERNEL32(00000000,?), ref: 01011D06
            • FindClose.KERNEL32(00000000), ref: 01011D11
            • FindFirstFileW.KERNEL32(*.*,?), ref: 01011D2D
            • _wcscmp.LIBCMT ref: 01011D54
            • _wcscmp.LIBCMT ref: 01011D6B
            • SetCurrentDirectoryW.KERNEL32(?), ref: 01011D7D
            • SetCurrentDirectoryW.KERNEL32(010739FC), ref: 01011D9B
            • FindNextFileW.KERNEL32(00000000,00000010), ref: 01011DA5
            • FindClose.KERNEL32(00000000), ref: 01011DB2
            • FindClose.KERNEL32(00000000), ref: 01011DC2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
            • String ID: *.*
            • API String ID: 1824444939-438819550
            • Opcode ID: 2376b0d96eee72b0dba63f6d3d340fd65761c687cbef540423649323e9248d1e
            • Instruction ID: 05ccd1c620e81dd4578be5a2815e74c958f798d3c3a2426ad4ddae7819224d24
            • Opcode Fuzzy Hash: 2376b0d96eee72b0dba63f6d3d340fd65761c687cbef540423649323e9248d1e
            • Instruction Fuzzy Hash: F431263250061E7BEF64FBB5DD48ADE3BECAF05224F140595EA80E7090DB39CA45CB64
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: _memset
            • String ID: Q\E$[$[:<:]]$[:>:]]$\$\$\$\b(?<=\w)$\b(?=\w)$]$^
            • API String ID: 2102423945-2023335898
            • Opcode ID: 9606e0233a8fff2b1bd125c7721dbde0340c2741aa31a36145e0896d23f2ff20
            • Instruction ID: f6fd4a34d29d8c810a3afe23498c4e5c72bff12701673fb45ebbc2bf4b0a863c
            • Opcode Fuzzy Hash: 9606e0233a8fff2b1bd125c7721dbde0340c2741aa31a36145e0896d23f2ff20
            • Instruction Fuzzy Hash: FF82D472D0421ACBDB24CF98C981BEDBBB1BF84320F2481A9D855AB341D7749D85DF91
            APIs
            • GetLocalTime.KERNEL32(?), ref: 010109DF
            • SystemTimeToFileTime.KERNEL32(?,?), ref: 010109EF
            • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 010109FB
            • __wsplitpath.LIBCMT ref: 01010A59
            • _wcscat.LIBCMT ref: 01010A71
            • _wcscat.LIBCMT ref: 01010A83
            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 01010A98
            • SetCurrentDirectoryW.KERNEL32(?), ref: 01010AAC
            • SetCurrentDirectoryW.KERNEL32(?), ref: 01010ADE
            • SetCurrentDirectoryW.KERNEL32(?), ref: 01010AFF
            • _wcscpy.LIBCMT ref: 01010B0B
            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 01010B4A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
            • String ID: *.*
            • API String ID: 3566783562-438819550
            • Opcode ID: ba0ef09e17a3c7cc0d04d08d7495a78034cbc571c5e36250ef9f9eca85e8f304
            • Instruction ID: bfdf7dcd98013482c3069f25662a3752bb55907fd87364f9393badfe87891c5c
            • Opcode Fuzzy Hash: ba0ef09e17a3c7cc0d04d08d7495a78034cbc571c5e36250ef9f9eca85e8f304
            • Instruction Fuzzy Hash: 886166B21042059FD710EF64C981A9EB3E9FF89310F04896EF9C9C7245DB39E944CB92
            APIs
              • Part of subcall function 00FFABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00FFABD7
              • Part of subcall function 00FFABBB: GetLastError.KERNEL32(?,00FFA69F,?,?,?), ref: 00FFABE1
              • Part of subcall function 00FFABBB: GetProcessHeap.KERNEL32(00000008,?,?,00FFA69F,?,?,?), ref: 00FFABF0
              • Part of subcall function 00FFABBB: HeapAlloc.KERNEL32(00000000,?,00FFA69F,?,?,?), ref: 00FFABF7
              • Part of subcall function 00FFABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00FFAC0E
              • Part of subcall function 00FFAC56: GetProcessHeap.KERNEL32(00000008,00FFA6B5,00000000,00000000,?,00FFA6B5,?), ref: 00FFAC62
              • Part of subcall function 00FFAC56: HeapAlloc.KERNEL32(00000000,?,00FFA6B5,?), ref: 00FFAC69
              • Part of subcall function 00FFAC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00FFA6B5,?), ref: 00FFAC7A
            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00FFA6D0
            • _memset.LIBCMT ref: 00FFA6E5
            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00FFA704
            • GetLengthSid.ADVAPI32(?), ref: 00FFA715
            • GetAce.ADVAPI32(?,00000000,?), ref: 00FFA752
            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00FFA76E
            • GetLengthSid.ADVAPI32(?), ref: 00FFA78B
            • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00FFA79A
            • HeapAlloc.KERNEL32(00000000), ref: 00FFA7A1
            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00FFA7C2
            • CopySid.ADVAPI32(00000000), ref: 00FFA7C9
            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00FFA7FA
            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00FFA820
            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00FFA834
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
            • String ID:
            • API String ID: 3996160137-0
            • Opcode ID: 03a224e7752c27e8fb5a9f71232c146ddc7ebee098f2131aceae2bb530f94b50
            • Instruction ID: f60497ad1eb948af3d52c193b1ca0b349cbdd3cebb291eac8aa82615a2ff772d
            • Opcode Fuzzy Hash: 03a224e7752c27e8fb5a9f71232c146ddc7ebee098f2131aceae2bb530f94b50
            • Instruction Fuzzy Hash: 75515CB5900209ABDF11DF90DC84EFEBBB9FF04350F048129FA15A7290DB799A05DB61
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID:
            • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
            • API String ID: 0-4052911093
            • Opcode ID: 39b4f059bea0132be0591e83768b596ea5f5e458d8013803c1b99311e77030c5
            • Instruction ID: 08312c6c28de6baf2ec0b42601aadade744f2647da586f0c9e18f4ea2f0c909a
            • Opcode Fuzzy Hash: 39b4f059bea0132be0591e83768b596ea5f5e458d8013803c1b99311e77030c5
            • Instruction Fuzzy Hash: 7072A2B1E0431ADBDB24DF58D981BAEB7B5BF48310F1441AEE845EB281DB349941DF90
            APIs
              • Part of subcall function 01006EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,01005FA6,?), ref: 01006ED8
              • Part of subcall function 010072CB: GetFileAttributesW.KERNEL32(?,01006019), ref: 010072CC
            • _wcscat.LIBCMT ref: 01006441
            • __wsplitpath.LIBCMT ref: 0100645F
            • FindFirstFileW.KERNEL32(?,?), ref: 01006474
            • _wcscpy.LIBCMT ref: 010064A3
            • _wcscat.LIBCMT ref: 010064B8
            • _wcscat.LIBCMT ref: 010064CA
            • DeleteFileW.KERNEL32(?), ref: 010064DA
            • FindNextFileW.KERNEL32(00000000,00000010), ref: 010064EB
            • FindClose.KERNEL32(00000000), ref: 01006506
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: File$Find_wcscat$AttributesCloseDeleteFirstFullNameNextPath__wsplitpath_wcscpy
            • String ID: \*.*
            • API String ID: 2643075503-1173974218
            • Opcode ID: d8bb8f702e3684fb5e864b7ac425779b646c3a8280c440fe3e57677d50d4165e
            • Instruction ID: 2b17bc1db17a768ed1d5c97cd03a75e435e43767be04a234eb50e24bd2111a09
            • Opcode Fuzzy Hash: d8bb8f702e3684fb5e864b7ac425779b646c3a8280c440fe3e57677d50d4165e
            • Instruction Fuzzy Hash: B63182B2408384AAD732DAE88C859DFB7DCAF55210F44096EF6D8C3141EE3AD5498767
            APIs
              • Part of subcall function 01023C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,01022BB5,?,?), ref: 01023C1D
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0102328E
              • Part of subcall function 00FC936C: __swprintf.LIBCMT ref: 00FC93AB
              • Part of subcall function 00FC936C: __itow.LIBCMT ref: 00FC93DF
            • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0102332D
            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 010233C5
            • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 01023604
            • RegCloseKey.ADVAPI32(00000000), ref: 01023611
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
            • String ID:
            • API String ID: 1240663315-0
            • Opcode ID: 131e084ae0e20fc04a213a2af2a2d922b2e86a51b31489d930d144b8815a918c
            • Instruction ID: 2bfe09f87a159de1a8023f082ce0be82cb6127e6c9ac3c6aeb964fef88504451
            • Opcode Fuzzy Hash: 131e084ae0e20fc04a213a2af2a2d922b2e86a51b31489d930d144b8815a918c
            • Instruction Fuzzy Hash: 0DE17D75204211AFCB15DF68C995E2EBBE8FF89310F0485ADF58ACB291CB39E905CB41
            APIs
            • GetKeyboardState.USER32(?), ref: 01002B5F
            • GetAsyncKeyState.USER32(000000A0), ref: 01002BE0
            • GetKeyState.USER32(000000A0), ref: 01002BFB
            • GetAsyncKeyState.USER32(000000A1), ref: 01002C15
            • GetKeyState.USER32(000000A1), ref: 01002C2A
            • GetAsyncKeyState.USER32(00000011), ref: 01002C42
            • GetKeyState.USER32(00000011), ref: 01002C54
            • GetAsyncKeyState.USER32(00000012), ref: 01002C6C
            • GetKeyState.USER32(00000012), ref: 01002C7E
            • GetAsyncKeyState.USER32(0000005B), ref: 01002C96
            • GetKeyState.USER32(0000005B), ref: 01002CA8
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: State$Async$Keyboard
            • String ID:
            • API String ID: 541375521-0
            • Opcode ID: ef33fec0d7706f4ee013e28f4a7302c56f21b88bef09879468a1c5117690195d
            • Instruction ID: e380dfa52e49a6f5bd586223dbd278d1b23ec0bd641105bbdca760658854f70b
            • Opcode Fuzzy Hash: ef33fec0d7706f4ee013e28f4a7302c56f21b88bef09879468a1c5117690195d
            • Instruction Fuzzy Hash: F041E574504BCD6EFFB79AA8894C7A5BEE06B01304F0480C9D6C6566C3DF9495C4C7A2
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Clipboard$AllocCloseEmptyGlobalOpen
            • String ID:
            • API String ID: 1737998785-0
            • Opcode ID: 5b6f4d173c38dbf02328f4d49d7b6b43899c1060f7ba9feb08a5a7ab82ff2867
            • Instruction ID: db2621ffe469b3a857bd261deb0969da9c51ff0c88ffa1ac95a3a285f0070093
            • Opcode Fuzzy Hash: 5b6f4d173c38dbf02328f4d49d7b6b43899c1060f7ba9feb08a5a7ab82ff2867
            • Instruction Fuzzy Hash: 8F21E5757001109FD721AF54DE89B2D77A8FF58720F04805AF98ADB395CB7AEC018B91
            APIs
              • Part of subcall function 00FF9ABF: CLSIDFromProgID.OLE32 ref: 00FF9ADC
              • Part of subcall function 00FF9ABF: ProgIDFromCLSID.OLE32(?,00000000), ref: 00FF9AF7
              • Part of subcall function 00FF9ABF: lstrcmpiW.KERNEL32(?,00000000), ref: 00FF9B05
              • Part of subcall function 00FF9ABF: CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00FF9B15
            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 0101C235
            • _memset.LIBCMT ref: 0101C242
            • _memset.LIBCMT ref: 0101C360
            • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000001), ref: 0101C38C
            • CoTaskMemFree.OLE32(?), ref: 0101C397
            Strings
            • NULL Pointer assignment, xrefs: 0101C3E5
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
            • String ID: NULL Pointer assignment
            • API String ID: 1300414916-2785691316
            • Opcode ID: 6a6dc65f45f5662998892e5bc1f19a5fcce110f37a49f04d6d8bb4f16dc2d9f5
            • Instruction ID: 6d5a38bff0245fc77836a9f76e9f0ae5a84f1b2ce518eed3a96bc6f8fb20ba58
            • Opcode Fuzzy Hash: 6a6dc65f45f5662998892e5bc1f19a5fcce110f37a49f04d6d8bb4f16dc2d9f5
            • Instruction Fuzzy Hash: 3B915C71D40219ABEB10DFD4DD81EEEBBB8EF44310F10816AF519A7281DB759A45CFA0
            APIs
              • Part of subcall function 00FFB134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00FFB180
              • Part of subcall function 00FFB134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00FFB1AD
              • Part of subcall function 00FFB134: GetLastError.KERNEL32 ref: 00FFB1BA
            • ExitWindowsEx.USER32(?,00000000), ref: 01007A0F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
            • String ID: $@$SeShutdownPrivilege
            • API String ID: 2234035333-194228
            • Opcode ID: f64678b41d4ceb18737b305e88592173029b572dd6d80c1f48df01f54a468f7a
            • Instruction ID: e942b3f98c5c72015c8adeba21ca47d957b497ac62579191bb1f87df18b47542
            • Opcode Fuzzy Hash: f64678b41d4ceb18737b305e88592173029b572dd6d80c1f48df01f54a468f7a
            • Instruction Fuzzy Hash: 0401FC716502116BF76A56ECDC9ABBF36989B41240F144464FAC3E20C2D5AD7E4182B4
            APIs
            • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 01018CA8
            • WSAGetLastError.WSOCK32(00000000), ref: 01018CB7
            • bind.WSOCK32(00000000,?,00000010), ref: 01018CD3
            • listen.WSOCK32(00000000,00000005), ref: 01018CE2
            • WSAGetLastError.WSOCK32(00000000), ref: 01018CFC
            • closesocket.WSOCK32(00000000,00000000), ref: 01018D10
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ErrorLast$bindclosesocketlistensocket
            • String ID:
            • API String ID: 1279440585-0
            • Opcode ID: bd22a8c2459a66db196fc78e64fd3a4c32fc502045158dcb7f69fa0dc01725c8
            • Instruction ID: ca2768ba399915160d38fe00a6fad5a476b590b9b0a79ce170486057a470a93b
            • Opcode Fuzzy Hash: bd22a8c2459a66db196fc78e64fd3a4c32fc502045158dcb7f69fa0dc01725c8
            • Instruction Fuzzy Hash: 5721E4756002059FDB20EF68CE85B6E77E9FF58320F14815DE996A73C5CB38AD018B51
            APIs
            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 01006554
            • Process32FirstW.KERNEL32(00000000,0000022C), ref: 01006564
            • Process32NextW.KERNEL32(00000000,0000022C), ref: 01006583
            • __wsplitpath.LIBCMT ref: 010065A7
            • _wcscat.LIBCMT ref: 010065BA
            • CloseHandle.KERNEL32(00000000,?,00000000), ref: 010065F9
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath_wcscat
            • String ID:
            • API String ID: 1605983538-0
            • Opcode ID: 78dd39ed630c02c9968cc54c1bcc6a8c6cefd16bfdd77cf0f60f681792842fe5
            • Instruction ID: a9aa959ca8d91548899f719159a70f185c297dbddedb046315eb804b2d48c922
            • Opcode Fuzzy Hash: 78dd39ed630c02c9968cc54c1bcc6a8c6cefd16bfdd77cf0f60f681792842fe5
            • Instruction Fuzzy Hash: 1421AAB1900258ABEB21ABA4CD88FDDB7FDAB04300F5000F5F545D3181DB769B85CB50
            APIs
              • Part of subcall function 0101A82C: inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 0101A84E
            • socket.WSOCK32(00000002,00000002,00000011,?,?,?,00000000), ref: 01019296
            • WSAGetLastError.WSOCK32(00000000,00000000), ref: 010192B9
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ErrorLastinet_addrsocket
            • String ID:
            • API String ID: 4170576061-0
            • Opcode ID: 53d373404791b2ee6eae36b2efd333944d73f6800867a73a429c41254ace7a31
            • Instruction ID: 2d913a1f37f84425f972508fccba368992f50f42316c331089b3d31b47d29b49
            • Opcode Fuzzy Hash: 53d373404791b2ee6eae36b2efd333944d73f6800867a73a429c41254ace7a31
            • Instruction Fuzzy Hash: A241DE70600200AFEB14AB688D92F7E77EDEF44324F04844DF996AB3C2DB799D019B91
            APIs
            • FindFirstFileW.KERNEL32(?,?), ref: 0100EB8A
            • _wcscmp.LIBCMT ref: 0100EBBA
            • _wcscmp.LIBCMT ref: 0100EBCF
            • FindNextFileW.KERNEL32(00000000,?), ref: 0100EBE0
            • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0100EC0E
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Find$File_wcscmp$CloseFirstNext
            • String ID:
            • API String ID: 2387731787-0
            • Opcode ID: 6338efb4ab48730085f149cf16a15c045bfd04253622dd21979e1594b9086194
            • Instruction ID: 26df3757240751c1ad6955a08136a0a7f8dcc4779c532b263c0169ffa8439d8e
            • Opcode Fuzzy Hash: 6338efb4ab48730085f149cf16a15c045bfd04253622dd21979e1594b9086194
            • Instruction Fuzzy Hash: 7741E4746007028FD709DF68C890E9AB7E4FF49320F04455EEA9A8B3A1DB36E941CB91
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Window$EnabledForegroundIconicVisibleZoomed
            • String ID:
            • API String ID: 292994002-0
            • Opcode ID: a4291c79a11fd2a0aec7ba0ee7aad51d37d9e40676c861c0b6e2f964a0f2b86b
            • Instruction ID: 4ab3b4f28d024a272b9b4e191dd93891e5009890884c4474f621f7079724afdf
            • Opcode Fuzzy Hash: a4291c79a11fd2a0aec7ba0ee7aad51d37d9e40676c861c0b6e2f964a0f2b86b
            • Instruction Fuzzy Hash: 9111E6753001216FF7215F5ADD84F6F7BDCEF54720B14846AF889D3281CB3998018790
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID:
            • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
            • API String ID: 0-1546025612
            • Opcode ID: d93bebce8a3bb3518ec2a5cbfec0eea82ab6d48d09d8fff40c272087f8237b94
            • Instruction ID: 5ed61405fd620d3dc185d3105085200fecdae2e3cd10860a647a689dd3363ece
            • Opcode Fuzzy Hash: d93bebce8a3bb3518ec2a5cbfec0eea82ab6d48d09d8fff40c272087f8237b94
            • Instruction Fuzzy Hash: 0892B4B1E0421ACBDF24CF58CA85BEDB7B1BB44314F1481AEE856A7280D771AD81EF51
            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll,?,00FDE014,771B0AE0,00FDDEF1,0105DC38,?,?), ref: 00FDE02C
            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00FDE03E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: GetNativeSystemInfo$kernel32.dll
            • API String ID: 2574300362-192647395
            • Opcode ID: bd59c9f404b4c0e54a412da4905029726b10955f728a4bebafc096f2bbd584ea
            • Instruction ID: 553f195bb1d350551c1d8eefbd04268a2e57354324be578c98eb96fa57145acc
            • Opcode Fuzzy Hash: bd59c9f404b4c0e54a412da4905029726b10955f728a4bebafc096f2bbd584ea
            • Instruction Fuzzy Hash: EED0A7B4D00712AFC7316FA1E94C61276D9AB10310F1C481EE8C1D6210D7F8C884C760
            APIs
            • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 01006733
            • _memset.LIBCMT ref: 01006754
            • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 010067A6
            • CloseHandle.KERNEL32(00000000), ref: 010067AF
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CloseControlCreateDeviceFileHandle_memset
            • String ID:
            • API String ID: 1157408455-0
            • Opcode ID: 05875ea678cc92500d64f8c7198b54169375124360799e2a2db56c28a7c06f7e
            • Instruction ID: 1d16759753fb74efe765ba91eff951192bb85eb35b818c12e2d5e38a3038f859
            • Opcode Fuzzy Hash: 05875ea678cc92500d64f8c7198b54169375124360799e2a2db56c28a7c06f7e
            • Instruction Fuzzy Hash: 3A11CAB59012287AE73157A5AD4DFABBABCEF44B60F10419AF908E71C0D7744E808B64
            APIs
            • lstrlenW.KERNEL32(?,?,?,00000000), ref: 010013DC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: lstrlen
            • String ID: ($|
            • API String ID: 1659193697-1631851259
            • Opcode ID: 4e2a0ac43b3d48acc63bff0430b60431a48e4844cdbf16549d5f7a9527bd70b2
            • Instruction ID: 0a67728e63f436b327df22d6572adcedad3dd1c96b12502a367355671f09f701
            • Opcode Fuzzy Hash: 4e2a0ac43b3d48acc63bff0430b60431a48e4844cdbf16549d5f7a9527bd70b2
            • Instruction Fuzzy Hash: 66322575A006059FD729CF69C480A6AB7F0FF48310F15C5AEE59ADB3A2EB70E941CB44
            APIs
              • Part of subcall function 00FDB34E: GetWindowLongW.USER32(?,000000EB), ref: 00FDB35F
            • DefDlgProcW.USER32(?,?,?,?,?), ref: 00FDB22F
              • Part of subcall function 00FDB55D: DefDlgProcW.USER32(?,00000020,?,00000000), ref: 00FDB5A5
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Proc$LongWindow
            • String ID:
            • API String ID: 2749884682-0
            • Opcode ID: 53eae7e240708d521ef80c47312f85a172b061f1cc30d1b1967f303368743fef
            • Instruction ID: 5913476faee985a929fae9d292864ee2f32d3194aa8973516ef9e7f034188703
            • Opcode Fuzzy Hash: 53eae7e240708d521ef80c47312f85a172b061f1cc30d1b1967f303368743fef
            • Instruction Fuzzy Hash: D3A13B72114006FAE6356F698C48FBF396EEBA6351B1A421FF5C1D2381DB259C01B372
            APIs
            • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,010143BF,00000000), ref: 01014FA6
            • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 01014FD2
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Internet$AvailableDataFileQueryRead
            • String ID:
            • API String ID: 599397726-0
            • Opcode ID: ec08a84072cf7c830adfe3bbc7a0bbae4bc2880a2f5325dc6f72320e65924b23
            • Instruction ID: f63cb7664342f94c00b15ed4548c51b0de9e2067b1a145d5f7cae7dbf475085d
            • Opcode Fuzzy Hash: ec08a84072cf7c830adfe3bbc7a0bbae4bc2880a2f5325dc6f72320e65924b23
            • Instruction Fuzzy Hash: 4641F971504209BFEB21CE84CC88EBF77FCEB80754F00406EF285A6295E7799E419790
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0100E20D
            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0100E267
            • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0100E2B4
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ErrorMode$DiskFreeSpace
            • String ID:
            • API String ID: 1682464887-0
            • Opcode ID: bb5a7ddd596f615f2f0e177d6743d0d15f97b6842c28d898879c121277767f50
            • Instruction ID: ee1cdeae0a7f26f8a7cda74d68858067d24d3c24926faafdb552bd8fea8050f9
            • Opcode Fuzzy Hash: bb5a7ddd596f615f2f0e177d6743d0d15f97b6842c28d898879c121277767f50
            • Instruction Fuzzy Hash: 3B216D75A00118EFDB00EFA5D994EEDFBB8FF58310F0484AAE945A7391DB369905CB50
            APIs
              • Part of subcall function 00FDF4EA: std::exception::exception.LIBCMT ref: 00FDF51E
              • Part of subcall function 00FDF4EA: __CxxThrowException@8.LIBCMT ref: 00FDF533
            • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00FFB180
            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00FFB1AD
            • GetLastError.KERNEL32 ref: 00FFB1BA
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
            • String ID:
            • API String ID: 1922334811-0
            • Opcode ID: c2af2ad14f6ea919faf3af881e88e8a5822048049e61baa6d76d917fef4775a7
            • Instruction ID: ee326805b1a487dd36435866347a00ec7f53ffdc2ddd2d5ac8aa5393df9385da
            • Opcode Fuzzy Hash: c2af2ad14f6ea919faf3af881e88e8a5822048049e61baa6d76d917fef4775a7
            • Instruction Fuzzy Hash: B111BCB2900205AFE728EFA4DCC5D2BB7ADEF44310B20852EF59697240DB75FC418B60
            APIs
            • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 01007223
            • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 0100723A
            • FreeSid.ADVAPI32(?), ref: 0100724A
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: AllocateCheckFreeInitializeMembershipToken
            • String ID:
            • API String ID: 3429775523-0
            • Opcode ID: fa5c36202077fe652777a6da963c3771cda9e820c826f289f4e3e0d49f1a2259
            • Instruction ID: 4319bf383773ab94f32457575c46a79c20798acc0685aaad79e3bbb497655180
            • Opcode Fuzzy Hash: fa5c36202077fe652777a6da963c3771cda9e820c826f289f4e3e0d49f1a2259
            • Instruction Fuzzy Hash: 38F01DBAA00209BFDF14DFE4D989AEEBBB8EF08241F104469B602E3181E27596548B10
            APIs
            • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 01007547
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: mouse_event
            • String ID: DOWN
            • API String ID: 2434400541-711622031
            • Opcode ID: 8be2b6d9879d72b73c4e3bbc643680dac5c0cb9c5171f80698b2b509ee181383
            • Instruction ID: 2b7b97298c7316a459baf21aff25e39b5c667b05ba356e827421ccf13984231f
            • Opcode Fuzzy Hash: 8be2b6d9879d72b73c4e3bbc643680dac5c0cb9c5171f80698b2b509ee181383
            • Instruction Fuzzy Hash: 4AE0866618C7A239FA9531597C02EF7338CCB22132B100157F8D0D40C2FDC969D262BA
            APIs
            • FindFirstFileW.KERNEL32(?,?), ref: 0100F599
            • FindClose.KERNEL32(00000000), ref: 0100F5C9
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Find$CloseFileFirst
            • String ID:
            • API String ID: 2295610775-0
            • Opcode ID: 49105fcfc1ac35900fb1b2579227ad363a5ea49ddbb466dbf1ac01f927eeaa38
            • Instruction ID: 52a2a78cc267ae523654f38a117bef0bc8110e3840d2199ea2679a809ce61aa9
            • Opcode Fuzzy Hash: 49105fcfc1ac35900fb1b2579227ad363a5ea49ddbb466dbf1ac01f927eeaa38
            • Instruction Fuzzy Hash: 0C11C0726002019FE711EF28D849A2EB3E9FF94325F04895EF9A9D7391CB34AD008B81
            APIs
            • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,0101BE6A,?,?,00000000,?), ref: 0100CEA7
            • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,0101BE6A,?,?,00000000,?), ref: 0100CEB9
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ErrorFormatLastMessage
            • String ID:
            • API String ID: 3479602957-0
            • Opcode ID: 29df4cc394a8e30bdb70d0bdaacc909ab7d0e6de7ca7c332dde0fcb7f5e726b1
            • Instruction ID: 9cf63871758e03dc9db307eb1db6f5cfe8d93e201ee15317d357cf9e86ac1994
            • Opcode Fuzzy Hash: 29df4cc394a8e30bdb70d0bdaacc909ab7d0e6de7ca7c332dde0fcb7f5e726b1
            • Instruction Fuzzy Hash: 92F0E275100229ABEB209BA4CD89FEB336CBF08361F008165F849D2081C7349A00CBA0
            APIs
            • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 01004153
            • keybd_event.USER32(?,75A4C0D0,?,00000000), ref: 01004166
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: InputSendkeybd_event
            • String ID:
            • API String ID: 3536248340-0
            • Opcode ID: f2cc476ae62271dfae53d129100e917c25b05ac3f0a6fd27663bc89cf7bd26d6
            • Instruction ID: 4ab15c223ee1a8e2abfd90330eaca9198e7f74e19aca5b58b979f1c3b2776fe4
            • Opcode Fuzzy Hash: f2cc476ae62271dfae53d129100e917c25b05ac3f0a6fd27663bc89cf7bd26d6
            • Instruction Fuzzy Hash: 57F06D7490424DAFEB068FA4C805BFE7FB0EF10305F008009F9A596191D77986128FA4
            APIs
            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00FFACC0), ref: 00FFAB99
            • CloseHandle.KERNEL32(?,?,00FFACC0), ref: 00FFABAB
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: AdjustCloseHandlePrivilegesToken
            • String ID:
            • API String ID: 81990902-0
            • Opcode ID: 49d17d646abed1494fe8a0c18e090958a6f6a737c1e39753647959643d3826c5
            • Instruction ID: 41fde27a9770c9fc7d9706aac6214248c76d6a354222a266f3a56f6036548696
            • Opcode Fuzzy Hash: 49d17d646abed1494fe8a0c18e090958a6f6a737c1e39753647959643d3826c5
            • Instruction Fuzzy Hash: 11E08675000510AFE7322F54FC04E7377EAEF003207148429F99A81534D7276C90EB50
            APIs
            • SetUnhandledExceptionFilter.KERNEL32(00000000,0000000E,00FE6DB3,-0000031A,?,?,00000001), ref: 00FE81B1
            • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00FE81BA
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled
            • String ID:
            • API String ID: 3192549508-0
            • Opcode ID: 9300d5b927eab869d0cd253f041f3406a4a2e6ef9a48796fd9cd56f683708fb9
            • Instruction ID: bbc5a1bfb28a1350d2df440f7871dac356c72717c7e2ca84f40bb5c313983682
            • Opcode Fuzzy Hash: 9300d5b927eab869d0cd253f041f3406a4a2e6ef9a48796fd9cd56f683708fb9
            • Instruction Fuzzy Hash: E7B092B5144608ABDB102BE1E949B587FA8EB18A53F00C010F64D440558B7754109BA1
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: _memmove
            • String ID:
            • API String ID: 4104443479-0
            • Opcode ID: ca1399394d06c4cc2f2b6cea92728b6988acdf8a49fed7b2bef6eb97aef70c25
            • Instruction ID: 4b08990f761569cf8cf72417df77dd69954512dc43b30b14ec54937246b43366
            • Opcode Fuzzy Hash: ca1399394d06c4cc2f2b6cea92728b6988acdf8a49fed7b2bef6eb97aef70c25
            • Instruction Fuzzy Hash: 03A26CB1E0421ACFDB24CF58C581BADBBB1FF48310F2581A9E859AB391D7349A81DF50
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 4987da00839e81af59ef9480ac8a5f6482c6fd4f26b536dd3c77354955dd9ad8
            • Instruction ID: c1eafcaf093aca1a3f485724d23987cdd3412dd66614c375c57219bcb7a8a65c
            • Opcode Fuzzy Hash: 4987da00839e81af59ef9480ac8a5f6482c6fd4f26b536dd3c77354955dd9ad8
            • Instruction Fuzzy Hash: 6A322332D29F418DD7239535C82233AA698AFB73D4F15D737F81AB5D9AEB29C4835200
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: __itow__swprintf
            • String ID:
            • API String ID: 674341424-0
            • Opcode ID: 1a2464d23fbee85e857b4c2d443f8198380033ce9fd1897fcc5d5c5859e0dd72
            • Instruction ID: 2dc040b82737814c53177f56f3c6f6b58ca890567f2ff018716aa8e8940bb314
            • Opcode Fuzzy Hash: 1a2464d23fbee85e857b4c2d443f8198380033ce9fd1897fcc5d5c5859e0dd72
            • Instruction Fuzzy Hash: 3C22AA715083029FE724DF14CA96B6FB7E5BF84310F04491EF89A9B291DB75E904DB82
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c14356c9735a89ae1c24029da52a074c0b80071e4c9437a1744036bd0b66013a
            • Instruction ID: 59fc2ca068add852dae2432ba9a78eee0dda5863c86b10ba9595543ff2f1dcc3
            • Opcode Fuzzy Hash: c14356c9735a89ae1c24029da52a074c0b80071e4c9437a1744036bd0b66013a
            • Instruction Fuzzy Hash: 76B1DE30D2AF414DD72396398831337B65CAFBB2D5B91E71BFC5A74D26EB2685834280
            APIs
            • __time64.LIBCMT ref: 0100B6DF
              • Part of subcall function 00FE344A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,0100BDC3,00000000,?,?,?,?,0100BF70,00000000,?), ref: 00FE3453
              • Part of subcall function 00FE344A: __aulldiv.LIBCMT ref: 00FE3473
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Time$FileSystem__aulldiv__time64
            • String ID:
            • API String ID: 2893107130-0
            • Opcode ID: a11f9e23ba1dbc2f1358296e43d0d3127a1ee49f5091e867030d10d1d620ce5e
            • Instruction ID: 58281554bfccbdc47064b88929c9b0c48425db55c8220736589df56302eeb139
            • Opcode Fuzzy Hash: a11f9e23ba1dbc2f1358296e43d0d3127a1ee49f5091e867030d10d1d620ce5e
            • Instruction Fuzzy Hash: 2821AF76634610CBD72ACF28C481A96B7E1EB99710B248E6DE0E5CF2C0CA78B905DB54
            APIs
            • BlockInput.USER32(00000001), ref: 01016ACA
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: BlockInput
            • String ID:
            • API String ID: 3456056419-0
            • Opcode ID: 427bdb0ff6577421af21dd89437c1138717a12096de1464dd83eddef54bd55cc
            • Instruction ID: d253028aa474ccd1bc0c7da47792408b6d3944801f42543fa7a10e2c7f7daf28
            • Opcode Fuzzy Hash: 427bdb0ff6577421af21dd89437c1138717a12096de1464dd83eddef54bd55cc
            • Instruction Fuzzy Hash: 7FE048362102046FC740EF99DD05E9AB7EDAF78761F04C466F985C7355DAB5F8048B90
            APIs
            • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00FFAD3E), ref: 00FFB124
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: LogonUser
            • String ID:
            • API String ID: 1244722697-0
            • Opcode ID: 9e0e2446be490d61c7fa0101a90c98c8bc7bc365c9ce2f83ed781947d0766bdd
            • Instruction ID: e8465f74aebdb48122f623ebae16cb9d1f1c7a0fae1ac41482ef6755a4fa8985
            • Opcode Fuzzy Hash: 9e0e2446be490d61c7fa0101a90c98c8bc7bc365c9ce2f83ed781947d0766bdd
            • Instruction Fuzzy Hash: 3BD05E321A460EAFDF024EA4DC02EAE3F6AEB04700F408110FA11C6090C676D531AB50
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: NameUser
            • String ID:
            • API String ID: 2645101109-0
            • Opcode ID: 3c5a811cc67032c214e5010a4a9da4e39af1d924e87c1604d4caea8a541f40be
            • Instruction ID: f71ee6448afec3f0700c7c78a662d79fa5c815fb0ef7ef19af36c652bc39cb9b
            • Opcode Fuzzy Hash: 3c5a811cc67032c214e5010a4a9da4e39af1d924e87c1604d4caea8a541f40be
            • Instruction Fuzzy Hash: FDC04CF140010DDFC751CBC0CA84AEEB7BCAB04301F104091A185F2100D7759B458B71
            APIs
            • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00FE818F
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled
            • String ID:
            • API String ID: 3192549508-0
            • Opcode ID: 97210687e7bbc1d94046cb4911bb53292f11031f377e6597f4d1b5fc42ebc349
            • Instruction ID: c791e98d11d1402f4895204e04846cfb366554c19cc9bd0c46134e590453487f
            • Opcode Fuzzy Hash: 97210687e7bbc1d94046cb4911bb53292f11031f377e6597f4d1b5fc42ebc349
            • Instruction Fuzzy Hash: 6AA0223000020CFBCF003FC2FC088883FACFB002A2B008020F80C00020CB33A820ABE0
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d654eeb2f2e832115aaee05572ec164401d2f49cbc3c9ec9418e1d7eaa054de7
            • Instruction ID: 1a031dac8dd656e333b672e4dfbb334f8acbd489365e160209a1e78c2c988d60
            • Opcode Fuzzy Hash: d654eeb2f2e832115aaee05572ec164401d2f49cbc3c9ec9418e1d7eaa054de7
            • Instruction Fuzzy Hash: 1522CF75E002068FDB28DF58C582FAAB7F1FF54310F18806ED9869B351E335A985EB91
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c5ed1c7c573c4447c4da88b9850205df706bde28214d4ef333ae553daf0dfc22
            • Instruction ID: 2cd242d370719ca5ebdb2afe3e1bf585fbb9e5e09de9dbc5a49075a94123f34a
            • Opcode Fuzzy Hash: c5ed1c7c573c4447c4da88b9850205df706bde28214d4ef333ae553daf0dfc22
            • Instruction Fuzzy Hash: 3D12A070A0450ADFDF14DFA4DA86AEEB7F5FF88300F144569E446E7290EB3AA910DB50
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Exception@8Throwstd::exception::exception
            • String ID:
            • API String ID: 3728558374-0
            • Opcode ID: 151cbf2ed50dbc7c0376001a5617433fecefb85dafb7006dcc4697e7cd5929e1
            • Instruction ID: f36f9cbbc9cb25837ed99a6fc28f75f5f600ac11a824b11042f58bd11ab1407c
            • Opcode Fuzzy Hash: 151cbf2ed50dbc7c0376001a5617433fecefb85dafb7006dcc4697e7cd5929e1
            • Instruction Fuzzy Hash: 0E02A270E0010ADBDF14DF68D982BAEBBB9FF84300F148069E846EB255EB35D915DB91
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
            • Instruction ID: c033105b5ce6f5e299165f399f24d3be0fafb46971f71a991a4381d9b5c37c81
            • Opcode Fuzzy Hash: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
            • Instruction Fuzzy Hash: 11C1C7326051E30ADF2D463AC43493EFBA15A927B131E076ED4B3CB5D5EF60C568E620
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
            • Instruction ID: fafd4552daead57d7e2b85ec38af974cfa91882d53e5ffc509ed9daac7554d6f
            • Opcode Fuzzy Hash: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
            • Instruction Fuzzy Hash: A5C1C5336051E309DF2D463AD43453EBBA15AA2BB131E076ED4B3CB5D5EF60C568E620
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
            • Instruction ID: daf7466a2a85eb19738f72ee7791169a38b77a1688d2787fdd55dab4fafe33e2
            • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
            • Instruction Fuzzy Hash: B4C185326051E309DF2D463A943493EBBA25AA27B131E077ED4B3CF6D5EF24C568E610
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
            • Instruction ID: 7f700be77c4ede42dc397a4cb054e2e47363977c4f445e3a81dfc5db7d99368b
            • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
            • Instruction Fuzzy Hash: 26C181326051A309DF2D4639D43493EBBA25AA17B531E077FD4B3CB6D5EE20C56CE620
            APIs
            • DeleteObject.GDI32(00000000), ref: 0101A2FE
            • DeleteObject.GDI32(00000000), ref: 0101A310
            • DestroyWindow.USER32 ref: 0101A31E
            • GetDesktopWindow.USER32 ref: 0101A338
            • GetWindowRect.USER32(00000000), ref: 0101A33F
            • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0101A480
            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 0101A490
            • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0101A4D8
            • GetClientRect.USER32(00000000,?), ref: 0101A4E4
            • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 0101A51E
            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0101A540
            • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0101A553
            • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0101A55E
            • GlobalLock.KERNEL32(00000000), ref: 0101A567
            • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0101A576
            • GlobalUnlock.KERNEL32(00000000), ref: 0101A57F
            • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0101A586
            • GlobalFree.KERNEL32(00000000), ref: 0101A591
            • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0101A5A3
            • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,0104D9BC,00000000), ref: 0101A5B9
            • GlobalFree.KERNEL32(00000000), ref: 0101A5C9
            • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 0101A5EF
            • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 0101A60E
            • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0101A630
            • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0101A81D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
            • String ID: $AutoIt v3$DISPLAY$static
            • API String ID: 2211948467-2373415609
            • Opcode ID: 9672bbab4b95d08ecdba07d29a50a6a2a5b652310e7c7bb1f120084e14fbb0c4
            • Instruction ID: eef95b33b0c4ed7c93c60f7020ad2c3ed5505dc895e593bc0564999cc4f38831
            • Opcode Fuzzy Hash: 9672bbab4b95d08ecdba07d29a50a6a2a5b652310e7c7bb1f120084e14fbb0c4
            • Instruction Fuzzy Hash: E7028F75A00145EFDB24DFA8CE89EAE7BB9FF48310F048158F945AB295CB799D01CB60
            APIs
            • SetTextColor.GDI32(?,00000000), ref: 0102D2DB
            • GetSysColorBrush.USER32(0000000F), ref: 0102D30C
            • GetSysColor.USER32(0000000F), ref: 0102D318
            • SetBkColor.GDI32(?,000000FF), ref: 0102D332
            • SelectObject.GDI32(?,00000000), ref: 0102D341
            • InflateRect.USER32(?,000000FF,000000FF), ref: 0102D36C
            • GetSysColor.USER32(00000010), ref: 0102D374
            • CreateSolidBrush.GDI32(00000000), ref: 0102D37B
            • FrameRect.USER32(?,?,00000000), ref: 0102D38A
            • DeleteObject.GDI32(00000000), ref: 0102D391
            • InflateRect.USER32(?,000000FE,000000FE), ref: 0102D3DC
            • FillRect.USER32(?,?,00000000), ref: 0102D40E
            • GetWindowLongW.USER32(?,000000F0), ref: 0102D439
              • Part of subcall function 0102D575: GetSysColor.USER32(00000012), ref: 0102D5AE
              • Part of subcall function 0102D575: SetTextColor.GDI32(?,?), ref: 0102D5B2
              • Part of subcall function 0102D575: GetSysColorBrush.USER32(0000000F), ref: 0102D5C8
              • Part of subcall function 0102D575: GetSysColor.USER32(0000000F), ref: 0102D5D3
              • Part of subcall function 0102D575: GetSysColor.USER32(00000011), ref: 0102D5F0
              • Part of subcall function 0102D575: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0102D5FE
              • Part of subcall function 0102D575: SelectObject.GDI32(?,00000000), ref: 0102D60F
              • Part of subcall function 0102D575: SetBkColor.GDI32(?,00000000), ref: 0102D618
              • Part of subcall function 0102D575: SelectObject.GDI32(?,?), ref: 0102D625
              • Part of subcall function 0102D575: InflateRect.USER32(?,000000FF,000000FF), ref: 0102D644
              • Part of subcall function 0102D575: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0102D65B
              • Part of subcall function 0102D575: GetWindowLongW.USER32(00000000,000000F0), ref: 0102D670
              • Part of subcall function 0102D575: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0102D698
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
            • String ID:
            • API String ID: 3521893082-0
            • Opcode ID: dacf0e722c9fb0be52a47d55b46df18c10b7ccb432b1a80651f01328d2e38c12
            • Instruction ID: 56303b7af80b51f95c434aa13aafc41b1dfd7485d004679d29d140af404ca187
            • Opcode Fuzzy Hash: dacf0e722c9fb0be52a47d55b46df18c10b7ccb432b1a80651f01328d2e38c12
            • Instruction Fuzzy Hash: BC91BFB5408311BFD7219FA4DD48A6B7BA9FF89321F000A19F9A2961D0CB36D944CB91
            APIs
            • DestroyWindow.USER32 ref: 00FDB98B
            • DeleteObject.GDI32(00000000), ref: 00FDB9CD
            • DeleteObject.GDI32(00000000), ref: 00FDB9D8
            • DestroyIcon.USER32(00000000), ref: 00FDB9E3
            • DestroyWindow.USER32(00000000), ref: 00FDB9EE
            • SendMessageW.USER32(?,00001308,?,00000000), ref: 0103D2AA
            • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0103D2E3
            • MoveWindow.USER32(00000000,?,?,?,?,00000000), ref: 0103D711
              • Part of subcall function 00FDB9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00FDB759,?,00000000,?,?,?,?,00FDB72B,00000000,?), ref: 00FDBA58
            • SendMessageW.USER32 ref: 0103D758
            • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0103D76F
            • ImageList_Destroy.COMCTL32(00000000), ref: 0103D785
            • ImageList_Destroy.COMCTL32(00000000), ref: 0103D790
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
            • String ID: 0
            • API String ID: 464785882-4108050209
            • Opcode ID: a0c682a1309a2a06e672bec7192da36a07473cff152ecc654177a5d31a026331
            • Instruction ID: 5cfa002a57edf859d6f0214ee41bd5050d3286e0c9771c15f751d56b67fd3c6e
            • Opcode Fuzzy Hash: a0c682a1309a2a06e672bec7192da36a07473cff152ecc654177a5d31a026331
            • Instruction Fuzzy Hash: C612CF74200241DFDB61CF68C494BA9BBE9FF88304F5845AAFAC9CB252C731E841DB91
            APIs
            • DestroyWindow.USER32(00000000), ref: 01019F83
            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0101A042
            • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 0101A080
            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 0101A092
            • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 0101A0D8
            • GetClientRect.USER32(00000000,?), ref: 0101A0E4
            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 0101A128
            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 0101A137
            • GetStockObject.GDI32(00000011), ref: 0101A147
            • SelectObject.GDI32(00000000,00000000), ref: 0101A14B
            • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 0101A15B
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0101A164
            • DeleteDC.GDI32(00000000), ref: 0101A16D
            • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0101A19B
            • SendMessageW.USER32(00000030,00000000,00000001), ref: 0101A1B2
            • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 0101A1ED
            • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 0101A201
            • SendMessageW.USER32(00000404,00000001,00000000), ref: 0101A212
            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 0101A242
            • GetStockObject.GDI32(00000011), ref: 0101A24D
            • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 0101A258
            • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 0101A262
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
            • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
            • API String ID: 2910397461-517079104
            • Opcode ID: 66f440d292c802a85baf186a5449abc186e80bbbb63d273984d0d7ac2ab40f3e
            • Instruction ID: 745fc52054d20c2f09b94420e954e400a4833bd49cb197f0e09e75a68200b2c1
            • Opcode Fuzzy Hash: 66f440d292c802a85baf186a5449abc186e80bbbb63d273984d0d7ac2ab40f3e
            • Instruction Fuzzy Hash: 0DA172B5A00215BFEB24DBA4DD4AFAE7BA9EF04710F004118FA54AB1D4D7B9AD01CF64
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0100DBD6
            • GetDriveTypeW.KERNEL32(?,0105DC54,?,\\.\,0105DC00), ref: 0100DCC3
            • SetErrorMode.KERNEL32(00000000,0105DC54,?,\\.\,0105DC00), ref: 0100DE29
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ErrorMode$DriveType
            • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
            • API String ID: 2907320926-4222207086
            • Opcode ID: 20aed6cbb766da61c31b0859d89c72a3ca75b5204221151763f1662e67dd3c39
            • Instruction ID: 014b673d97f78599f03349ceb34d0d0ac71ce6e9ffe1a056f1549523ac98218c
            • Opcode Fuzzy Hash: 20aed6cbb766da61c31b0859d89c72a3ca75b5204221151763f1662e67dd3c39
            • Instruction Fuzzy Hash: 2351BE30648306ABB212EBD5C992D3DBBE0FB94600F04486EF5CB9F2D1DB60D845D766
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: __wcsnicmp
            • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
            • API String ID: 1038674560-86951937
            • Opcode ID: dd1306615e0e39d20d62c0688371ef12567b049de3fc0bf08c61a91cd2a934c4
            • Instruction ID: 6c23ecce51f80c1128b33e6c5d1f408ad1efe7b703426ddd8fffbab052089149
            • Opcode Fuzzy Hash: dd1306615e0e39d20d62c0688371ef12567b049de3fc0bf08c61a91cd2a934c4
            • Instruction Fuzzy Hash: 3A81F931640216AADB11AAA5DD83FBF3BA9BF54700F04402DF94AAA182EB64D541E3E1
            APIs
            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013,?,?,?), ref: 0102C788
            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0102C83E
            • SendMessageW.USER32(?,00001102,00000002,?), ref: 0102C859
            • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0102CB15
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageSend$Window
            • String ID: 0
            • API String ID: 2326795674-4108050209
            • Opcode ID: ca33a6cdcebe7eb8cb6aaba8421449e35ceab7326a7c135cf9d2785ca2feaca9
            • Instruction ID: ca7abc398886f6e4f590fc7a9b1dde531e4293fb4da952d724b1368a372c814e
            • Opcode Fuzzy Hash: ca33a6cdcebe7eb8cb6aaba8421449e35ceab7326a7c135cf9d2785ca2feaca9
            • Instruction Fuzzy Hash: B2F1BF70204321AFF7618F28CA89BAEBFE4FF49354F08456DF6C996291C7798841DB91
            APIs
            • CharUpperBuffW.USER32(?,?,0105DC00), ref: 01026449
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: BuffCharUpper
            • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
            • API String ID: 3964851224-45149045
            • Opcode ID: 28cc767973cc037901da84f9608adc2dc915dec806b337afe5d6a19c8e9a4683
            • Instruction ID: a351d0a9cc184aa6e59164139998d54596de776d134a04770339f08ce1369f64
            • Opcode Fuzzy Hash: 28cc767973cc037901da84f9608adc2dc915dec806b337afe5d6a19c8e9a4683
            • Instruction Fuzzy Hash: 75C19430204265CBCA04EF14C951A6E77E6BF94344F04489DFDC69B3E2DB36E90ADB82
            APIs
            • GetSysColor.USER32(00000012), ref: 0102D5AE
            • SetTextColor.GDI32(?,?), ref: 0102D5B2
            • GetSysColorBrush.USER32(0000000F), ref: 0102D5C8
            • GetSysColor.USER32(0000000F), ref: 0102D5D3
            • CreateSolidBrush.GDI32(?), ref: 0102D5D8
            • GetSysColor.USER32(00000011), ref: 0102D5F0
            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0102D5FE
            • SelectObject.GDI32(?,00000000), ref: 0102D60F
            • SetBkColor.GDI32(?,00000000), ref: 0102D618
            • SelectObject.GDI32(?,?), ref: 0102D625
            • InflateRect.USER32(?,000000FF,000000FF), ref: 0102D644
            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0102D65B
            • GetWindowLongW.USER32(00000000,000000F0), ref: 0102D670
            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0102D698
            • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0102D6BF
            • InflateRect.USER32(?,000000FD,000000FD), ref: 0102D6DD
            • DrawFocusRect.USER32(?,?), ref: 0102D6E8
            • GetSysColor.USER32(00000011), ref: 0102D6F6
            • SetTextColor.GDI32(?,00000000), ref: 0102D6FE
            • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0102D712
            • SelectObject.GDI32(?,0102D2A5), ref: 0102D729
            • DeleteObject.GDI32(?), ref: 0102D734
            • SelectObject.GDI32(?,?), ref: 0102D73A
            • DeleteObject.GDI32(?), ref: 0102D73F
            • SetTextColor.GDI32(?,?), ref: 0102D745
            • SetBkColor.GDI32(?,?), ref: 0102D74F
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
            • String ID:
            • API String ID: 1996641542-0
            • Opcode ID: fa896b326627109b3b224119d24e915ebf2403b2afb4b1d6eef8935b89aee1fc
            • Instruction ID: 6e8bedf20868f43b1276210e464a27e5e3748a087384248821caa948ebad3a45
            • Opcode Fuzzy Hash: fa896b326627109b3b224119d24e915ebf2403b2afb4b1d6eef8935b89aee1fc
            • Instruction Fuzzy Hash: DD515DB5900218BFDB219FE8DD88EAE7BB9FF08324F104115FA55AB291D7759A40CF90
            APIs
            • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0102B7B0
            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0102B7C1
            • CharNextW.USER32(0000014E), ref: 0102B7F0
            • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 0102B831
            • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 0102B847
            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0102B858
            • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 0102B875
            • SetWindowTextW.USER32(?,0000014E), ref: 0102B8C7
            • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 0102B8DD
            • SendMessageW.USER32(?,00001002,00000000,?), ref: 0102B90E
            • _memset.LIBCMT ref: 0102B933
            • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 0102B97C
            • _memset.LIBCMT ref: 0102B9DB
            • SendMessageW.USER32 ref: 0102BA05
            • SendMessageW.USER32(?,00001074,?,00000001), ref: 0102BA5D
            • SendMessageW.USER32(?,0000133D,?,?), ref: 0102BB0A
            • InvalidateRect.USER32(?,00000000,00000001), ref: 0102BB2C
            • GetMenuItemInfoW.USER32(?), ref: 0102BB76
            • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 0102BBA3
            • DrawMenuBar.USER32(?), ref: 0102BBB2
            • SetWindowTextW.USER32(?,0000014E), ref: 0102BBDA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
            • String ID: 0
            • API String ID: 1073566785-4108050209
            • Opcode ID: d4f243b9ddf51925d6759c83fbb5aa36be56515a6b956c50009364d33bc344ea
            • Instruction ID: b6db02d8cb9ddca643f2fc0da4e29ab3cad201b8f83c0634557fb5106461d1d0
            • Opcode Fuzzy Hash: d4f243b9ddf51925d6759c83fbb5aa36be56515a6b956c50009364d33bc344ea
            • Instruction Fuzzy Hash: 8CE16175900229AFDF219F95CC84EFE7BB8FF09714F048196FA99AA280DB758541CF60
            APIs
            • GetCursorPos.USER32(?), ref: 0102778A
            • GetDesktopWindow.USER32 ref: 0102779F
            • GetWindowRect.USER32(00000000), ref: 010277A6
            • GetWindowLongW.USER32(?,000000F0), ref: 01027808
            • DestroyWindow.USER32(?), ref: 01027834
            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 0102785D
            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0102787B
            • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 010278A1
            • SendMessageW.USER32(?,00000421,?,?), ref: 010278B6
            • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 010278C9
            • IsWindowVisible.USER32(?), ref: 010278E9
            • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 01027904
            • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 01027918
            • GetWindowRect.USER32(?,?), ref: 01027930
            • MonitorFromPoint.USER32(?,?,00000002), ref: 01027956
            • GetMonitorInfoW.USER32 ref: 01027970
            • CopyRect.USER32(?,?), ref: 01027987
            • SendMessageW.USER32(?,00000412,00000000), ref: 010279F2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
            • String ID: ($0$tooltips_class32
            • API String ID: 698492251-4156429822
            • Opcode ID: 64791da6237e353977b09b417b02ddaa4ffcb66e69218204152ac46a7f943078
            • Instruction ID: 174ec551023853218e00835204f167cbbf38128ffa0ad9fb9a8e93ed8ad16cd1
            • Opcode Fuzzy Hash: 64791da6237e353977b09b417b02ddaa4ffcb66e69218204152ac46a7f943078
            • Instruction Fuzzy Hash: F3B1AA71604311AFD750DF68C989B6ABBE4FF98310F00891DF5C99B292DB75E804CB92
            APIs
            • GetFileVersionInfoSizeW.VERSION(?,?), ref: 01006CFB
            • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 01006D21
            • _wcscpy.LIBCMT ref: 01006D4F
            • _wcscmp.LIBCMT ref: 01006D5A
            • _wcscat.LIBCMT ref: 01006D70
            • _wcsstr.LIBCMT ref: 01006D7B
            • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 01006D97
            • _wcscat.LIBCMT ref: 01006DE0
            • _wcscat.LIBCMT ref: 01006DE7
            • _wcsncpy.LIBCMT ref: 01006E12
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
            • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
            • API String ID: 699586101-1459072770
            • Opcode ID: dc8b733f062c7420275a797f12b3e4625b509edc64363c74147e092b81f17985
            • Instruction ID: ebdc17f1abe0d00867ba664b76ec16f1edd82c057a0cc8cf8778308b83fa93b9
            • Opcode Fuzzy Hash: dc8b733f062c7420275a797f12b3e4625b509edc64363c74147e092b81f17985
            • Instruction Fuzzy Hash: DA413871900245BBF711BB6ADD43EBF77BDEF41310F04006AF941A6182EF79AA10A7A1
            APIs
            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00FDA939
            • GetSystemMetrics.USER32(00000007), ref: 00FDA941
            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00FDA96C
            • GetSystemMetrics.USER32(00000008), ref: 00FDA974
            • GetSystemMetrics.USER32(00000004), ref: 00FDA999
            • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00FDA9B6
            • AdjustWindowRectEx.USER32(000000FF,00000000,00000000,00000000), ref: 00FDA9C6
            • CreateWindowExW.USER32(00000000,AutoIt v3 GUI,?,00000000,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00FDA9F9
            • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00FDAA0D
            • GetClientRect.USER32(00000000,000000FF), ref: 00FDAA2B
            • GetStockObject.GDI32(00000011), ref: 00FDAA47
            • SendMessageW.USER32(00000000,00000030,00000000), ref: 00FDAA52
              • Part of subcall function 00FDB63C: GetCursorPos.USER32(000000FF), ref: 00FDB64F
              • Part of subcall function 00FDB63C: ScreenToClient.USER32(00000000,000000FF), ref: 00FDB66C
              • Part of subcall function 00FDB63C: GetAsyncKeyState.USER32(00000001), ref: 00FDB691
              • Part of subcall function 00FDB63C: GetAsyncKeyState.USER32(00000002), ref: 00FDB69F
            • SetTimer.USER32(00000000,00000000,00000028,00FDAB87), ref: 00FDAA79
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
            • String ID: AutoIt v3 GUI
            • API String ID: 1458621304-248962490
            • Opcode ID: 1d196dba4f929bcabc3c478d1c7e80b586ffa851948f7c50167a04808f49357b
            • Instruction ID: 9720b606fafc84ce73bccbe0cb4cd0dea6a217850b85832022d257a89e67261d
            • Opcode Fuzzy Hash: 1d196dba4f929bcabc3c478d1c7e80b586ffa851948f7c50167a04808f49357b
            • Instruction Fuzzy Hash: F9B1CE71A0020ADFDB24DFA8C985BAD7BB5FF48314F04421AFA85A7380DB39D841DB55
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Window$Foreground
            • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
            • API String ID: 62970417-1919597938
            • Opcode ID: 8b0294741dfd53e7d7fdb9c0b02f9764e4907829b7e1fc20cb618c0fbbbc5dc9
            • Instruction ID: e3de07f8c08dfd1aa06b4da48369423d1e145212b45548533ad652ac88598ec9
            • Opcode Fuzzy Hash: 8b0294741dfd53e7d7fdb9c0b02f9764e4907829b7e1fc20cb618c0fbbbc5dc9
            • Instruction Fuzzy Hash: C9D1B330508247EBCB04EF54CD81AAABBB9FF94340F004A5DF4D6572A2DB34E59ADB91
            APIs
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 01023735
            • RegCreateKeyExW.ADVAPI32(?,?,00000000,0105DC00,00000000,?,00000000,?,?), ref: 010237A3
            • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 010237EB
            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 01023874
            • RegCloseKey.ADVAPI32(?), ref: 01023B94
            • RegCloseKey.ADVAPI32(00000000), ref: 01023BA1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Close$ConnectCreateRegistryValue
            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
            • API String ID: 536824911-966354055
            • Opcode ID: 49e8e4f0e976cb5cd4f709274c7a4dbf42032c61b7575034d81ba32bef68d7c1
            • Instruction ID: 34ffe33fd2f55ff76503d3a65f95aaab8fd2e5850e27c9f327c8e3eaba46db47
            • Opcode Fuzzy Hash: 49e8e4f0e976cb5cd4f709274c7a4dbf42032c61b7575034d81ba32bef68d7c1
            • Instruction Fuzzy Hash: 970258756046119FDB15EF18C945E2AB7E9FF88720F04845DF99A9B3A1CB39EC01CB81
            APIs
            • CharUpperBuffW.USER32(?,?), ref: 01026C56
            • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 01026D16
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: BuffCharMessageSendUpper
            • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
            • API String ID: 3974292440-719923060
            • Opcode ID: 9631a3ee4406822bb2ff5f42ec80fef4d6f7adc2caec914544201282889c3ab5
            • Instruction ID: 469d85ff7d36e41ed862b4fd09a63ab92340d2603d2d5e3ad97cb68bb17cf0be
            • Opcode Fuzzy Hash: 9631a3ee4406822bb2ff5f42ec80fef4d6f7adc2caec914544201282889c3ab5
            • Instruction Fuzzy Hash: D2A18B306142569BCA54FF24CD52E6EB3A6BF84310F0449ADED969B392DB35EC09CB81
            APIs
            • GetClassNameW.USER32(?,?,00000100), ref: 00FFCF91
            • __swprintf.LIBCMT ref: 00FFD032
            • _wcscmp.LIBCMT ref: 00FFD045
            • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00FFD09A
            • _wcscmp.LIBCMT ref: 00FFD0D6
            • GetClassNameW.USER32(?,?,00000400), ref: 00FFD10D
            • GetDlgCtrlID.USER32(?), ref: 00FFD15F
            • GetWindowRect.USER32(?,?), ref: 00FFD195
            • GetParent.USER32(?), ref: 00FFD1B3
            • ScreenToClient.USER32(00000000), ref: 00FFD1BA
            • GetClassNameW.USER32(?,?,00000100), ref: 00FFD234
            • _wcscmp.LIBCMT ref: 00FFD248
            • GetWindowTextW.USER32(?,?,00000400), ref: 00FFD26E
            • _wcscmp.LIBCMT ref: 00FFD282
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf
            • String ID: %s%u
            • API String ID: 3119225716-679674701
            • Opcode ID: 6d741a9fa8eb589db7d3c8dfe360ab1d0d032f537a6ac04e82b629d90c65704f
            • Instruction ID: dabd6bb5a1843a5eaa29e9498a83e8187ec83dfb824cec0bce759173958d1e7c
            • Opcode Fuzzy Hash: 6d741a9fa8eb589db7d3c8dfe360ab1d0d032f537a6ac04e82b629d90c65704f
            • Instruction Fuzzy Hash: CDA1F171A0430AAFD715DF60C984FBAB7A9FF44364F004619FA99D21A0DB30EA05DBE1
            APIs
            • GetClassNameW.USER32(00000008,?,00000400), ref: 00FFD8EB
            • _wcscmp.LIBCMT ref: 00FFD8FC
            • GetWindowTextW.USER32(00000001,?,00000400), ref: 00FFD924
            • CharUpperBuffW.USER32(?,00000000), ref: 00FFD941
            • _wcscmp.LIBCMT ref: 00FFD95F
            • _wcsstr.LIBCMT ref: 00FFD970
            • GetClassNameW.USER32(00000018,?,00000400), ref: 00FFD9A8
            • _wcscmp.LIBCMT ref: 00FFD9B8
            • GetWindowTextW.USER32(00000002,?,00000400), ref: 00FFD9DF
            • GetClassNameW.USER32(00000018,?,00000400), ref: 00FFDA28
            • _wcscmp.LIBCMT ref: 00FFDA38
            • GetClassNameW.USER32(00000010,?,00000400), ref: 00FFDA60
            • GetWindowRect.USER32(00000004,?), ref: 00FFDAC9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
            • String ID: @$ThumbnailClass
            • API String ID: 1788623398-1539354611
            • Opcode ID: a535bf0ad36cf542bb1c275979e8581a0b903e367dd9774c5ed58782e5cf9f09
            • Instruction ID: 999488649c0df66ef57814954ee0a9c3835c587e62b9068430c2cac43f7d417d
            • Opcode Fuzzy Hash: a535bf0ad36cf542bb1c275979e8581a0b903e367dd9774c5ed58782e5cf9f09
            • Instruction Fuzzy Hash: A281153140830A9BDB11DF50C985FBA7BE9FF84324F04406AFE899A0A6DB74DD45DBA1
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: __wcsnicmp
            • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
            • API String ID: 1038674560-1810252412
            • Opcode ID: 9628925386f4ed217713b59fe6a9334b0cf8c97b9a1865dbece90b037e739ab8
            • Instruction ID: 700af8491d9e92ee422e6309b1bddf87dce09a99ce31786b4199b70829fba89e
            • Opcode Fuzzy Hash: 9628925386f4ed217713b59fe6a9334b0cf8c97b9a1865dbece90b037e739ab8
            • Instruction Fuzzy Hash: 1731A132E4424AA6DB14FA52CE43FBD73759F20750F20002DF681B90E1EF69AE44E659
            APIs
            • LoadIconW.USER32(00000063), ref: 00FFEAB0
            • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00FFEAC2
            • SetWindowTextW.USER32(?,?), ref: 00FFEAD9
            • GetDlgItem.USER32(?,000003EA), ref: 00FFEAEE
            • SetWindowTextW.USER32(00000000,?), ref: 00FFEAF4
            • GetDlgItem.USER32(?,000003E9), ref: 00FFEB04
            • SetWindowTextW.USER32(00000000,?), ref: 00FFEB0A
            • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00FFEB2B
            • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00FFEB45
            • GetWindowRect.USER32(?,?), ref: 00FFEB4E
            • SetWindowTextW.USER32(?,?), ref: 00FFEBB9
            • GetDesktopWindow.USER32 ref: 00FFEBBF
            • GetWindowRect.USER32(00000000), ref: 00FFEBC6
            • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00FFEC12
            • GetClientRect.USER32(?,?), ref: 00FFEC1F
            • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00FFEC44
            • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00FFEC6F
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
            • String ID:
            • API String ID: 3869813825-0
            • Opcode ID: b245d19e7297582c9da4d32d69f54e1cdb96e01ab64b62c0a99465b66472704d
            • Instruction ID: 58905ab315e4b4aeaddb86526557e1225e88ac88493bf3655ff1576a46e1a6e1
            • Opcode Fuzzy Hash: b245d19e7297582c9da4d32d69f54e1cdb96e01ab64b62c0a99465b66472704d
            • Instruction Fuzzy Hash: 82516D75900709EFDB21DFA8CE89F6EBBF5FF48714F004918E686A25A0D779A904DB10
            APIs
            • LoadCursorW.USER32(00000000,00007F8A), ref: 010179C6
            • LoadCursorW.USER32(00000000,00007F00), ref: 010179D1
            • LoadCursorW.USER32(00000000,00007F03), ref: 010179DC
            • LoadCursorW.USER32(00000000,00007F8B), ref: 010179E7
            • LoadCursorW.USER32(00000000,00007F01), ref: 010179F2
            • LoadCursorW.USER32(00000000,00007F81), ref: 010179FD
            • LoadCursorW.USER32(00000000,00007F88), ref: 01017A08
            • LoadCursorW.USER32(00000000,00007F80), ref: 01017A13
            • LoadCursorW.USER32(00000000,00007F86), ref: 01017A1E
            • LoadCursorW.USER32(00000000,00007F83), ref: 01017A29
            • LoadCursorW.USER32(00000000,00007F85), ref: 01017A34
            • LoadCursorW.USER32(00000000,00007F82), ref: 01017A3F
            • LoadCursorW.USER32(00000000,00007F84), ref: 01017A4A
            • LoadCursorW.USER32(00000000,00007F04), ref: 01017A55
            • LoadCursorW.USER32(00000000,00007F02), ref: 01017A60
            • LoadCursorW.USER32(00000000,00007F89), ref: 01017A6B
            • GetCursorInfo.USER32(?), ref: 01017A7B
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Cursor$Load$Info
            • String ID:
            • API String ID: 2577412497-0
            • Opcode ID: 8cf23bdf584a956425f4f52073279e2743018d353df929b0e847c4de4524f17f
            • Instruction ID: d1f90f80fddea5df421402359bec2c000e0d790a9656c21fcdcc5888961f2761
            • Opcode Fuzzy Hash: 8cf23bdf584a956425f4f52073279e2743018d353df929b0e847c4de4524f17f
            • Instruction Fuzzy Hash: E53115B1D4431A6ADB509FF68C8995FBFE8FF44750F40452BA54DE7280DA7CA5008FA1
            APIs
              • Part of subcall function 00FDE968: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00FCC8B7,?,00002000,?,?,00000000,?,00FC419E,?,?,?,0105DC00), ref: 00FDE984
              • Part of subcall function 00FC660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00FC53B1,?,?,00FC61FF,?,00000000,00000001,00000000), ref: 00FC662F
            • __wsplitpath.LIBCMT ref: 00FCC93E
              • Part of subcall function 00FE1DFC: __wsplitpath_helper.LIBCMT ref: 00FE1E3C
            • _wcscpy.LIBCMT ref: 00FCC953
            • _wcscat.LIBCMT ref: 00FCC968
            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 00FCC978
            • SetCurrentDirectoryW.KERNEL32(?), ref: 00FCCABE
              • Part of subcall function 00FCB337: _wcscpy.LIBCMT ref: 00FCB36F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CurrentDirectory$_wcscpy$FullNamePath__wsplitpath__wsplitpath_helper_wcscat
            • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
            • API String ID: 2258743419-1018226102
            • Opcode ID: cb51398766dc5795ca05a1ffeb2330549ac7e1e3c7c8c06e0f2f5488f4198d87
            • Instruction ID: 95509536213bafb274318d91555096c5303b6adbb35a3455316c1500988bd6d3
            • Opcode Fuzzy Hash: cb51398766dc5795ca05a1ffeb2330549ac7e1e3c7c8c06e0f2f5488f4198d87
            • Instruction Fuzzy Hash: 46129A714083429FC725EF24C992EAEBBE9BFD8300F04491EF5CA97251DB349949DB92
            APIs
            • _memset.LIBCMT ref: 0102CEFB
            • DestroyWindow.USER32(?,?), ref: 0102CF73
            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0102CFF4
            • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0102D016
            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0102D025
            • DestroyWindow.USER32(?), ref: 0102D042
            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00FC0000,00000000), ref: 0102D075
            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0102D094
            • GetDesktopWindow.USER32 ref: 0102D0A9
            • GetWindowRect.USER32(00000000), ref: 0102D0B0
            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0102D0C2
            • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0102D0DA
              • Part of subcall function 00FDB526: GetWindowLongW.USER32(?,000000EB), ref: 00FDB537
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memset
            • String ID: 0$tooltips_class32
            • API String ID: 3877571568-3619404913
            • Opcode ID: bb64335ec19a09adbb9924772fcff36fde82be3739c74f9a73d8b412cfd6040a
            • Instruction ID: b51a995b901c4b8448de82b583a16d5151d1159c5c252ac99110f56fc24517e7
            • Opcode Fuzzy Hash: bb64335ec19a09adbb9924772fcff36fde82be3739c74f9a73d8b412cfd6040a
            • Instruction Fuzzy Hash: 9371CCB4144305AFE724CF68CC85F6A3BE5EB88748F04495DFAC5872A1D739E842CB12
            APIs
              • Part of subcall function 00FDB34E: GetWindowLongW.USER32(?,000000EB), ref: 00FDB35F
            • DragQueryPoint.SHELL32(?,?), ref: 0102F37A
              • Part of subcall function 0102D7DE: ClientToScreen.USER32(?,?), ref: 0102D807
              • Part of subcall function 0102D7DE: GetWindowRect.USER32(?,?), ref: 0102D87D
              • Part of subcall function 0102D7DE: PtInRect.USER32(?,?,0102ED5A), ref: 0102D88D
            • SendMessageW.USER32(?,000000B0,?,?), ref: 0102F3E3
            • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0102F3EE
            • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0102F411
            • _wcscat.LIBCMT ref: 0102F441
            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0102F458
            • SendMessageW.USER32(?,000000B0,?,?), ref: 0102F471
            • SendMessageW.USER32(?,000000B1,?,?), ref: 0102F488
            • SendMessageW.USER32(?,000000B1,?,?), ref: 0102F4AA
            • DragFinish.SHELL32(?), ref: 0102F4B1
            • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0102F59C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
            • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
            • API String ID: 169749273-3440237614
            • Opcode ID: 690c3b8816f7711bd156d00bdaf404c20cc2e37b4fe82a7af6290e237c896043
            • Instruction ID: cfb7e1f60ba271959975aa78294f3acca54b6d04a73d9ad7c7e80b4ab78e9639
            • Opcode Fuzzy Hash: 690c3b8816f7711bd156d00bdaf404c20cc2e37b4fe82a7af6290e237c896043
            • Instruction Fuzzy Hash: B9615971108301AFC311EFA4CD85E9FBBF8AF99714F000A1EF6D5961A1DB759A09CB92
            APIs
            • VariantInit.OLEAUT32(00000000), ref: 0100AB3D
            • VariantCopy.OLEAUT32(?,?), ref: 0100AB46
            • VariantClear.OLEAUT32(?), ref: 0100AB52
            • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 0100AC40
            • __swprintf.LIBCMT ref: 0100AC70
            • VarR8FromDec.OLEAUT32(?,?), ref: 0100AC9C
            • VariantInit.OLEAUT32(?), ref: 0100AD4D
            • SysFreeString.OLEAUT32(00000016), ref: 0100ADDF
            • VariantClear.OLEAUT32(?), ref: 0100AE35
            • VariantClear.OLEAUT32(?), ref: 0100AE44
            • VariantInit.OLEAUT32(00000000), ref: 0100AE80
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
            • String ID: %4d%02d%02d%02d%02d%02d$Default
            • API String ID: 3730832054-3931177956
            • Opcode ID: 37cab0d85bdaadd1c10a7ec6dd1d645985fb45f41ad4a5fc792456b065774716
            • Instruction ID: 067404031c3adfebcac14936c4a0e4bc4904f6c831d93a8eb16ec3767bce7221
            • Opcode Fuzzy Hash: 37cab0d85bdaadd1c10a7ec6dd1d645985fb45f41ad4a5fc792456b065774716
            • Instruction Fuzzy Hash: F5D1B171700706DBEB229F59C885BADBBF5BF05700F048456E5869F2C2DB78E840DBA1
            APIs
            • CharUpperBuffW.USER32(?,?), ref: 010271FC
            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 01027247
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: BuffCharMessageSendUpper
            • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
            • API String ID: 3974292440-4258414348
            • Opcode ID: d42f5ccc9a10d7b979af012c367f36b8fbdc6776a16693fba7f9cac1a5c62b74
            • Instruction ID: 620911b2bafd31b84e1b7b9e1f2a34b3d7d41680e6f9611e6b79e060cf4a4b89
            • Opcode Fuzzy Hash: d42f5ccc9a10d7b979af012c367f36b8fbdc6776a16693fba7f9cac1a5c62b74
            • Instruction Fuzzy Hash: C69180302043159BCB04EF14C952A6EBBE6BFA4310F04489DF9965B3A3DB75ED0ADB81
            APIs
            • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0102E5AB
            • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,0102BEAF), ref: 0102E607
            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0102E647
            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0102E68C
            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0102E6C3
            • FreeLibrary.KERNEL32(?,00000004,?,?,?,?,0102BEAF), ref: 0102E6CF
            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0102E6DF
            • DestroyIcon.USER32(?,?,?,?,?,0102BEAF), ref: 0102E6EE
            • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0102E70B
            • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0102E717
              • Part of subcall function 00FE0FA7: __wcsicmp_l.LIBCMT ref: 00FE1030
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
            • String ID: .dll$.exe$.icl
            • API String ID: 1212759294-1154884017
            • Opcode ID: 5ae01a8f925a28bb9c40d28c8b7fb6a7de2ec639d2b33bf5944bae36df62f252
            • Instruction ID: 4797a920b10aeb19dacf695a2205019de6964ce11d7c953eef73e9b6ec841e37
            • Opcode Fuzzy Hash: 5ae01a8f925a28bb9c40d28c8b7fb6a7de2ec639d2b33bf5944bae36df62f252
            • Instruction Fuzzy Hash: D161F471540225FBEB20DF68CD86FFE7BA8BB08750F104155F995D61C1EBB59980C7A0
            APIs
              • Part of subcall function 00FC936C: __swprintf.LIBCMT ref: 00FC93AB
              • Part of subcall function 00FC936C: __itow.LIBCMT ref: 00FC93DF
            • CharLowerBuffW.USER32(?,?), ref: 0100D292
            • GetDriveTypeW.KERNEL32 ref: 0100D2DF
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0100D327
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0100D35E
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0100D38C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: SendString$BuffCharDriveLowerType__itow__swprintf
            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
            • API String ID: 1148790751-4113822522
            • Opcode ID: 2b8e23c5ef23414c83b18ed5dca13a5504f4c0bacb098ded07d9a5159a2864e7
            • Instruction ID: 73be6fafcc96d60b5dbe0ab68bdf4824b5f3971456b6e368c443920fe64ac727
            • Opcode Fuzzy Hash: 2b8e23c5ef23414c83b18ed5dca13a5504f4c0bacb098ded07d9a5159a2864e7
            • Instruction Fuzzy Hash: 94516A71504205AFD700EF54C982E6EB7E8FF98718F04885DF8896B291DB35EE09DB92
            APIs
            • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000016,00000000,?,?,01033973,00000016,0000138C,00000016,?,00000016,0105DDB4,00000000,?), ref: 010026F1
            • LoadStringW.USER32(00000000,?,01033973,00000016), ref: 010026FA
            • GetModuleHandleW.KERNEL32(00000000,00000016,?,00000FFF,?,?,01033973,00000016,0000138C,00000016,?,00000016,0105DDB4,00000000,?,00000016), ref: 0100271C
            • LoadStringW.USER32(00000000,?,01033973,00000016), ref: 0100271F
            • __swprintf.LIBCMT ref: 0100276F
            • __swprintf.LIBCMT ref: 01002780
            • _wprintf.LIBCMT ref: 01002829
            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 01002840
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: HandleLoadModuleString__swprintf$Message_wprintf
            • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
            • API String ID: 618562835-2268648507
            • Opcode ID: a382fc6ab8d16c3ceab2ab523978f5aaeac754d063f1e6856d173a439a6e5879
            • Instruction ID: b50d77036f613d0cfdf494f846e0740ebb54b1de7e0f58de156be2f00a9e4443
            • Opcode Fuzzy Hash: a382fc6ab8d16c3ceab2ab523978f5aaeac754d063f1e6856d173a439a6e5879
            • Instruction Fuzzy Hash: 3541627280010ABADB15FBD0CE87EEEB778AF54740F100069F54576092EA396F49EBA0
            APIs
            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0100D0D8
            • __swprintf.LIBCMT ref: 0100D0FA
            • CreateDirectoryW.KERNEL32(?,00000000), ref: 0100D137
            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0100D15C
            • _memset.LIBCMT ref: 0100D17B
            • _wcsncpy.LIBCMT ref: 0100D1B7
            • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0100D1EC
            • CloseHandle.KERNEL32(00000000), ref: 0100D1F7
            • RemoveDirectoryW.KERNEL32(?), ref: 0100D200
            • CloseHandle.KERNEL32(00000000), ref: 0100D20A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
            • String ID: :$\$\??\%s
            • API String ID: 2733774712-3457252023
            • Opcode ID: 9933c79981b0a78da9ae246666ae890457867ecb8cbd7700df65d00c11556d62
            • Instruction ID: 5fc2ac51ef04ce026f96ff29f106e70c204b7e7b56c1fe42c8f7ad0d9b44856e
            • Opcode Fuzzy Hash: 9933c79981b0a78da9ae246666ae890457867ecb8cbd7700df65d00c11556d62
            • Instruction Fuzzy Hash: 123190B6500109ABEB22DFE5DD89FEB77BCAF98700F1040B6F649D2195EB7492448B34
            APIs
            • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,0102BEF4,?,?), ref: 0102E754
            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,0102BEF4,?,?,00000000,?), ref: 0102E76B
            • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,0102BEF4,?,?,00000000,?), ref: 0102E776
            • CloseHandle.KERNEL32(00000000,?,?,?,?,0102BEF4,?,?,00000000,?), ref: 0102E783
            • GlobalLock.KERNEL32(00000000), ref: 0102E78C
            • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,0102BEF4,?,?,00000000,?), ref: 0102E79B
            • GlobalUnlock.KERNEL32(00000000), ref: 0102E7A4
            • CloseHandle.KERNEL32(00000000,?,?,?,?,0102BEF4,?,?,00000000,?), ref: 0102E7AB
            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,0102BEF4,?,?,00000000,?), ref: 0102E7BC
            • OleLoadPicture.OLEAUT32(?,00000000,00000000,0104D9BC,?), ref: 0102E7D5
            • GlobalFree.KERNEL32(00000000), ref: 0102E7E5
            • GetObjectW.GDI32(00000000,00000018,?), ref: 0102E809
            • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 0102E834
            • DeleteObject.GDI32(00000000), ref: 0102E85C
            • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0102E872
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
            • String ID:
            • API String ID: 3840717409-0
            • Opcode ID: 0e4bfa10f5ebc9e809a08ef5ddd523c8087ca0bb5e4681066a100bedf4882a5c
            • Instruction ID: 9cfd4f085be3ad66b3c91b4c42009d6e82bd798985c2558deba92f2601cb3674
            • Opcode Fuzzy Hash: 0e4bfa10f5ebc9e809a08ef5ddd523c8087ca0bb5e4681066a100bedf4882a5c
            • Instruction Fuzzy Hash: 07418DB9600214FFDB219FA5DD88EAE7BB9FF99B21F108058F989D7250C7759900CB20
            APIs
            • __wsplitpath.LIBCMT ref: 0101076F
            • _wcscat.LIBCMT ref: 01010787
            • _wcscat.LIBCMT ref: 01010799
            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 010107AE
            • SetCurrentDirectoryW.KERNEL32(?), ref: 010107C2
            • GetFileAttributesW.KERNEL32(?), ref: 010107DA
            • SetFileAttributesW.KERNEL32(?,00000000), ref: 010107F4
            • SetCurrentDirectoryW.KERNEL32(?), ref: 01010806
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
            • String ID: *.*
            • API String ID: 34673085-438819550
            • Opcode ID: 47503f05e0e2e829ebd6b2da042f4f9f3e8c843e703f160d05516954cbc25b9f
            • Instruction ID: 85d2970e880fe9bfb183f74548ad224a6e81201c48c05875682ea8914eea4cf5
            • Opcode Fuzzy Hash: 47503f05e0e2e829ebd6b2da042f4f9f3e8c843e703f160d05516954cbc25b9f
            • Instruction Fuzzy Hash: DE81B0715043419FDB60DF68C84596EB7E8BBC8314F188C6EF9C9C7259EB38D9848B92
            APIs
              • Part of subcall function 00FDB34E: GetWindowLongW.USER32(?,000000EB), ref: 00FDB35F
            • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0102EF3B
            • GetFocus.USER32 ref: 0102EF4B
            • GetDlgCtrlID.USER32(00000000), ref: 0102EF56
            • _memset.LIBCMT ref: 0102F081
            • GetMenuItemInfoW.USER32 ref: 0102F0AC
            • GetMenuItemCount.USER32(00000000), ref: 0102F0CC
            • GetMenuItemID.USER32(?,00000000), ref: 0102F0DF
            • GetMenuItemInfoW.USER32(00000000,-00000001,00000001,?), ref: 0102F113
            • GetMenuItemInfoW.USER32(00000000,?,00000001,?), ref: 0102F15B
            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0102F193
            • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0102F1C8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
            • String ID: 0
            • API String ID: 1296962147-4108050209
            • Opcode ID: c5f29d1afd2fa731226a2e2fcff712d854e773a09682772070731bec6549e3de
            • Instruction ID: df447d53a1211abe6ecdbb2f74f3cd76bbbbd87547b17168ca3249170bd7af88
            • Opcode Fuzzy Hash: c5f29d1afd2fa731226a2e2fcff712d854e773a09682772070731bec6549e3de
            • Instruction Fuzzy Hash: 73818A70208322AFE761CF18C984A6BBBE9FB89354F10056EF9D997281D735D801CB92
            APIs
              • Part of subcall function 00FFABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00FFABD7
              • Part of subcall function 00FFABBB: GetLastError.KERNEL32(?,00FFA69F,?,?,?), ref: 00FFABE1
              • Part of subcall function 00FFABBB: GetProcessHeap.KERNEL32(00000008,?,?,00FFA69F,?,?,?), ref: 00FFABF0
              • Part of subcall function 00FFABBB: HeapAlloc.KERNEL32(00000000,?,00FFA69F,?,?,?), ref: 00FFABF7
              • Part of subcall function 00FFABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00FFAC0E
              • Part of subcall function 00FFAC56: GetProcessHeap.KERNEL32(00000008,00FFA6B5,00000000,00000000,?,00FFA6B5,?), ref: 00FFAC62
              • Part of subcall function 00FFAC56: HeapAlloc.KERNEL32(00000000,?,00FFA6B5,?), ref: 00FFAC69
              • Part of subcall function 00FFAC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00FFA6B5,?), ref: 00FFAC7A
            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00FFA8CB
            • _memset.LIBCMT ref: 00FFA8E0
            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00FFA8FF
            • GetLengthSid.ADVAPI32(?), ref: 00FFA910
            • GetAce.ADVAPI32(?,00000000,?), ref: 00FFA94D
            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00FFA969
            • GetLengthSid.ADVAPI32(?), ref: 00FFA986
            • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00FFA995
            • HeapAlloc.KERNEL32(00000000), ref: 00FFA99C
            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00FFA9BD
            • CopySid.ADVAPI32(00000000), ref: 00FFA9C4
            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00FFA9F5
            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00FFAA1B
            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00FFAA2F
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
            • String ID:
            • API String ID: 3996160137-0
            • Opcode ID: abfb3c4ed699967ae845164dc5502b51650199133fdd0819b78d2161fb1eecfc
            • Instruction ID: 37ac57edc7e439502ecbac8146b3de1172fafed6da72350d4580ec2676737bb9
            • Opcode Fuzzy Hash: abfb3c4ed699967ae845164dc5502b51650199133fdd0819b78d2161fb1eecfc
            • Instruction Fuzzy Hash: C0515BB5900209AFDF10DF90DD84AFEBBB9FF04310F048129FA55A7290DB7A9A05DB61
            APIs
            • GetDC.USER32(00000000), ref: 01019E36
            • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 01019E42
            • CreateCompatibleDC.GDI32(?), ref: 01019E4E
            • SelectObject.GDI32(00000000,?), ref: 01019E5B
            • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 01019EAF
            • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,?,00000000), ref: 01019EEB
            • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 01019F0F
            • SelectObject.GDI32(00000006,?), ref: 01019F17
            • DeleteObject.GDI32(?), ref: 01019F20
            • DeleteDC.GDI32(00000006), ref: 01019F27
            • ReleaseDC.USER32(00000000,?), ref: 01019F32
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
            • String ID: (
            • API String ID: 2598888154-3887548279
            • Opcode ID: 3476498e989d40e5b9461d0b897dbb29202020dbe36db7f872ae3b3a35ced505
            • Instruction ID: 78abba471c07ef6905a0652d90d501523b259d31a225b4595328fe410ae1de01
            • Opcode Fuzzy Hash: 3476498e989d40e5b9461d0b897dbb29202020dbe36db7f872ae3b3a35ced505
            • Instruction Fuzzy Hash: 9F514CB5900309EFDB25CFA8C885EAEBBF9EF48710F14841DF99A97214D739A941CB50
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: LoadString__swprintf_wprintf
            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
            • API String ID: 2889450990-2391861430
            • Opcode ID: a895417f0721b1dc06034f3b7f08963ea8a188a9520ba92b4bd3cf6ae56c4dfb
            • Instruction ID: 02c53eaa175a79176c5c244407fa2ddbcc0a804759347876bf7331084251de63
            • Opcode Fuzzy Hash: a895417f0721b1dc06034f3b7f08963ea8a188a9520ba92b4bd3cf6ae56c4dfb
            • Instruction Fuzzy Hash: 7C51737190014AAAEB15EBE0CE47EEEB778AF14300F100169F54576091EB356F59EF61
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: LoadString__swprintf_wprintf
            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
            • API String ID: 2889450990-3420473620
            • Opcode ID: 09581d6135acea7c914a5463f2440af27ffe69f80d0b83a3ef35f02e5379fef5
            • Instruction ID: 49e6fa3102cfa4b569de01e8fd043018702b3ca089b54e55c16b245231effd14
            • Opcode Fuzzy Hash: 09581d6135acea7c914a5463f2440af27ffe69f80d0b83a3ef35f02e5379fef5
            • Instruction Fuzzy Hash: 4551B23190050AAAEB25EBE0CE47FEEB778AF04300F100169F54576092EB796F59EF61
            APIs
            • _memset.LIBCMT ref: 010055D7
            • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 01005664
            • GetMenuItemCount.USER32(01081708), ref: 010056ED
            • DeleteMenu.USER32(01081708,00000005,00000000,000000F5,?,?), ref: 0100577D
            • DeleteMenu.USER32(01081708,00000004,00000000), ref: 01005785
            • DeleteMenu.USER32(01081708,00000006,00000000), ref: 0100578D
            • DeleteMenu.USER32(01081708,00000003,00000000), ref: 01005795
            • GetMenuItemCount.USER32(01081708), ref: 0100579D
            • SetMenuItemInfoW.USER32(01081708,00000004,00000000,00000030), ref: 010057D3
            • GetCursorPos.USER32(?), ref: 010057DD
            • SetForegroundWindow.USER32(00000000), ref: 010057E6
            • TrackPopupMenuEx.USER32(01081708,00000000,?,00000000,00000000,00000000), ref: 010057F9
            • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 01005805
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
            • String ID:
            • API String ID: 3993528054-0
            • Opcode ID: 4d629774b6e87342795d251b3125d8585b887d14dedbf6d817685e9f4184a0d0
            • Instruction ID: 307e72e40ef735b3f9eb08f14657399d9b74606db47178577ceed6d9f71baf5a
            • Opcode Fuzzy Hash: 4d629774b6e87342795d251b3125d8585b887d14dedbf6d817685e9f4184a0d0
            • Instruction Fuzzy Hash: A671F670640205BFFB229B59EC88FAABFA5FF04364F140245F699AB1D1CB716850DF94
            APIs
            • _memset.LIBCMT ref: 00FFA1DC
            • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00FFA211
            • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00FFA22D
            • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00FFA249
            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00FFA273
            • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00FFA29B
            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00FFA2A6
            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00FFA2AB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memset
            • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
            • API String ID: 1687751970-22481851
            • Opcode ID: 544361f836728c19a870f25266712e3761762d33b98adba5ecc2421e43a943c7
            • Instruction ID: 9ef4ca4b3e0763c06aa7c65f82fce27ef65089b83271d19e6f57752d23f2a959
            • Opcode Fuzzy Hash: 544361f836728c19a870f25266712e3761762d33b98adba5ecc2421e43a943c7
            • Instruction Fuzzy Hash: 8E4127B6C1022DABCB21EBA4DD86EEDB7B8FF14710F044069F905A7160EA799E05DB50
            APIs
            • CharUpperBuffW.USER32(?,?,?,?,?,?,?,01022BB5,?,?), ref: 01023C1D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: BuffCharUpper
            • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
            • API String ID: 3964851224-909552448
            • Opcode ID: 4b37eacb29d1b6adc98bd63b4e579512b6754f91c39ecfab54fd2bb3e4cb4251
            • Instruction ID: c0dcb85909f5454bcf5c85c5c17beeb79e720c1ff71370676d3cce1572078ea8
            • Opcode Fuzzy Hash: 4b37eacb29d1b6adc98bd63b4e579512b6754f91c39ecfab54fd2bb3e4cb4251
            • Instruction Fuzzy Hash: 34415B3051025A8BDF01FF14ED41AEA3366BF56300F544899ECD55F793EB78A90ACB50
            APIs
            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,010336F4,00000010,?,Bad directive syntax error,0105DC00,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 010025D6
            • LoadStringW.USER32(00000000,?,010336F4,00000010), ref: 010025DD
            • _wprintf.LIBCMT ref: 01002610
            • __swprintf.LIBCMT ref: 01002632
            • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 010026A1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: HandleLoadMessageModuleString__swprintf_wprintf
            • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
            • API String ID: 1080873982-4153970271
            • Opcode ID: 0860b05aad469aebaeb24b86fd2c93bbe6943551a4b89d6461cbcc6d4e204310
            • Instruction ID: c4c6d740c98e94295e9cd3e7c4752c18b661eab125dad21f0b2bd1f94b85bc45
            • Opcode Fuzzy Hash: 0860b05aad469aebaeb24b86fd2c93bbe6943551a4b89d6461cbcc6d4e204310
            • Instruction Fuzzy Hash: 43218D7180021EBFDF12AF91CC4AFEE7B78BF18704F040459F5456A0A2EA75A659EB50
            APIs
            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 01007B42
            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 01007B58
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 01007B69
            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 01007B7B
            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 01007B8C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: SendString
            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
            • API String ID: 890592661-1007645807
            • Opcode ID: 621da7c7a88195f7c44cdc85a227ab5e839de825f868bcb0e0a6f1cffb7ebe37
            • Instruction ID: 86b67728d8d789d8d1af14b9568d71ec273be6fc30cc043c365b829de860a8fa
            • Opcode Fuzzy Hash: 621da7c7a88195f7c44cdc85a227ab5e839de825f868bcb0e0a6f1cffb7ebe37
            • Instruction Fuzzy Hash: 7411B6A0A5016A79F770B2A6CD4BEFFBABCFFD1B00F00041DB591AA0C1DE645945D6B1
            APIs
            • timeGetTime.WINMM ref: 01007794
              • Part of subcall function 00FDDC38: timeGetTime.WINMM(?,75A4B400,010358AB), ref: 00FDDC3C
            • Sleep.KERNEL32(0000000A), ref: 010077C0
            • EnumThreadWindows.USER32(?,Function_00047744,00000000), ref: 010077E4
            • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 01007806
            • SetActiveWindow.USER32 ref: 01007825
            • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 01007833
            • SendMessageW.USER32(00000010,00000000,00000000), ref: 01007852
            • Sleep.KERNEL32(000000FA), ref: 0100785D
            • IsWindow.USER32 ref: 01007869
            • EndDialog.USER32(00000000), ref: 0100787A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
            • String ID: BUTTON
            • API String ID: 1194449130-3405671355
            • Opcode ID: e6cc89d2dfeb978dc66436bf0db4c1faea4a8d72d418b5a89c2d8f268f84fe60
            • Instruction ID: ee7a4852d227f404a4de2712a71efa5a5b8006add1d3b59e5a38707d32e583e7
            • Opcode Fuzzy Hash: e6cc89d2dfeb978dc66436bf0db4c1faea4a8d72d418b5a89c2d8f268f84fe60
            • Instruction Fuzzy Hash: 0E217FB4204605AFF3265BA0EC88A2A3F69FB94648F004058F5C586295DF7FA804DB61
            APIs
              • Part of subcall function 00FC936C: __swprintf.LIBCMT ref: 00FC93AB
              • Part of subcall function 00FC936C: __itow.LIBCMT ref: 00FC93DF
            • CoInitialize.OLE32(00000000), ref: 0101034B
            • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 010103DE
            • SHGetDesktopFolder.SHELL32(?), ref: 010103F2
            • CoCreateInstance.OLE32(0104DA8C,00000000,00000001,01073CF8,?), ref: 0101043E
            • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 010104AD
            • CoTaskMemFree.OLE32(?,?), ref: 01010505
            • _memset.LIBCMT ref: 01010542
            • SHBrowseForFolderW.SHELL32(?), ref: 0101057E
            • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 010105A1
            • CoTaskMemFree.OLE32(00000000), ref: 010105A8
            • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 010105DF
            • CoUninitialize.OLE32(00000001,00000000), ref: 010105E1
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
            • String ID:
            • API String ID: 1246142700-0
            • Opcode ID: 06f126c20be7a13f4b6018c1e28dd6a22e9dacd2ab2411bbee11c501f4dcf63c
            • Instruction ID: fba5c6a2b761bd05e6fbad891363d564514ba4a4873ecfbf2457b288aba8c314
            • Opcode Fuzzy Hash: 06f126c20be7a13f4b6018c1e28dd6a22e9dacd2ab2411bbee11c501f4dcf63c
            • Instruction Fuzzy Hash: 3EB12C74A00109AFDB04DFA4C989EAEBBF9FF48304B048499F949EB255DB35ED41CB50
            APIs
            • GetKeyboardState.USER32(?), ref: 01002ED6
            • SetKeyboardState.USER32(?), ref: 01002F41
            • GetAsyncKeyState.USER32(000000A0), ref: 01002F61
            • GetKeyState.USER32(000000A0), ref: 01002F78
            • GetAsyncKeyState.USER32(000000A1), ref: 01002FA7
            • GetKeyState.USER32(000000A1), ref: 01002FB8
            • GetAsyncKeyState.USER32(00000011), ref: 01002FE4
            • GetKeyState.USER32(00000011), ref: 01002FF2
            • GetAsyncKeyState.USER32(00000012), ref: 0100301B
            • GetKeyState.USER32(00000012), ref: 01003029
            • GetAsyncKeyState.USER32(0000005B), ref: 01003052
            • GetKeyState.USER32(0000005B), ref: 01003060
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: State$Async$Keyboard
            • String ID:
            • API String ID: 541375521-0
            • Opcode ID: ad06202d43b3097e30d68cb261042b6332b392c06defd5cbeabc60d20ed61ab3
            • Instruction ID: 9e64c0206c045771db6d4fa005b1aab3c416398253a854ceb113489eccf6eda7
            • Opcode Fuzzy Hash: ad06202d43b3097e30d68cb261042b6332b392c06defd5cbeabc60d20ed61ab3
            • Instruction Fuzzy Hash: BF51B464A087C92DFB77DBA888547EABFF45F12380F0845DDC6C25A1C2DA54978CC7A2
            APIs
            • GetDlgItem.USER32(?,00000001), ref: 00FFED1E
            • GetWindowRect.USER32(00000000,?), ref: 00FFED30
            • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00FFED8E
            • GetDlgItem.USER32(?,00000002), ref: 00FFED99
            • GetWindowRect.USER32(00000000,?), ref: 00FFEDAB
            • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00FFEE01
            • GetDlgItem.USER32(?,000003E9), ref: 00FFEE0F
            • GetWindowRect.USER32(00000000,?), ref: 00FFEE20
            • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00FFEE63
            • GetDlgItem.USER32(?,000003EA), ref: 00FFEE71
            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00FFEE8E
            • InvalidateRect.USER32(?,00000000,00000001), ref: 00FFEE9B
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Window$ItemMoveRect$Invalidate
            • String ID:
            • API String ID: 3096461208-0
            • Opcode ID: 06bf61060a7ad19cd55518084e69f1ee58b87d8e32e48e9b9401e2e99897f8bb
            • Instruction ID: 321c135b6f64642a6d7d3fe213d7f26df10df0e1d23f33bc2ff6a25e86d0c480
            • Opcode Fuzzy Hash: 06bf61060a7ad19cd55518084e69f1ee58b87d8e32e48e9b9401e2e99897f8bb
            • Instruction Fuzzy Hash: F75143B5B00209AFDB18CFA8DD85AAEBBB6FF98310F148129F619D7294D7759D00CB10
            APIs
              • Part of subcall function 00FDB9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00FDB759,?,00000000,?,?,?,?,00FDB72B,00000000,?), ref: 00FDBA58
            • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00FDB72B), ref: 00FDB7F6
            • KillTimer.USER32(00000000,?,00000000,?,?,?,?,00FDB72B,00000000,?,?,00FDB2EF,?,?), ref: 00FDB88D
            • DestroyAcceleratorTable.USER32(00000000), ref: 0103D8A6
            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00FDB72B,00000000,?,?,00FDB2EF,?,?), ref: 0103D8D7
            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00FDB72B,00000000,?,?,00FDB2EF,?,?), ref: 0103D8EE
            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00FDB72B,00000000,?,?,00FDB2EF,?,?), ref: 0103D90A
            • DeleteObject.GDI32(00000000), ref: 0103D91C
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
            • String ID:
            • API String ID: 641708696-0
            • Opcode ID: cebb8d4d78b7b1d6e821dbd83a16c602a74243d5108f4fad96198c43a8267304
            • Instruction ID: e69287f290e77023c971564d71da07f10dc809a5cd5e991c9807bd0139dd36d9
            • Opcode Fuzzy Hash: cebb8d4d78b7b1d6e821dbd83a16c602a74243d5108f4fad96198c43a8267304
            • Instruction Fuzzy Hash: 3261B231904601DFDB369F58D988B29B7FAFF98326F19051EE0C647664C739A891EF40
            APIs
              • Part of subcall function 00FDB526: GetWindowLongW.USER32(?,000000EB), ref: 00FDB537
            • GetSysColor.USER32(0000000F), ref: 00FDB438
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ColorLongWindow
            • String ID:
            • API String ID: 259745315-0
            • Opcode ID: 888e9441a55c576e96494ef99e593db1afe1a9c01d13a9bea0c6509238d18236
            • Instruction ID: 68c8100d1ea5995b25426654352c486b8574eda9515edf91f551714bdc43739c
            • Opcode Fuzzy Hash: 888e9441a55c576e96494ef99e593db1afe1a9c01d13a9bea0c6509238d18236
            • Instruction Fuzzy Hash: BC41F775400100EFDF35EF68D889BB93B66AB46330F594252FDE58A2EAC7358C41E721
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
            • String ID:
            • API String ID: 136442275-0
            • Opcode ID: 6d91a5f21dc345ecc7e38fa396a17a255d2073424e43b9a6294d312e435c4493
            • Instruction ID: 127865b0d43210dd5f8a1c9fe744e59f6908d86f00aaa3e86e1a4c5bf7554c85
            • Opcode Fuzzy Hash: 6d91a5f21dc345ecc7e38fa396a17a255d2073424e43b9a6294d312e435c4493
            • Instruction Fuzzy Hash: 4E415D7688515CAEDF62EB95CC45DCF73BDEB84200F0041E6BA89A2041EE75A7E88F50
            APIs
            • CharLowerBuffW.USER32(0105DC00,0105DC00,0105DC00), ref: 0100D7CE
            • GetDriveTypeW.KERNEL32(?,01073A70,00000061), ref: 0100D898
            • _wcscpy.LIBCMT ref: 0100D8C2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: BuffCharDriveLowerType_wcscpy
            • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
            • API String ID: 2820617543-1000479233
            • Opcode ID: fb7f306c4a55dd41625a263289a6e7904139a99265bf7827a529c8c3a0ee9b6f
            • Instruction ID: c69a4a653ef96ead8a67d3ab18b5bd90e1792b552229199060cdf9e3013c02c0
            • Opcode Fuzzy Hash: fb7f306c4a55dd41625a263289a6e7904139a99265bf7827a529c8c3a0ee9b6f
            • Instruction Fuzzy Hash: 7951D330508201AFE301EF94DC82A6EB7A5FF94310F14885EF5D95B292EB31DA05DB52
            APIs
            • __swprintf.LIBCMT ref: 00FC93AB
            • __itow.LIBCMT ref: 00FC93DF
              • Part of subcall function 00FE1557: _xtow@16.LIBCMT ref: 00FE1578
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: __itow__swprintf_xtow@16
            • String ID: %.15g$0x%p$False$True
            • API String ID: 1502193981-2263619337
            • Opcode ID: d89b4a4589a0c885b7fded3787452e4c5ebe6ad1fb2a0b5ede576424a07ad270
            • Instruction ID: 73dd3d8f649be4231be646a1d5f2a68671500cdfac39156716b868131bf2a3a3
            • Opcode Fuzzy Hash: d89b4a4589a0c885b7fded3787452e4c5ebe6ad1fb2a0b5ede576424a07ad270
            • Instruction Fuzzy Hash: E44107725042099BEB64DF79DD46F6977ECFB84300F2444AEE18ACB181EB759941EB10
            APIs
            • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0102A259
            • CreateCompatibleDC.GDI32(00000000), ref: 0102A260
            • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 0102A273
            • SelectObject.GDI32(00000000,00000000), ref: 0102A27B
            • GetPixel.GDI32(00000000,00000000,00000000), ref: 0102A286
            • DeleteDC.GDI32(00000000), ref: 0102A28F
            • GetWindowLongW.USER32(?,000000EC), ref: 0102A299
            • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 0102A2AD
            • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 0102A2B9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
            • String ID: static
            • API String ID: 2559357485-2160076837
            • Opcode ID: 8abd0cfa06e2bb0d615d8fce3b1c73fd4efb25fc45f75fceccdd69f5c2c9e9ad
            • Instruction ID: 1acac4718c75c7f43b471e879352e43597fb1e3b15ed95f0c6c109bda5629ef4
            • Opcode Fuzzy Hash: 8abd0cfa06e2bb0d615d8fce3b1c73fd4efb25fc45f75fceccdd69f5c2c9e9ad
            • Instruction Fuzzy Hash: 2F31A071200125FBDF225FA8DD49FDA3BA9FF1E364F100215FA9996090CB36D811DB64
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: _wcscpy$CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
            • String ID: 0.0.0.0
            • API String ID: 2620052-3771769585
            • Opcode ID: b2609e074caf22226b9dcfb37f6cbecab65cb746282a2b4b580390ff13f67cf5
            • Instruction ID: 5c166d00229f9315fd8ee6510dc1e997070f925a79a4898a3449a44731b4b452
            • Opcode Fuzzy Hash: b2609e074caf22226b9dcfb37f6cbecab65cb746282a2b4b580390ff13f67cf5
            • Instruction Fuzzy Hash: C4113A71504209ABEB36ABB5DD49EEE77ADEF40710F0400ADF18596080FFBAEA948750
            APIs
            • _memset.LIBCMT ref: 00FE5047
              • Part of subcall function 00FE7C0E: __getptd_noexit.LIBCMT ref: 00FE7C0E
            • __gmtime64_s.LIBCMT ref: 00FE50E0
            • __gmtime64_s.LIBCMT ref: 00FE5116
            • __gmtime64_s.LIBCMT ref: 00FE5133
            • __allrem.LIBCMT ref: 00FE5189
            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FE51A5
            • __allrem.LIBCMT ref: 00FE51BC
            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FE51DA
            • __allrem.LIBCMT ref: 00FE51F1
            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FE520F
            • __invoke_watson.LIBCMT ref: 00FE5280
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
            • String ID:
            • API String ID: 384356119-0
            • Opcode ID: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
            • Instruction ID: a14e6d6d2ff18eaf02edecb5fa390a1df6af1f17c72cbc91d0272402b2518d37
            • Opcode Fuzzy Hash: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
            • Instruction Fuzzy Hash: 1071E872E01B57ABD714AE7ACC41B6AB3A8BF00B68F144229F614D7681E774DD40ABD0
            APIs
            • _memset.LIBCMT ref: 01004DF8
            • GetMenuItemInfoW.USER32(01081708,000000FF,00000000,00000030), ref: 01004E59
            • SetMenuItemInfoW.USER32(01081708,00000004,00000000,00000030), ref: 01004E8F
            • Sleep.KERNEL32(000001F4), ref: 01004EA1
            • GetMenuItemCount.USER32(?), ref: 01004EE5
            • GetMenuItemID.USER32(?,00000000), ref: 01004F01
            • GetMenuItemID.USER32(?,-00000001), ref: 01004F2B
            • GetMenuItemID.USER32(?,?), ref: 01004F70
            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 01004FB6
            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 01004FCA
            • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 01004FEB
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
            • String ID:
            • API String ID: 4176008265-0
            • Opcode ID: 1fe23f4bb31246b0cf4f10ee7889c680ad9112cf707ba28f56abc7f57ee63e95
            • Instruction ID: 569505ceddee482c43112ca5793588a1face4b8881764d7cf0381d10445f9e1c
            • Opcode Fuzzy Hash: 1fe23f4bb31246b0cf4f10ee7889c680ad9112cf707ba28f56abc7f57ee63e95
            • Instruction Fuzzy Hash: 886192B5A04249AFEB22CFA8D988ABE7BF8EB41304F14015DF6C1D3291D775AD05CB64
            APIs
            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 01029C98
            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 01029C9B
            • GetWindowLongW.USER32(?,000000F0), ref: 01029CBF
            • _memset.LIBCMT ref: 01029CD0
            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 01029CE2
            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 01029D5A
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageSend$LongWindow_memset
            • String ID:
            • API String ID: 830647256-0
            • Opcode ID: af2c7a35244fb5d6b7c818fcc42db20bd8bd90645ed0f172a183643232232d29
            • Instruction ID: a7fc7b87b24fe70029ee4717d2023da11243694d18aca660bdbbe555d8b58408
            • Opcode Fuzzy Hash: af2c7a35244fb5d6b7c818fcc42db20bd8bd90645ed0f172a183643232232d29
            • Instruction Fuzzy Hash: 8061B075900228AFDB20DFA8CC81EEE77F8EF09708F104199FA84E7291D774A942DB50
            APIs
            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,?), ref: 00FF94FE
            • SafeArrayAllocData.OLEAUT32(?), ref: 00FF9549
            • VariantInit.OLEAUT32(?), ref: 00FF955B
            • SafeArrayAccessData.OLEAUT32(?,?), ref: 00FF957B
            • VariantCopy.OLEAUT32(?,?), ref: 00FF95BE
            • SafeArrayUnaccessData.OLEAUT32(?), ref: 00FF95D2
            • VariantClear.OLEAUT32(?), ref: 00FF95E7
            • SafeArrayDestroyData.OLEAUT32(?), ref: 00FF95F4
            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00FF95FD
            • VariantClear.OLEAUT32(?), ref: 00FF960F
            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00FF961A
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
            • String ID:
            • API String ID: 2706829360-0
            • Opcode ID: c6caf8905db7d77a52e4bdb9075043d44e3a9d78dd16fd7571a6d9cbb1b7c2b6
            • Instruction ID: d7ea2fd6ba2752b380557ccaebffb73a84dcd8824b93018833da7d6ed499b071
            • Opcode Fuzzy Hash: c6caf8905db7d77a52e4bdb9075043d44e3a9d78dd16fd7571a6d9cbb1b7c2b6
            • Instruction Fuzzy Hash: F2419E75A0021DAFCB01DFE4C888AEEBBB9FF58350F048065E541E3250DB79EA45DBA0
            APIs
              • Part of subcall function 00FC936C: __swprintf.LIBCMT ref: 00FC93AB
              • Part of subcall function 00FC936C: __itow.LIBCMT ref: 00FC93DF
            • CoInitialize.OLE32 ref: 0101ADF6
            • CoUninitialize.OLE32 ref: 0101AE01
            • CoCreateInstance.OLE32(?,00000000,00000017,0104D8FC,?), ref: 0101AE61
            • IIDFromString.OLE32(?,?), ref: 0101AED4
            • VariantInit.OLEAUT32(?), ref: 0101AF6E
            • VariantClear.OLEAUT32(?), ref: 0101AFCF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
            • API String ID: 834269672-1287834457
            • Opcode ID: 91452f49564a8566c51003486156671392b2dca5dc0d5395613eb8da836a8f09
            • Instruction ID: 3f7ae9a0c0c917727b884c747a00b9355683df032641bd11d1d212703b27fce1
            • Opcode Fuzzy Hash: 91452f49564a8566c51003486156671392b2dca5dc0d5395613eb8da836a8f09
            • Instruction Fuzzy Hash: 4D6188B0309342DFD711DFA4C988B6ABBE8AF88714F00444DF9859B295C779ED44CB92
            APIs
            • WSAStartup.WSOCK32(00000101,?), ref: 01018168
            • inet_addr.WSOCK32(?,?,?), ref: 010181AD
            • gethostbyname.WSOCK32(?), ref: 010181B9
            • IcmpCreateFile.IPHLPAPI ref: 010181C7
            • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 01018237
            • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 0101824D
            • IcmpCloseHandle.IPHLPAPI(00000000), ref: 010182C2
            • WSACleanup.WSOCK32 ref: 010182C8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
            • String ID: Ping
            • API String ID: 1028309954-2246546115
            • Opcode ID: d763c2fe09f6b032166c573d4f67e930ddb8589d856a6eb477f251f5e9b914e6
            • Instruction ID: 36af5b00f788ff8d2124b90b326f558ccad59ba63bfc158335a0e27e80cfe743
            • Opcode Fuzzy Hash: d763c2fe09f6b032166c573d4f67e930ddb8589d856a6eb477f251f5e9b914e6
            • Instruction Fuzzy Hash: 4B51A135604601AFD761DF64CD85B6EBBE4BF48310F04896AFA95DB294DB38E900CB42
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0100E396
            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0100E40C
            • GetLastError.KERNEL32 ref: 0100E416
            • SetErrorMode.KERNEL32(00000000,READY), ref: 0100E483
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Error$Mode$DiskFreeLastSpace
            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
            • API String ID: 4194297153-14809454
            • Opcode ID: d6f70949e481d758686437cf41a085b9b2a75a31a08331784aabb2be51d65230
            • Instruction ID: ee8e4eb1899fab891e475ecd34b30e3b6d204555666e8cb6c4af3549956479ff
            • Opcode Fuzzy Hash: d6f70949e481d758686437cf41a085b9b2a75a31a08331784aabb2be51d65230
            • Instruction Fuzzy Hash: 03318375A0020A9FF712DFA8C985FADBBB4FF44300F058459E685EB2D1DB759901C791
            APIs
            • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00FFB98C
            • GetDlgCtrlID.USER32 ref: 00FFB997
            • GetParent.USER32 ref: 00FFB9B3
            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00FFB9B6
            • GetDlgCtrlID.USER32(?), ref: 00FFB9BF
            • GetParent.USER32(?), ref: 00FFB9DB
            • SendMessageW.USER32(00000000,?,?,00000111), ref: 00FFB9DE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageSend$CtrlParent
            • String ID: ComboBox$ListBox
            • API String ID: 1383977212-1403004172
            • Opcode ID: ab7b5d2d94bff43be23d577a533cd1babda66e20167ab4646272e2c0e14f67ec
            • Instruction ID: 453c4af223a1edab22e5dd1196e432cf7ade64e672a6dfe5321352128ec4931a
            • Opcode Fuzzy Hash: ab7b5d2d94bff43be23d577a533cd1babda66e20167ab4646272e2c0e14f67ec
            • Instruction Fuzzy Hash: B521F8B4A00108BFCB14ABE0CCC6EFEB775EF59310F140119F695972A1DBB95815EB60
            APIs
            • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00FFBA73
            • GetDlgCtrlID.USER32 ref: 00FFBA7E
            • GetParent.USER32 ref: 00FFBA9A
            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00FFBA9D
            • GetDlgCtrlID.USER32(?), ref: 00FFBAA6
            • GetParent.USER32(?), ref: 00FFBAC2
            • SendMessageW.USER32(00000000,?,?,00000111), ref: 00FFBAC5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageSend$CtrlParent
            • String ID: ComboBox$ListBox
            • API String ID: 1383977212-1403004172
            • Opcode ID: e5a186510f457a02a19b43a6e64130f92ef6e573bf2260125b73527570123a6d
            • Instruction ID: 71d070249a7a555d7893365ed0646da68a601e1bc476476af8581b58cf3b4604
            • Opcode Fuzzy Hash: e5a186510f457a02a19b43a6e64130f92ef6e573bf2260125b73527570123a6d
            • Instruction Fuzzy Hash: 4421F5B4A00108BFDB00ABA0CC86FFEB775EF49300F040019FA51A71A5DB7D8815AB60
            APIs
            • GetParent.USER32 ref: 00FFBAE3
            • GetClassNameW.USER32(00000000,?,00000100), ref: 00FFBAF8
            • _wcscmp.LIBCMT ref: 00FFBB0A
            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00FFBB85
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ClassMessageNameParentSend_wcscmp
            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
            • API String ID: 1704125052-3381328864
            • Opcode ID: c30739a6a4d3d9491ea738c01d0476e4ff394a1f92f5a07cfca1b098cebb9689
            • Instruction ID: b39153f5dd03cbd1d5761e1e36169a1b440285b5d169eb9e43468ff4cd68b8b0
            • Opcode Fuzzy Hash: c30739a6a4d3d9491ea738c01d0476e4ff394a1f92f5a07cfca1b098cebb9689
            • Instruction Fuzzy Hash: 05110A76E0834BFAFA207A22DC06DB6379CDF65334B200025FB44E40A9FFA5A8516618
            APIs
            • VariantInit.OLEAUT32(?), ref: 0101B2D5
            • CoInitialize.OLE32(00000000), ref: 0101B302
            • CoUninitialize.OLE32 ref: 0101B30C
            • GetRunningObjectTable.OLE32(00000000,?), ref: 0101B40C
            • SetErrorMode.KERNEL32(00000001,00000029), ref: 0101B539
            • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002), ref: 0101B56D
            • CoGetObject.OLE32(?,00000000,0104D91C,?), ref: 0101B590
            • SetErrorMode.KERNEL32(00000000), ref: 0101B5A3
            • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0101B623
            • VariantClear.OLEAUT32(0104D91C), ref: 0101B633
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
            • String ID:
            • API String ID: 2395222682-0
            • Opcode ID: fa575bf53d881a6753d834b93f228ee1fde7a05f131176fed6fe6bc5045a6358
            • Instruction ID: 53e61c9a4731802c7d10aadbd1391e3e2a70ec831768aa4da6632b82864964d1
            • Opcode Fuzzy Hash: fa575bf53d881a6753d834b93f228ee1fde7a05f131176fed6fe6bc5045a6358
            • Instruction Fuzzy Hash: 18C112B1608305AFD700DF68C884A6BBBF9BF89304F00495DF98A9B255DB75ED05CB52
            APIs
            • __lock.LIBCMT ref: 00FEACC1
              • Part of subcall function 00FE7CF4: __mtinitlocknum.LIBCMT ref: 00FE7D06
              • Part of subcall function 00FE7CF4: EnterCriticalSection.KERNEL32(00000000,?,00FE7ADD,0000000D), ref: 00FE7D1F
            • __calloc_crt.LIBCMT ref: 00FEACD2
              • Part of subcall function 00FE6986: __calloc_impl.LIBCMT ref: 00FE6995
              • Part of subcall function 00FE6986: Sleep.KERNEL32(00000000,000003BC,00FDF507,?,0000000E), ref: 00FE69AC
            • @_EH4_CallFilterFunc@8.LIBCMT ref: 00FEACED
            • GetStartupInfoW.KERNEL32(?,01076E28,00000064,00FE5E91,01076C70,00000014), ref: 00FEAD46
            • __calloc_crt.LIBCMT ref: 00FEAD91
            • GetFileType.KERNEL32(00000001), ref: 00FEADD8
            • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000D,00000FA0), ref: 00FEAE11
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CriticalSection__calloc_crt$CallCountEnterFileFilterFunc@8InfoInitializeSleepSpinStartupType__calloc_impl__lock__mtinitlocknum
            • String ID:
            • API String ID: 1426640281-0
            • Opcode ID: b3352870a9eeb23fc99526ac99789149525eab98e0a10e415920bd86e00b52ce
            • Instruction ID: 679c3a68393837ca8d589411b936cb73d93fd0dd13c56fd725c8e0a27dd18660
            • Opcode Fuzzy Hash: b3352870a9eeb23fc99526ac99789149525eab98e0a10e415920bd86e00b52ce
            • Instruction Fuzzy Hash: DA81B1B1D056858FDB24CF6AC8805ADBBF0AF15330B24426DE4E6AB3D1C739A803DB55
            APIs
            • __swprintf.LIBCMT ref: 010067FD
            • __swprintf.LIBCMT ref: 0100680A
              • Part of subcall function 00FE172B: __woutput_l.LIBCMT ref: 00FE1784
            • FindResourceW.KERNEL32(?,?,0000000E), ref: 01006834
            • LoadResource.KERNEL32(?,00000000), ref: 01006840
            • LockResource.KERNEL32(00000000), ref: 0100684D
            • FindResourceW.KERNEL32(?,?,00000003), ref: 0100686D
            • LoadResource.KERNEL32(?,00000000), ref: 0100687F
            • SizeofResource.KERNEL32(?,00000000), ref: 0100688E
            • LockResource.KERNEL32(?), ref: 0100689A
            • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 010068F9
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
            • String ID:
            • API String ID: 1433390588-0
            • Opcode ID: 54f32de605bc1412a7971516cdc8159db3e350df4053f30b8bd6a89e2fac4083
            • Instruction ID: 47273665d08e9c2a987158769ba58981cadc9dd2646692cff4691efa2aa3f6e3
            • Opcode Fuzzy Hash: 54f32de605bc1412a7971516cdc8159db3e350df4053f30b8bd6a89e2fac4083
            • Instruction Fuzzy Hash: 6831A6B590021AAFEB119FA1DD549BE7BA9FF08350F004515F981D2180D73ADA21DB70
            APIs
            • GetCurrentThreadId.KERNEL32 ref: 01004047
            • GetForegroundWindow.USER32(00000000,?,?,?,?,?,010030A5,?,00000001), ref: 0100405B
            • GetWindowThreadProcessId.USER32(00000000), ref: 01004062
            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,010030A5,?,00000001), ref: 01004071
            • GetWindowThreadProcessId.USER32(?,00000000), ref: 01004083
            • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,010030A5,?,00000001), ref: 0100409C
            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,010030A5,?,00000001), ref: 010040AE
            • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,010030A5,?,00000001), ref: 010040F3
            • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,010030A5,?,00000001), ref: 01004108
            • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,010030A5,?,00000001), ref: 01004113
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
            • String ID:
            • API String ID: 2156557900-0
            • Opcode ID: a517e59a2e1b7afa3fee3218a22230a750dac4bfdcd54eff9860ecfc9e658920
            • Instruction ID: 931b175c7529e877140ffbe66baec8d0358b64e1b167cc4f9ac2b1fc15c4f248
            • Opcode Fuzzy Hash: a517e59a2e1b7afa3fee3218a22230a750dac4bfdcd54eff9860ecfc9e658920
            • Instruction Fuzzy Hash: DE31B4B5600204BBFB32DF59D885BAD77AABB94711F108145FBC4DA284CBBAD8408B58
            APIs
            • GetSysColor.USER32(00000008), ref: 00FDB496
            • SetTextColor.GDI32(?,000000FF), ref: 00FDB4A0
            • SetBkMode.GDI32(?,00000001), ref: 00FDB4B5
            • GetStockObject.GDI32(00000005), ref: 00FDB4BD
            • GetClientRect.USER32(?), ref: 0103DD63
            • SendMessageW.USER32(?,00001328,00000000,?), ref: 0103DD7A
            • GetWindowDC.USER32(?), ref: 0103DD86
            • GetPixel.GDI32(00000000,?,?), ref: 0103DD95
            • ReleaseDC.USER32(?,00000000), ref: 0103DDA7
            • GetSysColor.USER32(00000005), ref: 0103DDC5
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Color$ClientMessageModeObjectPixelRectReleaseSendStockTextWindow
            • String ID:
            • API String ID: 3430376129-0
            • Opcode ID: 330c30301f71bd3c3fbfcf26634854db56ee545fe349b3e0b65a8179846fa2c1
            • Instruction ID: 5329b1c38e9cf7ddcb6e99d307efbb2fe386fe3d7ac8d825e42b0f4c8a3dc247
            • Opcode Fuzzy Hash: 330c30301f71bd3c3fbfcf26634854db56ee545fe349b3e0b65a8179846fa2c1
            • Instruction Fuzzy Hash: 1811B175500200FFDB21AFE4ED48BAD3F65EB19321F108261FAA6950E6CB360941EF20
            APIs
            • EnumChildWindows.USER32(?,00FFCF50), ref: 00FFCE90
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ChildEnumWindows
            • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
            • API String ID: 3555792229-1603158881
            • Opcode ID: 4956d11035da06fa4bc9398dc9465602eb4e42b20f7ecdfe4cdb288702780dbe
            • Instruction ID: b12e52b0a2ccf25c2698d8a57d72780f9f2274de5b0ec9d5b974cd21dca38976
            • Opcode Fuzzy Hash: 4956d11035da06fa4bc9398dc9465602eb4e42b20f7ecdfe4cdb288702780dbe
            • Instruction Fuzzy Hash: A791C331A0011EAACB18EF60C982BFEFB75BF04310F54851AE659A7261DF346959EBD0
            APIs
            • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00FC30DC
            • CoUninitialize.OLE32(?,00000000), ref: 00FC3181
            • UnregisterHotKey.USER32(?), ref: 00FC32A9
            • DestroyWindow.USER32(?), ref: 01035079
            • FreeLibrary.KERNEL32(?), ref: 010350F8
            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 01035125
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
            • String ID: close all
            • API String ID: 469580280-3243417748
            • Opcode ID: 2468573843645b33d0f4f8ac1d382f1cda14efb81dde785f49de0f2fa320ef4e
            • Instruction ID: 3b12320bef7b63e52a1383876a3d6c5f149a6f69e99db8a4a809a79f6a49e1be
            • Opcode Fuzzy Hash: 2468573843645b33d0f4f8ac1d382f1cda14efb81dde785f49de0f2fa320ef4e
            • Instruction Fuzzy Hash: C99159746002038FC719EF14CA96FA8F3A8BF54344F5482ADE54AA7262DF35AE16DF40
            APIs
            • SetWindowLongW.USER32(?,000000EB), ref: 00FDCC15
              • Part of subcall function 00FDCCCD: GetClientRect.USER32(?,?), ref: 00FDCCF6
              • Part of subcall function 00FDCCCD: GetWindowRect.USER32(?,?), ref: 00FDCD37
              • Part of subcall function 00FDCCCD: ScreenToClient.USER32(?,?), ref: 00FDCD5F
            • GetDC.USER32 ref: 0103D137
            • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0103D14A
            • SelectObject.GDI32(00000000,00000000), ref: 0103D158
            • SelectObject.GDI32(00000000,00000000), ref: 0103D16D
            • ReleaseDC.USER32(?,00000000), ref: 0103D175
            • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0103D200
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
            • String ID: U
            • API String ID: 4009187628-3372436214
            • Opcode ID: 10d12bc656cd5ab0b7cfe770eff1f81e1cbaf304b2b4d6671a5e5594674e7369
            • Instruction ID: 15d616ef0e404d926b410ea57f250efa66c645fc8e2418676425f632fc45b8b6
            • Opcode Fuzzy Hash: 10d12bc656cd5ab0b7cfe770eff1f81e1cbaf304b2b4d6671a5e5594674e7369
            • Instruction Fuzzy Hash: 2571D735500205EFDF21DFA8C880AE97BBAFF98364F1842AAFED55A256C7358841DF50
            APIs
              • Part of subcall function 00FDB34E: GetWindowLongW.USER32(?,000000EB), ref: 00FDB35F
              • Part of subcall function 00FDB63C: GetCursorPos.USER32(000000FF), ref: 00FDB64F
              • Part of subcall function 00FDB63C: ScreenToClient.USER32(00000000,000000FF), ref: 00FDB66C
              • Part of subcall function 00FDB63C: GetAsyncKeyState.USER32(00000001), ref: 00FDB691
              • Part of subcall function 00FDB63C: GetAsyncKeyState.USER32(00000002), ref: 00FDB69F
            • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?), ref: 0102ED3C
            • ImageList_EndDrag.COMCTL32 ref: 0102ED42
            • ReleaseCapture.USER32 ref: 0102ED48
            • SetWindowTextW.USER32(?,00000000), ref: 0102EDF0
            • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 0102EE03
            • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?), ref: 0102EEDC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
            • String ID: @GUI_DRAGFILE$@GUI_DROPID
            • API String ID: 1924731296-2107944366
            • Opcode ID: d729320b076a1c2951ac404cd715d9f065cfa40e3da35cac7c7102348c2fb134
            • Instruction ID: 6815fee130f40a183e9e4bc7d78b225d8fc464dc77b36e6e67cd3a6b4fb7d582
            • Opcode Fuzzy Hash: d729320b076a1c2951ac404cd715d9f065cfa40e3da35cac7c7102348c2fb134
            • Instruction Fuzzy Hash: 3F51A974204300AFD710EF24DC96FAA77E5BF88314F04491EF5D5972A2DB799914CB52
            APIs
            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 010145FF
            • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0101462B
            • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 0101466D
            • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 01014682
            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0101468F
            • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 010146BF
            • InternetCloseHandle.WININET(00000000), ref: 01014706
              • Part of subcall function 01015052: GetLastError.KERNEL32(?,?,010143CC,00000000,00000000,00000001), ref: 01015067
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorHandleInfoLastOpenSend
            • String ID:
            • API String ID: 1241431887-3916222277
            • Opcode ID: 12babf8f0baf22c93222c523bfc61141df143d383a64ec7baba4f69a62e96139
            • Instruction ID: 62ff413f54b1831694801f1ec72d2df60acc7470b2e98af22f9dc841553c819d
            • Opcode Fuzzy Hash: 12babf8f0baf22c93222c523bfc61141df143d383a64ec7baba4f69a62e96139
            • Instruction Fuzzy Hash: B6418CB5500205BFEB129F94CC89FFE7BACFF08318F004056FA81DA159E7B899448BA5
            APIs
            • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0105DC00), ref: 0101B715
            • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0105DC00), ref: 0101B749
            • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 0101B8C1
            • SysFreeString.OLEAUT32(?), ref: 0101B8EB
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Free$FileLibraryModuleNamePathQueryStringType
            • String ID:
            • API String ID: 560350794-0
            • Opcode ID: a4a0dd97bbb8fcb2badf225d927bf7808826018ab73e8341f8d494b79c4323ea
            • Instruction ID: 34f91e0e67de5333e2a8195dfd754309a416d18a23b43670f3f661914627c649
            • Opcode Fuzzy Hash: a4a0dd97bbb8fcb2badf225d927bf7808826018ab73e8341f8d494b79c4323ea
            • Instruction Fuzzy Hash: 34F16E75A00209EFDF04DF94C984EAEBBB9FF48715F108498F945AB254DB35AE42CB90
            APIs
            • _memset.LIBCMT ref: 010224F5
            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 01022688
            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 010226AC
            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 010226EC
            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0102270E
            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0102286F
            • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 010228A1
            • CloseHandle.KERNEL32(?), ref: 010228D0
            • CloseHandle.KERNEL32(?), ref: 01022947
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
            • String ID:
            • API String ID: 4090791747-0
            • Opcode ID: 58c42660b2f424121ad3084f57a9aec8f31abbeb11080dca63d98bfa715a182e
            • Instruction ID: 53818dce68f7d0b3359a8c4bd84277be61ab148f5a15acdd03a04bc82b07a430
            • Opcode Fuzzy Hash: 58c42660b2f424121ad3084f57a9aec8f31abbeb11080dca63d98bfa715a182e
            • Instruction Fuzzy Hash: FED1CB31204211DFDB15EF68C891B6EBBE1BF84310F18856DF98A9B2A2DB35DC44CB52
            APIs
            • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0102B3F4
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: InvalidateRect
            • String ID:
            • API String ID: 634782764-0
            • Opcode ID: ff8f86add5adb83e9f2f944ef3b2039ce8eaf4ebd8054c2453150581679d477a
            • Instruction ID: ace3ca723595336c903a64b71d188ff0926f8fed7be3782f341c1623ae0157a8
            • Opcode Fuzzy Hash: ff8f86add5adb83e9f2f944ef3b2039ce8eaf4ebd8054c2453150581679d477a
            • Instruction Fuzzy Hash: 7B51C130600224BFEF319E68CCC9BAD3FA5AB08318F548056FAD4DA2D1CB75E9408B50
            APIs
            • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0103DB1B
            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0103DB3C
            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0103DB51
            • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0103DB6E
            • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0103DB95
            • DestroyIcon.USER32(00000000,?,?,?,?,?,?,00FDA67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 0103DBA0
            • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0103DBBD
            • DestroyIcon.USER32(00000000,?,?,?,?,?,?,00FDA67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 0103DBC8
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Icon$DestroyExtractImageLoadMessageSend
            • String ID:
            • API String ID: 1268354404-0
            • Opcode ID: eaed7fd5830266b2f5f12f97fd4173a4257a41171b57e993820b399bc38aa761
            • Instruction ID: e6ade8a7213fcc7d90cc124226a5b7a6fd4d3fc0ffdcc5f2ea8314a205a7747a
            • Opcode Fuzzy Hash: eaed7fd5830266b2f5f12f97fd4173a4257a41171b57e993820b399bc38aa761
            • Instruction Fuzzy Hash: 45518871600209EFDB24DFA8CC81FAA3BFAAF48354F140519F986972C0D7B5E990EB54
            APIs
              • Part of subcall function 01006EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,01005FA6,?), ref: 01006ED8
              • Part of subcall function 01006EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,01005FA6,?), ref: 01006EF1
              • Part of subcall function 010072CB: GetFileAttributesW.KERNEL32(?,01006019), ref: 010072CC
            • lstrcmpiW.KERNEL32(?,?), ref: 010075CA
            • _wcscmp.LIBCMT ref: 010075E2
            • MoveFileW.KERNEL32(?,?), ref: 010075FB
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
            • String ID:
            • API String ID: 793581249-0
            • Opcode ID: 2a5b1d55738ca01befb299fcce6a57a56677849ab4093c914664b7b7e45df6ef
            • Instruction ID: 96607541f464a49bb064503f3de8b71c70339eff9cbc842c13c4e29ce4d44d01
            • Opcode Fuzzy Hash: 2a5b1d55738ca01befb299fcce6a57a56677849ab4093c914664b7b7e45df6ef
            • Instruction Fuzzy Hash: 2C5133B2A052199BEF61EB94DC419DE73BCAF0C210F0040EAF685E3181DB79A3C5CB60
            APIs
            • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,0103DAD1,00000004,00000000,00000000), ref: 00FDEAEB
            • ShowWindow.USER32(00000000,00000000,00000000,00000000,00000000,?,0103DAD1,00000004,00000000,00000000), ref: 00FDEB32
            • ShowWindow.USER32(00000000,00000006,00000000,00000000,00000000,?,0103DAD1,00000004,00000000,00000000), ref: 0103DC86
            • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,0103DAD1,00000004,00000000,00000000), ref: 0103DCF2
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ShowWindow
            • String ID:
            • API String ID: 1268545403-0
            • Opcode ID: ae0adf4a2d6bdd34b9a5d20a1c9afa390e1bd7bf0ba9bf52de178f14cb568cfc
            • Instruction ID: f4faf8e21dc884beee1aa0ed9245fc644a34550eff1d6b4d5dee34a654b58e54
            • Opcode Fuzzy Hash: ae0adf4a2d6bdd34b9a5d20a1c9afa390e1bd7bf0ba9bf52de178f14cb568cfc
            • Instruction Fuzzy Hash: 984128716282819BD7357B6889CCB2A7A9BBFD6314F5D080FE0C78A751C675B840F310
            APIs
            • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00FFAEF1,00000B00,?,?), ref: 00FFB26C
            • HeapAlloc.KERNEL32(00000000,?,00FFAEF1,00000B00,?,?), ref: 00FFB273
            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00FFAEF1,00000B00,?,?), ref: 00FFB288
            • GetCurrentProcess.KERNEL32(?,00000000,?,00FFAEF1,00000B00,?,?), ref: 00FFB290
            • DuplicateHandle.KERNEL32(00000000,?,00FFAEF1,00000B00,?,?), ref: 00FFB293
            • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00FFAEF1,00000B00,?,?), ref: 00FFB2A3
            • GetCurrentProcess.KERNEL32(00FFAEF1,00000000,?,00FFAEF1,00000B00,?,?), ref: 00FFB2AB
            • DuplicateHandle.KERNEL32(00000000,?,00FFAEF1,00000B00,?,?), ref: 00FFB2AE
            • CreateThread.KERNEL32(00000000,00000000,00FFB2D4,00000000,00000000,00000000), ref: 00FFB2C8
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
            • String ID:
            • API String ID: 1957940570-0
            • Opcode ID: 18178dcdb22ec87676220e2a9358b1f1354e7eaca20a4e45d002f4375f0f8b7b
            • Instruction ID: 7a2b329ea6395f4ae5343114906950cb6313b667684b6121c1b4ecbf18cf081c
            • Opcode Fuzzy Hash: 18178dcdb22ec87676220e2a9358b1f1354e7eaca20a4e45d002f4375f0f8b7b
            • Instruction Fuzzy Hash: 4C01BBB5240308BFE720ABA5DD89F6B7BACEB98B11F018411FA45DB195CA75D810CB60
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID:
            • String ID: NULL Pointer assignment$Not an Object type
            • API String ID: 0-572801152
            • Opcode ID: f8a3c3b65700c6ab24c2c2b4141cfba9a53a25f8f0ade63309237eb425b3ba37
            • Instruction ID: ca76424eaa77322069972c2876555f9f63b577dc8f8f29030ac5f650d303223a
            • Opcode Fuzzy Hash: f8a3c3b65700c6ab24c2c2b4141cfba9a53a25f8f0ade63309237eb425b3ba37
            • Instruction Fuzzy Hash: DCE1D571A4021A9BEF14DFA8CA80BEE77F5FF48314F144069E985AB285D778ED41CB90
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Variant$ClearInit$_memset
            • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
            • API String ID: 2862541840-625585964
            • Opcode ID: 926c175c2f832853ec58392947528c49da378985d755b95a3c8fe778029e821b
            • Instruction ID: cca324d461dcaa7a5b11997984fbc13ddcf2ba89b054907b0ef06373d58b5284
            • Opcode Fuzzy Hash: 926c175c2f832853ec58392947528c49da378985d755b95a3c8fe778029e821b
            • Instruction Fuzzy Hash: DD919371A00209ABDF25DFA9C884FAEBBB8EF45710F008159F595AB285DB789940CF91
            APIs
            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 01029B19
            • SendMessageW.USER32(?,00001036,00000000,?), ref: 01029B2D
            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 01029B47
            • _wcscat.LIBCMT ref: 01029BA2
            • SendMessageW.USER32(?,00001057,00000000,?), ref: 01029BB9
            • SendMessageW.USER32(?,00001061,?,0000000F), ref: 01029BE7
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageSend$Window_wcscat
            • String ID: SysListView32
            • API String ID: 307300125-78025650
            • Opcode ID: f3f2d7453a4c667313ca4cf05df874d3f1ae4c10ee803c0c277aff5933e57736
            • Instruction ID: 857e8f63424ed61cea0b86ee1f553b5e762c72a3fe398f5c359ec22e2c2e3716
            • Opcode Fuzzy Hash: f3f2d7453a4c667313ca4cf05df874d3f1ae4c10ee803c0c277aff5933e57736
            • Instruction Fuzzy Hash: 12419671940328AFDF229FA8CC85BEE77E8EF08354F10446AF5C5A7281D6759984CB50
            APIs
              • Part of subcall function 01006532: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 01006554
              • Part of subcall function 01006532: Process32FirstW.KERNEL32(00000000,0000022C), ref: 01006564
              • Part of subcall function 01006532: CloseHandle.KERNEL32(00000000,?,00000000), ref: 010065F9
            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0102179A
            • GetLastError.KERNEL32 ref: 010217AD
            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 010217D9
            • TerminateProcess.KERNEL32(00000000,00000000), ref: 01021855
            • GetLastError.KERNEL32(00000000), ref: 01021860
            • CloseHandle.KERNEL32(00000000), ref: 01021895
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
            • String ID: SeDebugPrivilege
            • API String ID: 2533919879-2896544425
            • Opcode ID: 042497311f1e838449ed94a908fa1727d209a9f52650d49d07af577ca3e988dd
            • Instruction ID: cd5c52f56fce7777bb4f332b247ae6c9392a017fcb6a0c40c5f8c84f9ff95932
            • Opcode Fuzzy Hash: 042497311f1e838449ed94a908fa1727d209a9f52650d49d07af577ca3e988dd
            • Instruction Fuzzy Hash: AC419171600211AFEB15EF54CDD5FBE77A5AF54310F088099F9469F3C2DBB9A9008B91
            APIs
            • LoadIconW.USER32(00000000,00007F03), ref: 010058B8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: IconLoad
            • String ID: blank$info$question$stop$warning
            • API String ID: 2457776203-404129466
            • Opcode ID: feb065c8d7589c4c94e10337c2f03ec8caf66f98bde06c2c9aa8c672f51b97fa
            • Instruction ID: 33e6fd68be4045ecd952b2c196913489b0181da843a0920d4c066c8ca30ad3d2
            • Opcode Fuzzy Hash: feb065c8d7589c4c94e10337c2f03ec8caf66f98bde06c2c9aa8c672f51b97fa
            • Instruction Fuzzy Hash: 3611EE35609386BAF7135A559C82D6E37ECEF15210F10007AF9C0B92C2FBA496504B69
            APIs
            • SafeArrayGetVartype.OLEAUT32(?,00000000), ref: 0100A806
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ArraySafeVartype
            • String ID:
            • API String ID: 1725837607-0
            • Opcode ID: 2f7f1ed6b0d91ff10066e8103d392d5c8980cde32929b31bcfebbdda376f0586
            • Instruction ID: 2e189151011e902e8c64f24e73e64321579f881fb9bfec1ef486144270cb02b1
            • Opcode Fuzzy Hash: 2f7f1ed6b0d91ff10066e8103d392d5c8980cde32929b31bcfebbdda376f0586
            • Instruction Fuzzy Hash: 96C17175A04306DFEB11DF98C584BAEBBF4FF09315F14406AE686E7281D735AA81CB90
            APIs
            • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 01006B63
            • LoadStringW.USER32(00000000), ref: 01006B6A
            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 01006B80
            • LoadStringW.USER32(00000000), ref: 01006B87
            • _wprintf.LIBCMT ref: 01006BAD
            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 01006BCB
            Strings
            • %s (%d) : ==> %s: %s %s, xrefs: 01006BA8
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: HandleLoadModuleString$Message_wprintf
            • String ID: %s (%d) : ==> %s: %s %s
            • API String ID: 3648134473-3128320259
            • Opcode ID: 1d065c094423ed70d3a8adcfb67e8355e46acecbc67a7592a3734fd5bfc8dbba
            • Instruction ID: b2da235e1da9d9df33c6b5dd4f21bdeeef74d79da977f879c78aad1373cb194c
            • Opcode Fuzzy Hash: 1d065c094423ed70d3a8adcfb67e8355e46acecbc67a7592a3734fd5bfc8dbba
            • Instruction Fuzzy Hash: BE0162F6900208BFE721A7D49DC9EEB376CE708304F004491BB85D6145EA799E844B70
            APIs
              • Part of subcall function 01023C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,01022BB5,?,?), ref: 01023C1D
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 01022BF6
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: BuffCharConnectRegistryUpper
            • String ID:
            • API String ID: 2595220575-0
            • Opcode ID: 216d26bb7455f78833923dff1b7f179f6554ddd6415c295b6e11b14cdf54050d
            • Instruction ID: a3693f5933e3114766df7f90347d0e001920a7beefdeccd15ac8855e928efc70
            • Opcode Fuzzy Hash: 216d26bb7455f78833923dff1b7f179f6554ddd6415c295b6e11b14cdf54050d
            • Instruction Fuzzy Hash: 3591BD712042019FDB11EF98C981F6EB7E5FF98310F04885DF9969B291DB39E905DB82
            APIs
            • select.WSOCK32 ref: 01019691
            • WSAGetLastError.WSOCK32(00000000), ref: 0101969E
            • __WSAFDIsSet.WSOCK32(00000000,?,00000000), ref: 010196C8
            • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 010196E9
            • WSAGetLastError.WSOCK32(00000000), ref: 010196F8
            • htons.WSOCK32(?,?,?,00000000,?), ref: 010197AA
            • inet_ntoa.WSOCK32(?,?,?,?,?,?,?,?,?,?,?,?,0105DC00), ref: 01019765
              • Part of subcall function 00FFD2FF: _strlen.LIBCMT ref: 00FFD309
            • _strlen.LIBCMT ref: 01019800
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ErrorLast_strlen$htonsinet_ntoaselect
            • String ID:
            • API String ID: 3480843537-0
            • Opcode ID: d6a6adc2502b32b3c9e3ba26e4c67e18e9ea1b7602f123e7c83c013a38508080
            • Instruction ID: 3867b493b3ad287b44ca1dc90611490058abe7a1b7d5925cf0a1511f20807c42
            • Opcode Fuzzy Hash: d6a6adc2502b32b3c9e3ba26e4c67e18e9ea1b7602f123e7c83c013a38508080
            • Instruction Fuzzy Hash: 4A81ED71504201ABD310EFA4CD96F6FBBE8AF88714F044A1DF5959B291EB38D904CB92
            APIs
            • __mtinitlocknum.LIBCMT ref: 00FEA991
              • Part of subcall function 00FE7D7C: __FF_MSGBANNER.LIBCMT ref: 00FE7D91
              • Part of subcall function 00FE7D7C: __NMSG_WRITE.LIBCMT ref: 00FE7D98
              • Part of subcall function 00FE7D7C: __malloc_crt.LIBCMT ref: 00FE7DB8
            • __lock.LIBCMT ref: 00FEA9A4
            • __lock.LIBCMT ref: 00FEA9F0
            • InitializeCriticalSectionAndSpinCount.KERNEL32(8000000C,00000FA0,01076DE0,00000018,00FF5E7B,?,00000000,00000109), ref: 00FEAA0C
            • EnterCriticalSection.KERNEL32(8000000C,01076DE0,00000018,00FF5E7B,?,00000000,00000109), ref: 00FEAA29
            • LeaveCriticalSection.KERNEL32(8000000C), ref: 00FEAA39
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CriticalSection$__lock$CountEnterInitializeLeaveSpin__malloc_crt__mtinitlocknum
            • String ID:
            • API String ID: 1422805418-0
            • Opcode ID: 4e5c63d573c5dbc56768dc77be35e9d41b5fb55503e4b648b069ff916bc7671c
            • Instruction ID: ee8cca4af64c326d0c8d8927f34961fe5abdd76192f163e4c80e591354d865bf
            • Opcode Fuzzy Hash: 4e5c63d573c5dbc56768dc77be35e9d41b5fb55503e4b648b069ff916bc7671c
            • Instruction Fuzzy Hash: 79417A71D00785DBEB209F6ACA4475CB7B0AF00734F208238E4A5AB2C1D77DA801DB86
            APIs
            • DeleteObject.GDI32(00000000), ref: 01028EE4
            • GetDC.USER32(00000000), ref: 01028EEC
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 01028EF7
            • ReleaseDC.USER32(00000000,00000000), ref: 01028F03
            • CreateFontW.GDI32(?,00000000,00000000,00000000,00000000,?,?,?,00000001,00000004,00000000,?,00000000,?), ref: 01028F3F
            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 01028F50
            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0102BD19,?,?,000000FF,00000000,?,000000FF,?), ref: 01028F8A
            • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 01028FAA
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
            • String ID:
            • API String ID: 3864802216-0
            • Opcode ID: 032285dccff68b106e7ecb80da8b50228aa2a640e3fc77a9062e5e1685613325
            • Instruction ID: da6c98b7f730ed615bb4e16eaee7178e4f057e6525dc051c83ac089f33c2f018
            • Opcode Fuzzy Hash: 032285dccff68b106e7ecb80da8b50228aa2a640e3fc77a9062e5e1685613325
            • Instruction Fuzzy Hash: AD3191B6200214BFEB218F94CD89FEA3FADEF59755F044055FF489A185C67A9841CB70
            APIs
              • Part of subcall function 00FC936C: __swprintf.LIBCMT ref: 00FC93AB
              • Part of subcall function 00FC936C: __itow.LIBCMT ref: 00FC93DF
              • Part of subcall function 00FDC6F4: _wcscpy.LIBCMT ref: 00FDC717
            • _wcstok.LIBCMT ref: 0101184E
            • _wcscpy.LIBCMT ref: 010118DD
            • _memset.LIBCMT ref: 01011910
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: _wcscpy$__itow__swprintf_memset_wcstok
            • String ID: X
            • API String ID: 774024439-3081909835
            • Opcode ID: 9189ca6ed8eb95e0173256a7027826faf9987c4fd9c06d10e19a0a01879fdf65
            • Instruction ID: 88ded7c7cb01a9a14c36f1249185d41abb206fded02148b4815c3a3b55ebcbc8
            • Opcode Fuzzy Hash: 9189ca6ed8eb95e0173256a7027826faf9987c4fd9c06d10e19a0a01879fdf65
            • Instruction Fuzzy Hash: 9DC18E315043419FD768EF64CD82E9EBBE4BF85350F04496DF999972A1DB38E844CB82
            APIs
              • Part of subcall function 00FDB34E: GetWindowLongW.USER32(?,000000EB), ref: 00FDB35F
            • GetSystemMetrics.USER32(0000000F), ref: 0103016D
            • MoveWindow.USER32(00000003,?,00000000,00000001,00000000,00000000,?,?,?), ref: 0103038D
            • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 010303AB
            • InvalidateRect.USER32(?,00000000,00000001,?), ref: 010303D6
            • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 010303FF
            • ShowWindow.USER32(00000003,00000000), ref: 01030421
            • DefDlgProcW.USER32(?,00000005,?,?), ref: 01030440
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Window$MessageSend$InvalidateLongMetricsMoveProcRectShowSystem
            • String ID:
            • API String ID: 3356174886-0
            • Opcode ID: c0137b8ff16760424a3a08fac53e31a4c0040ed734bcb937aa5f05a36f04dcc6
            • Instruction ID: 473be42ad13ab488516a0029b2d1444884fd67b09f9072580ed6d35cfb4eb66e
            • Opcode Fuzzy Hash: c0137b8ff16760424a3a08fac53e31a4c0040ed734bcb937aa5f05a36f04dcc6
            • Instruction Fuzzy Hash: C7A1BE75601616EFDB18CF6CC5857BEBBB9BF88700F048155FD94AB288D734A960CB90
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 519728c3e13e0f4c89779d81aee66e9573ba5024459f0d138851aba66cfd92f0
            • Instruction ID: 579a16035b31a8c4feea59be3ef7086c1c17b630530267341541854c60048c18
            • Opcode Fuzzy Hash: 519728c3e13e0f4c89779d81aee66e9573ba5024459f0d138851aba66cfd92f0
            • Instruction Fuzzy Hash: 61718EB1900109EFDB14CF98CC89AAEBB79FF85310F18818AF955A7351C7349A11EF69
            APIs
            • _memset.LIBCMT ref: 0102225A
            • _memset.LIBCMT ref: 01022323
            • ShellExecuteExW.SHELL32(?), ref: 01022368
              • Part of subcall function 00FC936C: __swprintf.LIBCMT ref: 00FC93AB
              • Part of subcall function 00FC936C: __itow.LIBCMT ref: 00FC93DF
              • Part of subcall function 00FDC6F4: _wcscpy.LIBCMT ref: 00FDC717
            • CloseHandle.KERNEL32(00000000), ref: 0102242F
            • FreeLibrary.KERNEL32(00000000), ref: 0102243E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: _memset$CloseExecuteFreeHandleLibraryShell__itow__swprintf_wcscpy
            • String ID: @
            • API String ID: 4082843840-2766056989
            • Opcode ID: c3524dd782cdd57c348b04398ae00f3cba93e26b6638e83292114eeb3afa80c7
            • Instruction ID: df6f4b0e4396c867e76aed75bd5d2058fe58c124d4f2f3cfadd7a2c7a8c017bb
            • Opcode Fuzzy Hash: c3524dd782cdd57c348b04398ae00f3cba93e26b6638e83292114eeb3afa80c7
            • Instruction Fuzzy Hash: 6A71A174900629DFDF15EF98C985A9EBBF5FF48310F148059E895AB351CB35AD40CB90
            APIs
            • GetParent.USER32(?), ref: 01003DE7
            • GetKeyboardState.USER32(?), ref: 01003DFC
            • SetKeyboardState.USER32(?), ref: 01003E5D
            • PostMessageW.USER32(?,00000101,00000010,?), ref: 01003E8B
            • PostMessageW.USER32(?,00000101,00000011,?), ref: 01003EAA
            • PostMessageW.USER32(?,00000101,00000012,?), ref: 01003EF0
            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 01003F13
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessagePost$KeyboardState$Parent
            • String ID:
            • API String ID: 87235514-0
            • Opcode ID: 1de71c62ad9719e2653a4f20fc14bf085bb77fabe2da8bdf8dcba815fdba4241
            • Instruction ID: 9b018815ab333a71d524598aee8fac24a3c0f86cd2120c8e7a83d51e36ad4849
            • Opcode Fuzzy Hash: 1de71c62ad9719e2653a4f20fc14bf085bb77fabe2da8bdf8dcba815fdba4241
            • Instruction Fuzzy Hash: 9B51C3A06447D53DFB3747388C45BBA7EE96B06304F0885CDE2D98A8C3D7A9E984D760
            APIs
            • GetParent.USER32(00000000), ref: 01003C02
            • GetKeyboardState.USER32(?), ref: 01003C17
            • SetKeyboardState.USER32(?), ref: 01003C78
            • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 01003CA4
            • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 01003CC1
            • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 01003D05
            • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 01003D26
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessagePost$KeyboardState$Parent
            • String ID:
            • API String ID: 87235514-0
            • Opcode ID: d813f7b44e4dbdc2ab956b0c5c663e70b4c1af3b836d27149e9dd9ab56e037c7
            • Instruction ID: f7cd11fc0d4a11f703479ff17e9ccf1354a103fee17d7349b54e90e1e20227ad
            • Opcode Fuzzy Hash: d813f7b44e4dbdc2ab956b0c5c663e70b4c1af3b836d27149e9dd9ab56e037c7
            • Instruction Fuzzy Hash: 1C5105A06487D53DFB3793298C45BBABFE97B06304F0884C9E2D58E8C2D695E884D760
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: _wcsncpy$LocalTime
            • String ID:
            • API String ID: 2945705084-0
            • Opcode ID: 0e845a3bdc2162f6769a855f968eb0ab288ea0a2210f3717d402d8a0456d14c9
            • Instruction ID: ef28f0fbd9b8966ba72e8b68ab160b9c152f3793acc96f344f0865b1faf8ee56
            • Opcode Fuzzy Hash: 0e845a3bdc2162f6769a855f968eb0ab288ea0a2210f3717d402d8a0456d14c9
            • Instruction Fuzzy Hash: 1B41E166D10244BADB11EBF9CC469CFB7ACAF04310F108866E648F3162FA78E650C3A5
            APIs
            • _memset.LIBCMT ref: 01029FA3
            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0102A04A
            • IsMenu.USER32(?), ref: 0102A062
            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0102A0AA
            • DrawMenuBar.USER32 ref: 0102A0C3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Menu$Item$DrawInfoInsert_memset
            • String ID: 0
            • API String ID: 3866635326-4108050209
            • Opcode ID: 90aacc8d55f56d3ceab4cd28ca19d56b59bf5c069716b1feed2a1bf226540e46
            • Instruction ID: 437020e8321caa20264406897b6e453f2578dbcd255ef1ada4ae1afc20d6bd12
            • Opcode Fuzzy Hash: 90aacc8d55f56d3ceab4cd28ca19d56b59bf5c069716b1feed2a1bf226540e46
            • Instruction Fuzzy Hash: 87416C75A00219EFDB20DF94D8C4EAABBF5FF08324F04815AF99597641DB39A950CF50
            APIs
            • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?), ref: 01023DA1
            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 01023DCB
            • FreeLibrary.KERNEL32(00000000), ref: 01023E80
              • Part of subcall function 01023D72: RegCloseKey.ADVAPI32(?), ref: 01023DE8
              • Part of subcall function 01023D72: FreeLibrary.KERNEL32(?), ref: 01023E3A
              • Part of subcall function 01023D72: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 01023E5D
            • RegDeleteKeyW.ADVAPI32(?,?), ref: 01023E25
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: EnumFreeLibrary$CloseDeleteOpen
            • String ID:
            • API String ID: 395352322-0
            • Opcode ID: 71a3a5b0d30c4b3cc7f47f45c9f9d84f4ee673de72dd7b481a0036d1a5aca416
            • Instruction ID: 86077a37a6cf94960e925fea8f220ef5dbdcb84e67583b011f566ec1146df3f4
            • Opcode Fuzzy Hash: 71a3a5b0d30c4b3cc7f47f45c9f9d84f4ee673de72dd7b481a0036d1a5aca416
            • Instruction Fuzzy Hash: AD315EB5901119BFEF159FD4D889AFFB7BCFF0C340F0001AAE652E6180D6799A498B60
            APIs
              • Part of subcall function 01006EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,01005FA6,?), ref: 01006ED8
              • Part of subcall function 01006EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,01005FA6,?), ref: 01006EF1
            • lstrcmpiW.KERNEL32(?,?), ref: 01005FC9
            • _wcscmp.LIBCMT ref: 01005FE7
            • MoveFileW.KERNEL32(?,?), ref: 01006000
              • Part of subcall function 01006318: GetFileAttributesW.KERNEL32(?,?,?,?,010060C3), ref: 01006369
              • Part of subcall function 01006318: GetLastError.KERNEL32(?,?,?,010060C3), ref: 01006374
              • Part of subcall function 01006318: CreateDirectoryW.KERNEL32(?,00000000,?,?,?,010060C3), ref: 01006388
            • _wcscat.LIBCMT ref: 01006042
            • SHFileOperationW.SHELL32 ref: 010060AA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: File$FullNamePath$AttributesCreateDirectoryErrorLastMoveOperation_wcscat_wcscmplstrcmpi
            • String ID: \*.*
            • API String ID: 1724171360-1173974218
            • Opcode ID: 67c3663028a50113e0f6a80d309779819362020f3f1f2df27142036169424a49
            • Instruction ID: 13cc675a27d4c7f52e2c7dbcd23c2dd85b658ac83ca24844f4c9e669b8698860
            • Opcode Fuzzy Hash: 67c3663028a50113e0f6a80d309779819362020f3f1f2df27142036169424a49
            • Instruction Fuzzy Hash: 10311F71D443199AEF62DBA4C849FEE77F9AF1C300F0400EAA989E3192DA75D384CB50
            APIs
            • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 01028FE7
            • GetWindowLongW.USER32(018BD268,000000F0), ref: 0102901A
            • GetWindowLongW.USER32(018BD268,000000F0), ref: 0102904F
            • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 01029081
            • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 010290AB
            • GetWindowLongW.USER32(00000000,000000F0), ref: 010290BC
            • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 010290D6
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: LongWindow$MessageSend
            • String ID:
            • API String ID: 2178440468-0
            • Opcode ID: e6eb8f7e6d759c398af5747c9245b294ce2a6d3068caecb85c09ab486f067fe9
            • Instruction ID: ca8f837ab73fdce3e8511234cb56707e2f132ac5d77e97ef49708bf39177f18a
            • Opcode Fuzzy Hash: e6eb8f7e6d759c398af5747c9245b294ce2a6d3068caecb85c09ab486f067fe9
            • Instruction Fuzzy Hash: A7315974604229DFDB31CF98D8C4F6837E5FB49318F1441A5FAD98B2A6CB7AA851CB40
            APIs
            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 010008F2
            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 01000918
            • SysAllocString.OLEAUT32(00000000), ref: 0100091B
            • SysAllocString.OLEAUT32(?), ref: 01000939
            • SysFreeString.OLEAUT32(?), ref: 01000942
            • StringFromGUID2.OLE32(?,?,00000028), ref: 01000967
            • SysAllocString.OLEAUT32(?), ref: 01000975
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
            • String ID:
            • API String ID: 3761583154-0
            • Opcode ID: 41e36d33f8482d4b989013ede45c28cb081ba8a0580825b527af4854ce1e8c5b
            • Instruction ID: 6028d6573197d456e14119708bc9aa783f9c0a0b752e45a87923cc4cb1fcb8a3
            • Opcode Fuzzy Hash: 41e36d33f8482d4b989013ede45c28cb081ba8a0580825b527af4854ce1e8c5b
            • Instruction Fuzzy Hash: 4421BA766012086FBB119FACCC84EBB73ECEF093A0F048125F989DB195D674DC458750
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: __wcsnicmp
            • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
            • API String ID: 1038674560-2734436370
            • Opcode ID: 5e8a0327cf22f2f192e02c65e5d24507dd5a4b0675ff2564ef521d7734b86bf5
            • Instruction ID: 9e3cc06c42e9aed02b8801d8a7d3aa18b68f002f174122e5e49bf308fbabe7ac
            • Opcode Fuzzy Hash: 5e8a0327cf22f2f192e02c65e5d24507dd5a4b0675ff2564ef521d7734b86bf5
            • Instruction Fuzzy Hash: 64216A3120015167F323AA299C0AF7B73E8EF55301F14402AF9C6971C2EA6A9582C3A5
            APIs
            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 010009CB
            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 010009F1
            • SysAllocString.OLEAUT32(00000000), ref: 010009F4
            • SysAllocString.OLEAUT32 ref: 01000A15
            • SysFreeString.OLEAUT32 ref: 01000A1E
            • StringFromGUID2.OLE32(?,?,00000028), ref: 01000A38
            • SysAllocString.OLEAUT32(?), ref: 01000A46
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
            • String ID:
            • API String ID: 3761583154-0
            • Opcode ID: 410073438e74290b534101a044b5854332d51a81a258678e623cda37bf6f197e
            • Instruction ID: beec99862ac9c902bdb79037e9151265f371971e85da5a565313cea284e9868e
            • Opcode Fuzzy Hash: 410073438e74290b534101a044b5854332d51a81a258678e623cda37bf6f197e
            • Instruction Fuzzy Hash: CE218879200104AFEB11DFECDD88DAA77ECEF493A0B048165F989CB299DA74EC858754
            APIs
              • Part of subcall function 00FDD17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00FDD1BA
              • Part of subcall function 00FDD17C: GetStockObject.GDI32(00000011), ref: 00FDD1CE
              • Part of subcall function 00FDD17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 00FDD1D8
            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 0102A32D
            • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0102A33A
            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0102A345
            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 0102A354
            • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 0102A360
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageSend$CreateObjectStockWindow
            • String ID: Msctls_Progress32
            • API String ID: 1025951953-3636473452
            • Opcode ID: 62fd006c403d18b96610c1190376f51b45a0fa38695a49648b88abb2d20784b4
            • Instruction ID: 49cd2a942e1531de042bbb8f022eeda94d33b89457d640bc273925053156d1c2
            • Opcode Fuzzy Hash: 62fd006c403d18b96610c1190376f51b45a0fa38695a49648b88abb2d20784b4
            • Instruction Fuzzy Hash: E111B2B1250229BEEF115FA4CC85EEBBF6DFF09798F014115FA48A6050CB769C21DBA4
            APIs
            • GetClientRect.USER32(?,?), ref: 00FDCCF6
            • GetWindowRect.USER32(?,?), ref: 00FDCD37
            • ScreenToClient.USER32(?,?), ref: 00FDCD5F
            • GetClientRect.USER32(?,?), ref: 00FDCE8C
            • GetWindowRect.USER32(?,?), ref: 00FDCEA5
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Rect$Client$Window$Screen
            • String ID:
            • API String ID: 1296646539-0
            • Opcode ID: 9fe3ad71a21344ddf6cb29e4bf26114c1cd65bd7d9e42ba5828232c40a061889
            • Instruction ID: 9ea0d2fd0fbfa5408d737edc4d02211c03fdfb95c8941e0dc8c86afb74455ff0
            • Opcode Fuzzy Hash: 9fe3ad71a21344ddf6cb29e4bf26114c1cd65bd7d9e42ba5828232c40a061889
            • Instruction Fuzzy Hash: F8B16C7990024ADBDF10CFA8C5807EDBBB6FF48310F18856AED999B350DB30A950DB94
            APIs
            • CreateToolhelp32Snapshot.KERNEL32 ref: 01021C18
            • Process32FirstW.KERNEL32(00000000,?), ref: 01021C26
            • __wsplitpath.LIBCMT ref: 01021C54
              • Part of subcall function 00FE1DFC: __wsplitpath_helper.LIBCMT ref: 00FE1E3C
            • _wcscat.LIBCMT ref: 01021C69
            • Process32NextW.KERNEL32(00000000,?), ref: 01021CDF
            • CloseHandle.KERNEL32(00000000,?,?,00000002,00000000), ref: 01021CF1
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath__wsplitpath_helper_wcscat
            • String ID:
            • API String ID: 1380811348-0
            • Opcode ID: b2a114139942f91815e89fc0b734572415a6e214125541f5e73bc86d4d5b58d7
            • Instruction ID: fa21c4aafa64132fdbf7285b58e32585ae102c5c29e9b785ad7878bdcacf5748
            • Opcode Fuzzy Hash: b2a114139942f91815e89fc0b734572415a6e214125541f5e73bc86d4d5b58d7
            • Instruction Fuzzy Hash: 5B515D71504341AFD720EF64CC85EABB7E8EF88754F04492EF98997251EB749A04CB92
            APIs
              • Part of subcall function 01023C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,01022BB5,?,?), ref: 01023C1D
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 010230AF
            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 010230EF
            • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 01023112
            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0102313B
            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0102317E
            • RegCloseKey.ADVAPI32(00000000), ref: 0102318B
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue
            • String ID:
            • API String ID: 3451389628-0
            • Opcode ID: 401a5668d6d9a831085002523d28b83f5ab7bb5787bd41f209c7cf8074630f3e
            • Instruction ID: 074ede539f036cc34e5854bdb7b5329e1299e85fec8d0fbdf626294b64d4e295
            • Opcode Fuzzy Hash: 401a5668d6d9a831085002523d28b83f5ab7bb5787bd41f209c7cf8074630f3e
            • Instruction Fuzzy Hash: 22514731204201AFD704EF64CD96E6EBBF9BF88300F04495DF5958B291DB39E905DB52
            APIs
            • GetMenu.USER32(?), ref: 01028540
            • GetMenuItemCount.USER32(00000000), ref: 01028577
            • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 0102859F
            • GetMenuItemID.USER32(?,?), ref: 0102860E
            • GetSubMenu.USER32(?,?), ref: 0102861C
            • PostMessageW.USER32(?,00000111,?,00000000), ref: 0102866D
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Menu$Item$CountMessagePostString
            • String ID:
            • API String ID: 650687236-0
            • Opcode ID: f029e13bc9cb7b5ecaf846a3fd2498e69581c38cf6c71a0bb37e1d3d21b6ddac
            • Instruction ID: 149fd2c8ee2f61a5a97e664fd990d2298793e0bcafdba1b5f3b24eccb2a8a82e
            • Opcode Fuzzy Hash: f029e13bc9cb7b5ecaf846a3fd2498e69581c38cf6c71a0bb37e1d3d21b6ddac
            • Instruction Fuzzy Hash: 7E51C179A00125AFDB21DF98C945AEEB7F4FF48310F00809AE945B7341CB79AE408B90
            APIs
            • _memset.LIBCMT ref: 01004B10
            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 01004B5B
            • IsMenu.USER32(00000000), ref: 01004B7B
            • CreatePopupMenu.USER32 ref: 01004BAF
            • GetMenuItemCount.USER32(000000FF), ref: 01004C0D
            • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 01004C3E
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
            • String ID:
            • API String ID: 3311875123-0
            • Opcode ID: 956bcb9f32a9b8d86f676f277b1dbfad8084e6b015d182724560aabbe7ac597f
            • Instruction ID: 57d80644244ff88ff480e55691e3d86876394f5feefa12359ea98a752ba68812
            • Opcode Fuzzy Hash: 956bcb9f32a9b8d86f676f277b1dbfad8084e6b015d182724560aabbe7ac597f
            • Instruction Fuzzy Hash: 1D51F370600609EBEF62CF68C984BADBFF4AF04304F008199E695D72C1D7719644CB59
            APIs
            • select.WSOCK32(00000000,00000001,00000000,00000000,?,000003E8,0105DC00), ref: 01018E7C
            • WSAGetLastError.WSOCK32(00000000), ref: 01018E89
            • __WSAFDIsSet.WSOCK32(00000000,00000001,00000000), ref: 01018EAD
            • #16.WSOCK32(?,?,00000000,00000000), ref: 01018EC5
            • _strlen.LIBCMT ref: 01018EF7
            • WSAGetLastError.WSOCK32(00000000), ref: 01018F6A
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ErrorLast$_strlenselect
            • String ID:
            • API String ID: 2217125717-0
            • Opcode ID: bf4da57af5f5c56e5e6c5a90f29ac99d9ba087fe9339cd9114d1bcd80dc5b4a9
            • Instruction ID: ef67e3473962889bc0fec3e7e8492f34d1c03a1ad67c35ca2d1d311f78452efa
            • Opcode Fuzzy Hash: bf4da57af5f5c56e5e6c5a90f29ac99d9ba087fe9339cd9114d1bcd80dc5b4a9
            • Instruction Fuzzy Hash: 0F41C671500105AFD714EBA4CD86FEEB7B9AF58310F10825EF556972D1DB38AE00CB50
            APIs
              • Part of subcall function 00FDB34E: GetWindowLongW.USER32(?,000000EB), ref: 00FDB35F
            • BeginPaint.USER32(?,?,?), ref: 00FDAC2A
            • GetWindowRect.USER32(?,?), ref: 00FDAC8E
            • ScreenToClient.USER32(?,?), ref: 00FDACAB
            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00FDACBC
            • EndPaint.USER32(?,?,?,?,?), ref: 00FDAD06
            • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 0103E673
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: PaintWindow$BeginClientLongRectRectangleScreenViewport
            • String ID:
            • API String ID: 2592858361-0
            • Opcode ID: 7a245b9c1a435a2d51527abf0b4bd26eb71448d428c52101c7c28fdd2190491e
            • Instruction ID: a09751f56a5dfe8feda3176c1c17bedf43f23b9b8e66307a87802398ef0b6d5f
            • Opcode Fuzzy Hash: 7a245b9c1a435a2d51527abf0b4bd26eb71448d428c52101c7c28fdd2190491e
            • Instruction Fuzzy Hash: CF41E475104300AFC721DF24D884F7A7BE9EF59374F18026AF9E4872A1C7369845EB62
            APIs
            • ShowWindow.USER32(01081628,00000000,01081628,00000000,00000000,01081628,?,0103DC5D,00000000,?,00000000,00000000,00000000,?,0103DAD1,00000004), ref: 0102E40B
            • EnableWindow.USER32(00000000,00000000), ref: 0102E42F
            • ShowWindow.USER32(01081628,00000000), ref: 0102E48F
            • ShowWindow.USER32(00000000,00000004), ref: 0102E4A1
            • EnableWindow.USER32(00000000,00000001), ref: 0102E4C5
            • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0102E4E8
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Window$Show$Enable$MessageSend
            • String ID:
            • API String ID: 642888154-0
            • Opcode ID: 4c26498697a266355c0779f293410e0a4315ffc1e33f12f1af5b4fbccb4899cf
            • Instruction ID: 62ddaffef143f1fbdc1c27289797a08724303140a894d65457544c72eb0820f1
            • Opcode Fuzzy Hash: 4c26498697a266355c0779f293410e0a4315ffc1e33f12f1af5b4fbccb4899cf
            • Instruction Fuzzy Hash: 92418034641151EFEB62CF68C599F947FE1BF09304F2881E9EA988F2A2CB35E441CB51
            APIs
            • InterlockedExchange.KERNEL32(?,000001F5), ref: 010098D1
              • Part of subcall function 00FDF4EA: std::exception::exception.LIBCMT ref: 00FDF51E
              • Part of subcall function 00FDF4EA: __CxxThrowException@8.LIBCMT ref: 00FDF533
            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 01009908
            • EnterCriticalSection.KERNEL32(?), ref: 01009924
            • LeaveCriticalSection.KERNEL32(?), ref: 0100999E
            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 010099B3
            • InterlockedExchange.KERNEL32(?,000001F6), ref: 010099D2
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CriticalExchangeFileInterlockedReadSection$EnterException@8LeaveThrowstd::exception::exception
            • String ID:
            • API String ID: 2537439066-0
            • Opcode ID: e85125cbec6ec65b8ed4614aa7fcf13687eb8b251241f1682a9d5e4cd26c4a82
            • Instruction ID: 85b4bb13e33a151a09c6d26d53332513b26bde1b23ff5abade16dc994dd132e5
            • Opcode Fuzzy Hash: e85125cbec6ec65b8ed4614aa7fcf13687eb8b251241f1682a9d5e4cd26c4a82
            • Instruction Fuzzy Hash: A331F471900105EBDB11EF98DD85EAFB7B8FF84310F1480A5F905AB28AD735DA14DB60
            APIs
            • GetForegroundWindow.USER32(?,?,?,?,?,?,010177F4,?,?,00000000,00000001), ref: 01019B53
              • Part of subcall function 01016544: GetWindowRect.USER32(?,?), ref: 01016557
            • GetDesktopWindow.USER32 ref: 01019B7D
            • GetWindowRect.USER32(00000000), ref: 01019B84
            • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 01019BB6
              • Part of subcall function 01007A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 01007AD0
            • GetCursorPos.USER32(?), ref: 01019BE2
            • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 01019C44
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
            • String ID:
            • API String ID: 4137160315-0
            • Opcode ID: aa964be5f5e800ef00238e5521ed248b013f44eb24bda3213a1f55ec02d4a19d
            • Instruction ID: 1710642043865d6a53e893df70e76c02042fa913de17769511677ba3d363c040
            • Opcode Fuzzy Hash: aa964be5f5e800ef00238e5521ed248b013f44eb24bda3213a1f55ec02d4a19d
            • Instruction Fuzzy Hash: 2C31D472104306ABD720DF58C984F9BB7E9FF99318F000919F5C5D7181DA75E944CB91
            APIs
            • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00FFAFAE
            • OpenProcessToken.ADVAPI32(00000000), ref: 00FFAFB5
            • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00FFAFC4
            • CloseHandle.KERNEL32(00000004), ref: 00FFAFCF
            • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00FFAFFE
            • DestroyEnvironmentBlock.USERENV(00000000), ref: 00FFB012
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
            • String ID:
            • API String ID: 1413079979-0
            • Opcode ID: 21e5e581a9e069dcc6285acbabc26ace7d73fb6d8ee372e8bf7b6c46b4ed8918
            • Instruction ID: b14c15971cd0cf75a512a350aa4b0187b7e26e7eff6877fe21ff99f7e191583d
            • Opcode Fuzzy Hash: 21e5e581a9e069dcc6285acbabc26ace7d73fb6d8ee372e8bf7b6c46b4ed8918
            • Instruction Fuzzy Hash: DB218EB250020DAFCF128F94DE49FAE7BA9EF48314F044015FA05A61A1D37ACD20EB61
            APIs
              • Part of subcall function 00FDAF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 00FDAFE3
              • Part of subcall function 00FDAF83: SelectObject.GDI32(?,00000000), ref: 00FDAFF2
              • Part of subcall function 00FDAF83: BeginPath.GDI32(?), ref: 00FDB009
              • Part of subcall function 00FDAF83: SelectObject.GDI32(?,00000000), ref: 00FDB033
            • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 0102EC20
            • LineTo.GDI32(00000000,00000003,?), ref: 0102EC34
            • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0102EC42
            • LineTo.GDI32(00000000,00000000,?), ref: 0102EC52
            • EndPath.GDI32(00000000), ref: 0102EC62
            • StrokePath.GDI32(00000000), ref: 0102EC72
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
            • String ID:
            • API String ID: 43455801-0
            • Opcode ID: ed37be1919c70b909d576bb95aeb9137ab345d13ca575b40bfac0b1542e19a16
            • Instruction ID: e65917abe3fb0f6ccb24a6edc1c4f8bdbeb77b31e5d35ea176ab77e412af35f3
            • Opcode Fuzzy Hash: ed37be1919c70b909d576bb95aeb9137ab345d13ca575b40bfac0b1542e19a16
            • Instruction Fuzzy Hash: 83113CB600014CBFEB219F90DD88FEA7F6DEF08394F148152FE8846164C7769956DBA0
            APIs
            • GetDC.USER32(00000000), ref: 00FFE1C0
            • GetDeviceCaps.GDI32(00000000,00000058), ref: 00FFE1D1
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00FFE1D8
            • ReleaseDC.USER32(00000000,00000000), ref: 00FFE1E0
            • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00FFE1F7
            • MulDiv.KERNEL32(000009EC,?,?), ref: 00FFE209
              • Part of subcall function 00FF9AA3: RaiseException.KERNEL32(-C0000018,00000001,00000000,00000000,00FF9A05,00000000,00000000,?,00FF9DDB), ref: 00FFA53A
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CapsDevice$ExceptionRaiseRelease
            • String ID:
            • API String ID: 603618608-0
            • Opcode ID: caf386677a78b2f31c1da5f125ec2c5729b089fc7ef6b987d899fb3a7247993c
            • Instruction ID: 7043d9bce2b4ac26ef503585bd20ed8a7901972e2c56399d8239ac1ae324b49e
            • Opcode Fuzzy Hash: caf386677a78b2f31c1da5f125ec2c5729b089fc7ef6b987d899fb3a7247993c
            • Instruction Fuzzy Hash: 5D018FB9E00618BFEB109BE68D85B5EBFB9EF58751F004066EE04A7290D6759C01CBA0
            APIs
            • __init_pointers.LIBCMT ref: 00FE7B47
              • Part of subcall function 00FE123A: __initp_misc_winsig.LIBCMT ref: 00FE125E
              • Part of subcall function 00FE123A: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00FE7F51
              • Part of subcall function 00FE123A: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00FE7F65
              • Part of subcall function 00FE123A: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00FE7F78
              • Part of subcall function 00FE123A: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00FE7F8B
              • Part of subcall function 00FE123A: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00FE7F9E
              • Part of subcall function 00FE123A: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00FE7FB1
              • Part of subcall function 00FE123A: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00FE7FC4
              • Part of subcall function 00FE123A: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00FE7FD7
              • Part of subcall function 00FE123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00FE7FEA
              • Part of subcall function 00FE123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00FE7FFD
              • Part of subcall function 00FE123A: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00FE8010
              • Part of subcall function 00FE123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00FE8023
              • Part of subcall function 00FE123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00FE8036
              • Part of subcall function 00FE123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00FE8049
              • Part of subcall function 00FE123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00FE805C
              • Part of subcall function 00FE123A: GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 00FE806F
            • __mtinitlocks.LIBCMT ref: 00FE7B4C
              • Part of subcall function 00FE7E23: InitializeCriticalSectionAndSpinCount.KERNEL32(0107AC68,00000FA0,?,?,00FE7B51,00FE5E77,01076C70,00000014), ref: 00FE7E41
            • __mtterm.LIBCMT ref: 00FE7B55
              • Part of subcall function 00FE7BBD: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00FE7B5A,00FE5E77,01076C70,00000014), ref: 00FE7D3F
              • Part of subcall function 00FE7BBD: _free.LIBCMT ref: 00FE7D46
              • Part of subcall function 00FE7BBD: DeleteCriticalSection.KERNEL32(0107AC68,?,?,00FE7B5A,00FE5E77,01076C70,00000014), ref: 00FE7D68
            • __calloc_crt.LIBCMT ref: 00FE7B7A
            • GetCurrentThreadId.KERNEL32 ref: 00FE7BA3
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: AddressProc$CriticalSection$Delete$CountCurrentHandleInitializeModuleSpinThread__calloc_crt__init_pointers__initp_misc_winsig__mtinitlocks__mtterm_free
            • String ID:
            • API String ID: 2942034483-0
            • Opcode ID: 1d8f5eb768de1ef8c85755e090b7def97416d951c744cc007dba17f13b22d706
            • Instruction ID: 7e948f986f58ac46d1df67ec3d06232ed40114d5fa51dbd2ed30eb1c78247555
            • Opcode Fuzzy Hash: 1d8f5eb768de1ef8c85755e090b7def97416d951c744cc007dba17f13b22d706
            • Instruction Fuzzy Hash: 21F0B47291D3D21AE6747A777C07A4B36C5AF41730B2406A9F8A0DA0DAFF2D88427270
            APIs
            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00FC281D
            • MapVirtualKeyW.USER32(00000010,00000000), ref: 00FC2825
            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00FC2830
            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00FC283B
            • MapVirtualKeyW.USER32(00000011,00000000), ref: 00FC2843
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FC284B
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Virtual
            • String ID:
            • API String ID: 4278518827-0
            • Opcode ID: 4d410865ccfee89f5f0d7ce78025acbf99fb73a6109d6000d9c1e4d945381b87
            • Instruction ID: b95d8a3a516f24cca246668a6c0fe88dc602784d7710779b49b9faf6bc83c549
            • Opcode Fuzzy Hash: 4d410865ccfee89f5f0d7ce78025acbf99fb73a6109d6000d9c1e4d945381b87
            • Instruction Fuzzy Hash: 4B0167B0902B5ABDE3008F6A8C85B52FFA8FF19354F00411BA15C47A42C7F5A864CBE5
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CriticalExchangeInterlockedSection$EnterLeaveObjectSingleTerminateThreadWait
            • String ID:
            • API String ID: 1423608774-0
            • Opcode ID: 5e993d2728447aa1dc2bd530045c001b796e4a4dfa58d671053035abf155710b
            • Instruction ID: 133896b87e62ea9964a9f0da1b85f4b9c558d48dc142241e1112379e68bd0fa3
            • Opcode Fuzzy Hash: 5e993d2728447aa1dc2bd530045c001b796e4a4dfa58d671053035abf155710b
            • Instruction Fuzzy Hash: 0701FE75201211ABFB261BD8FE88DEB77A5FF69311F040059F587910C5CB799400CB90
            APIs
            • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 01007C07
            • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 01007C1D
            • GetWindowThreadProcessId.USER32(?,?), ref: 01007C2C
            • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 01007C3B
            • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 01007C45
            • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 01007C4C
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
            • String ID:
            • API String ID: 839392675-0
            • Opcode ID: 1abff5a17aac006e4938c464a7a5e551165efcc90460bfe6e7e59623fdaccd5a
            • Instruction ID: a9e48e171623ef4adb4f8c833a3b9775d3fd450ade92ebcf60e00128e76589f1
            • Opcode Fuzzy Hash: 1abff5a17aac006e4938c464a7a5e551165efcc90460bfe6e7e59623fdaccd5a
            • Instruction Fuzzy Hash: E4F090BA101158BBE73117929D4DEEF3B7CEFCAB11F000018FA4591045D7A92A41C7B4
            APIs
            • InterlockedExchange.KERNEL32(?,?), ref: 01009A33
            • EnterCriticalSection.KERNEL32(?,?,?,?,01035DEE,?,?,?,?,?,00FCED63), ref: 01009A44
            • TerminateThread.KERNEL32(?,000001F6,?,?,?,01035DEE,?,?,?,?,?,00FCED63), ref: 01009A51
            • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,01035DEE,?,?,?,?,?,00FCED63), ref: 01009A5E
              • Part of subcall function 010093D1: CloseHandle.KERNEL32(?,?,01009A6B,?,?,?,01035DEE,?,?,?,?,?,00FCED63), ref: 010093DB
            • InterlockedExchange.KERNEL32(?,000001F6), ref: 01009A71
            • LeaveCriticalSection.KERNEL32(?,?,?,?,01035DEE,?,?,?,?,?,00FCED63), ref: 01009A78
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
            • String ID:
            • API String ID: 3495660284-0
            • Opcode ID: 0f892b42e394000625a66fbd4c0ce95d23ac284bde8826031646e91dd2006494
            • Instruction ID: b6e1d02242672b8194d82f42b322dd7077af3ea435cf4a44ef6ae0d9cc398cec
            • Opcode Fuzzy Hash: 0f892b42e394000625a66fbd4c0ce95d23ac284bde8826031646e91dd2006494
            • Instruction Fuzzy Hash: 35F0B476145201ABE7221BD4FEC8DEA7769FFA5311F040021F24391099CB7A9400DB50
            APIs
              • Part of subcall function 00FDF4EA: std::exception::exception.LIBCMT ref: 00FDF51E
              • Part of subcall function 00FDF4EA: __CxxThrowException@8.LIBCMT ref: 00FDF533
            • __swprintf.LIBCMT ref: 00FC1EA6
            Strings
            • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00FC1D49
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Exception@8Throw__swprintfstd::exception::exception
            • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
            • API String ID: 2125237772-557222456
            • Opcode ID: d742033014e654b3181057284f42cf20ac53c8a3e34743e5ebcdba74ac423c9d
            • Instruction ID: 8466646e3dd4cc6fbb85c77dba16532203c4cdb24174aa0714bcc8100d8b635c
            • Opcode Fuzzy Hash: d742033014e654b3181057284f42cf20ac53c8a3e34743e5ebcdba74ac423c9d
            • Instruction Fuzzy Hash: 0F917D715082029FD714EF24CE96E6EBBA8BF85700F04491EF985D72A2DB34E944DB92
            APIs
            • VariantInit.OLEAUT32(?), ref: 0101B006
            • CharUpperBuffW.USER32(?,?), ref: 0101B115
            • VariantClear.OLEAUT32(?), ref: 0101B298
              • Part of subcall function 01009DC5: VariantInit.OLEAUT32(00000000), ref: 01009E05
              • Part of subcall function 01009DC5: VariantCopy.OLEAUT32(?,?), ref: 01009E0E
              • Part of subcall function 01009DC5: VariantClear.OLEAUT32(?), ref: 01009E1A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Variant$ClearInit$BuffCharCopyUpper
            • String ID: AUTOIT.ERROR$Incorrect Parameter format
            • API String ID: 4237274167-1221869570
            • Opcode ID: 0871e062241acde47bf51bd687323bc78ec0874e17d6be31140a4c21215f8a69
            • Instruction ID: cbb49d42887625b98f6eb9f236535e7fd4ab01a7da27d43c804cdc9ce4cb6e04
            • Opcode Fuzzy Hash: 0871e062241acde47bf51bd687323bc78ec0874e17d6be31140a4c21215f8a69
            • Instruction Fuzzy Hash: 67916C746083029FCB10DF68C585A9EBBF4BF89704F04486DF99A9B351DB35E909CB52
            APIs
              • Part of subcall function 00FDC6F4: _wcscpy.LIBCMT ref: 00FDC717
            • _memset.LIBCMT ref: 01005438
            • GetMenuItemInfoW.USER32(?), ref: 01005467
            • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 01005513
            • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0100553D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ItemMenu$Info$Default_memset_wcscpy
            • String ID: 0
            • API String ID: 4152858687-4108050209
            • Opcode ID: c679b95d76a143111962b0f22447285ff4711eb0031d23a96bd326fddb680523
            • Instruction ID: 7bc8aabf4f9b12a8d8f64eb9adb8c3de1a0d814feeb6a2a3e978f53282c99439
            • Opcode Fuzzy Hash: c679b95d76a143111962b0f22447285ff4711eb0031d23a96bd326fddb680523
            • Instruction Fuzzy Hash: 875133712083018BF7929A2CCC55AAFBBE8AF45314F040A2EF9D5C31D1DBB5C8008F52
            APIs
            • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0100027B
            • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 010002B1
            • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 010002C2
            • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 01000344
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ErrorMode$AddressCreateInstanceProc
            • String ID: DllGetClassObject
            • API String ID: 753597075-1075368562
            • Opcode ID: 5feef0e02729d667a8c5ebb7efb4f3f64ce20e14a209c4bbd77b6e30556f388d
            • Instruction ID: f5259815803632810587047cd3658346cb9ca4130cf219b9ed0627f84e25b298
            • Opcode Fuzzy Hash: 5feef0e02729d667a8c5ebb7efb4f3f64ce20e14a209c4bbd77b6e30556f388d
            • Instruction Fuzzy Hash: 13416FB1600204EFEB16CF54C894B9B7BA9EF44251F14C0A9BD899F249D7B5DA44CBA0
            APIs
            • _memset.LIBCMT ref: 01005075
            • GetMenuItemInfoW.USER32 ref: 01005091
            • DeleteMenu.USER32(00000004,00000007,00000000), ref: 010050D7
            • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,01081708,00000000), ref: 01005120
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Menu$Delete$InfoItem_memset
            • String ID: 0
            • API String ID: 1173514356-4108050209
            • Opcode ID: 34f921b93d2dc7d285b9f766c758489563224a59d16201daa6714c57d0d4406f
            • Instruction ID: 3fe3330dbc587d8b8c0f959da4588388704fb5e73d4052f8a7df5684618bf19e
            • Opcode Fuzzy Hash: 34f921b93d2dc7d285b9f766c758489563224a59d16201daa6714c57d0d4406f
            • Instruction Fuzzy Hash: 7A41B1742053019FE722DF28DC80BAABBE4AF85314F044A5EF995972C1D770E900CF66
            APIs
            • CharLowerBuffW.USER32(?,?,?,?), ref: 01020587
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: BuffCharLower
            • String ID: cdecl$none$stdcall$winapi
            • API String ID: 2358735015-567219261
            • Opcode ID: f4be73b6abb82dc911e6a081077175ae5283e2e92ea9e5ac3fc2e1601511b4d6
            • Instruction ID: 9bc4da920a30546ec078b1cfe6e1ed9d24032c792a6005d15cef838b613e846b
            • Opcode Fuzzy Hash: f4be73b6abb82dc911e6a081077175ae5283e2e92ea9e5ac3fc2e1601511b4d6
            • Instruction Fuzzy Hash: 1931B230900226AFCF10EF98CD419EEB3B5FF54314B108659F8A6A76D5DB75E905CB80
            APIs
            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00FFB88E
            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00FFB8A1
            • SendMessageW.USER32(?,00000189,?,00000000), ref: 00FFB8D1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: ComboBox$ListBox
            • API String ID: 3850602802-1403004172
            • Opcode ID: ee7d94b36699d8063a138387426410a38c598634f9dddd9c99e4c032a2d01076
            • Instruction ID: 7f1e5c64e155df84c295fd9ae030db9915e22b45313aacf635d66eb91b8af992
            • Opcode Fuzzy Hash: ee7d94b36699d8063a138387426410a38c598634f9dddd9c99e4c032a2d01076
            • Instruction Fuzzy Hash: 9C2104B6A00108BFD714ABA4CC86EBE7778DF85360B14412DF155A61E1DB794D0AA760
            APIs
            • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 01014401
            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 01014427
            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 01014457
            • InternetCloseHandle.WININET(00000000), ref: 0101449E
              • Part of subcall function 01015052: GetLastError.KERNEL32(?,?,010143CC,00000000,00000000,00000001), ref: 01015067
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: HttpInternet$CloseErrorHandleInfoLastOpenQueryRequestSend
            • String ID:
            • API String ID: 1951874230-3916222277
            • Opcode ID: 4822539fd423d42a9c4cfb405d71dd4cb13382c180b4c344701aed804232fa1d
            • Instruction ID: e604439f4ad69b83f406a8c758f2b37ab608f026325f2cbf5dc14996154f5811
            • Opcode Fuzzy Hash: 4822539fd423d42a9c4cfb405d71dd4cb13382c180b4c344701aed804232fa1d
            • Instruction Fuzzy Hash: 1521B0B5540209BFE721DF94CC84EBF7AECFB48748F00801AF185D6154EB689D059770
            APIs
              • Part of subcall function 00FDD17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00FDD1BA
              • Part of subcall function 00FDD17C: GetStockObject.GDI32(00000011), ref: 00FDD1CE
              • Part of subcall function 00FDD17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 00FDD1D8
            • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 0102915C
            • LoadLibraryW.KERNEL32(?), ref: 01029163
            • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 01029178
            • DestroyWindow.USER32(?), ref: 01029180
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
            • String ID: SysAnimate32
            • API String ID: 4146253029-1011021900
            • Opcode ID: fedc046814f7a8eaeca94c5c2d1c0db81f04c48e194a89a13b75d4f9ade800db
            • Instruction ID: 4e5dd93bba1911224deba4035e0c4810fee6aab515f83ac5a5563f5e7488ee09
            • Opcode Fuzzy Hash: fedc046814f7a8eaeca94c5c2d1c0db81f04c48e194a89a13b75d4f9ade800db
            • Instruction Fuzzy Hash: 86218E71200225BFFF214EA99C85EBA37E9FF89368F200658FA9492191C7369C51A760
            APIs
            • GetStdHandle.KERNEL32(0000000C), ref: 01009588
            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 010095B9
            • GetStdHandle.KERNEL32(0000000C), ref: 010095CB
            • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 01009605
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CreateHandle$FilePipe
            • String ID: nul
            • API String ID: 4209266947-2873401336
            • Opcode ID: d2cb84cbd35c338e85eb360453ccf79a66b15ca702f424c09d8498c9f35d5cde
            • Instruction ID: 2de0e1b7ac97d2ccfc6dfc3524363cb1d7328e6b5d8a258203c3e576cfe92dac
            • Opcode Fuzzy Hash: d2cb84cbd35c338e85eb360453ccf79a66b15ca702f424c09d8498c9f35d5cde
            • Instruction Fuzzy Hash: D321DE70600306ABFB219F2AD844A9E7BF8AF54329F104A58F9E9D72D1D772D940CB10
            APIs
            • GetStdHandle.KERNEL32(000000F6), ref: 01009653
            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 01009683
            • GetStdHandle.KERNEL32(000000F6), ref: 01009694
            • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 010096CE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CreateHandle$FilePipe
            • String ID: nul
            • API String ID: 4209266947-2873401336
            • Opcode ID: a4dd9d50f946ff63fdbd54b0aa47b3e81c186b3f92e050e71faca5f7a1c08f2a
            • Instruction ID: be269092c5652acca7f55075db8a3f23dc72acbc70a2e4f94d15a08de8f01b73
            • Opcode Fuzzy Hash: a4dd9d50f946ff63fdbd54b0aa47b3e81c186b3f92e050e71faca5f7a1c08f2a
            • Instruction Fuzzy Hash: AA21A171600205ABFB219F699C44E9E77E8AF58738F200A58F9E5E72D1D7719440CB10
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0100DB0A
            • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0100DB5E
            • __swprintf.LIBCMT ref: 0100DB77
            • SetErrorMode.KERNEL32(00000000,00000001,00000000,0105DC00), ref: 0100DBB5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ErrorMode$InformationVolume__swprintf
            • String ID: %lu
            • API String ID: 3164766367-685833217
            • Opcode ID: a981a0ee6988f81a9805717d6c729593ad5c08db514e28779a83bc80d865f977
            • Instruction ID: c21112b0dc6a2afb7a97da63b1af3008646d298e05886c92876ab3e3c8df6ea9
            • Opcode Fuzzy Hash: a981a0ee6988f81a9805717d6c729593ad5c08db514e28779a83bc80d865f977
            • Instruction Fuzzy Hash: 4621B675600109AFDB10EF95CE95EAEBBB8FF88700B004069F549D7251DB75EA01DB61
            APIs
              • Part of subcall function 00FFC82D: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00FFC84A
              • Part of subcall function 00FFC82D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00FFC85D
              • Part of subcall function 00FFC82D: GetCurrentThreadId.KERNEL32 ref: 00FFC864
              • Part of subcall function 00FFC82D: AttachThreadInput.USER32(00000000), ref: 00FFC86B
            • GetFocus.USER32 ref: 00FFCA05
              • Part of subcall function 00FFC876: GetParent.USER32(?), ref: 00FFC884
            • GetClassNameW.USER32(?,?,00000100), ref: 00FFCA4E
            • EnumChildWindows.USER32(?,00FFCAC4), ref: 00FFCA76
            • __swprintf.LIBCMT ref: 00FFCA90
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf
            • String ID: %s%d
            • API String ID: 3187004680-1110647743
            • Opcode ID: a9fbedc53ca86418f9b9effe98853c2b7b73804e3a52160e0894f85f6d8b2c6e
            • Instruction ID: dd709dd619879283d7f3694995adcca421c42b425a4ea197f1a706ea112aae7d
            • Opcode Fuzzy Hash: a9fbedc53ca86418f9b9effe98853c2b7b73804e3a52160e0894f85f6d8b2c6e
            • Instruction Fuzzy Hash: FD1190B560021D7BCB11BEA09E96FF93768AF44714F00406ABF09AA052CB799545EBB0
            APIs
            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 010219F3
            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 01021A26
            • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 01021B49
            • CloseHandle.KERNEL32(?), ref: 01021BBF
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Process$CloseCountersHandleInfoMemoryOpen
            • String ID:
            • API String ID: 2364364464-0
            • Opcode ID: 03e1038effe77625da8deefc6fb5b05d7240cdf26d3efc5e11b612f0b4309bdf
            • Instruction ID: 947983b6623170aaf2e13ca295261feb4b4e28beb84d6a67f31dd8b129ce9d52
            • Opcode Fuzzy Hash: 03e1038effe77625da8deefc6fb5b05d7240cdf26d3efc5e11b612f0b4309bdf
            • Instruction Fuzzy Hash: 65819374600214ABDF11DF64CD86BADBBF5BF48720F08845AF945AF382D7B9A941CB90
            APIs
            • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0102E1D5
            • SendMessageW.USER32(?,000000B0,?,?), ref: 0102E20D
            • IsDlgButtonChecked.USER32(?,00000001), ref: 0102E248
            • GetWindowLongW.USER32(?,000000EC), ref: 0102E269
            • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0102E281
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageSend$ButtonCheckedLongWindow
            • String ID:
            • API String ID: 3188977179-0
            • Opcode ID: 5f42457f4feb3a20b67722cf2fe9401c82839803efa4426e1d484af33f8b9eac
            • Instruction ID: e6ca11436145693cc1ee345fc63536e1d5d4912836727bdcf876ae3014ce753b
            • Opcode Fuzzy Hash: 5f42457f4feb3a20b67722cf2fe9401c82839803efa4426e1d484af33f8b9eac
            • Instruction Fuzzy Hash: 4E61DF34A84224AFEB25DF58C884FEE7BFAAF49304F1440A9F9C997391C735A951CB10
            APIs
            • VariantInit.OLEAUT32(?), ref: 01001CB4
            • VariantClear.OLEAUT32(00000013), ref: 01001D26
            • VariantClear.OLEAUT32(00000000), ref: 01001D81
            • VariantClear.OLEAUT32(?), ref: 01001DF8
            • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 01001E26
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Variant$Clear$ChangeInitType
            • String ID:
            • API String ID: 4136290138-0
            • Opcode ID: 29fec62f6188a79111d9afe631e203f1dec819c3b67190c128ca6dfe8e3ccc90
            • Instruction ID: a5ff0d5e75f4378dfa92bf850a1b47476fb84a16b9368f112b75ff1054e31480
            • Opcode Fuzzy Hash: 29fec62f6188a79111d9afe631e203f1dec819c3b67190c128ca6dfe8e3ccc90
            • Instruction Fuzzy Hash: 35517CB5A00209EFDB11DF58C880AAAB7F8FF8C314F15855AE995DB345D734E901CBA0
            APIs
              • Part of subcall function 00FC936C: __swprintf.LIBCMT ref: 00FC93AB
              • Part of subcall function 00FC936C: __itow.LIBCMT ref: 00FC93DF
            • LoadLibraryW.KERNEL32(?,00000004,?,?), ref: 010206EE
            • GetProcAddress.KERNEL32(00000000,?), ref: 0102077D
            • GetProcAddress.KERNEL32(00000000,00000000), ref: 0102079B
            • GetProcAddress.KERNEL32(00000000,?), ref: 010207E1
            • FreeLibrary.KERNEL32(00000000,00000004), ref: 010207FB
              • Part of subcall function 00FDE65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,0100A574,?,?,00000000,00000008), ref: 00FDE675
              • Part of subcall function 00FDE65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,0100A574,?,?,00000000,00000008), ref: 00FDE699
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
            • String ID:
            • API String ID: 327935632-0
            • Opcode ID: 6d00ae2c24b0f313802f0163912727e3470af8bea0d4964c85255c29e5d7ebd3
            • Instruction ID: a82b65a3909ba5212a766dbeb5a95bd6de84b6c1c01614d163745374dc85bceb
            • Opcode Fuzzy Hash: 6d00ae2c24b0f313802f0163912727e3470af8bea0d4964c85255c29e5d7ebd3
            • Instruction Fuzzy Hash: 59515D75A00216DFCB00EFA8C995EADB7F5BF58310B048099F995AB351DB34ED45DB80
            APIs
              • Part of subcall function 01023C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,01022BB5,?,?), ref: 01023C1D
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 01022EEF
            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 01022F2E
            • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 01022F75
            • RegCloseKey.ADVAPI32(?,?), ref: 01022FA1
            • RegCloseKey.ADVAPI32(00000000), ref: 01022FAE
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Close$BuffCharConnectEnumOpenRegistryUpper
            • String ID:
            • API String ID: 3740051246-0
            • Opcode ID: 892892c96a8e1fa98a51035eee28ae1a64a80a475c20f3dc091d44cc3ab4431c
            • Instruction ID: 98f4b9f37254cdf96d0a225933834e2e329dfaaf7e63c80c18552c5272ca39fb
            • Opcode Fuzzy Hash: 892892c96a8e1fa98a51035eee28ae1a64a80a475c20f3dc091d44cc3ab4431c
            • Instruction Fuzzy Hash: 1F515971208205AFD744EFA8CD81FAEBBE8BF88304F04496DF59987291DB35E904DB52
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 40635765ed5c3fa7ec073226bceff9508f005205f67a833e92887264afa793f1
            • Instruction ID: 23c245c7fbbd1e076a0c3ee649b624fc56d5c3be6eea00caa37d16abb9d5d916
            • Opcode Fuzzy Hash: 40635765ed5c3fa7ec073226bceff9508f005205f67a833e92887264afa793f1
            • Instruction Fuzzy Hash: 6141B679900124AFFB60EB6CCE44FADBFA8EB09350F050295EAD9A72D1C774A911C750
            APIs
            • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 010112B4
            • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 010112DD
            • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0101131C
              • Part of subcall function 00FC936C: __swprintf.LIBCMT ref: 00FC93AB
              • Part of subcall function 00FC936C: __itow.LIBCMT ref: 00FC93DF
            • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 01011341
            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 01011349
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
            • String ID:
            • API String ID: 1389676194-0
            • Opcode ID: 397374b76febd6b2da5bf3387c64d274598eac81d7433ebcc3f1de1aab76b5e6
            • Instruction ID: 315debf54e823c2ef64bd8a66f385499c2ae0e3295148ff1bc04fcfd10baf52c
            • Opcode Fuzzy Hash: 397374b76febd6b2da5bf3387c64d274598eac81d7433ebcc3f1de1aab76b5e6
            • Instruction Fuzzy Hash: 2F413B75A00105DFDB05EF64CA85EAEBBF5FF48310B148099E94AAB365CB39ED01DB50
            APIs
            • GetCursorPos.USER32(000000FF), ref: 00FDB64F
            • ScreenToClient.USER32(00000000,000000FF), ref: 00FDB66C
            • GetAsyncKeyState.USER32(00000001), ref: 00FDB691
            • GetAsyncKeyState.USER32(00000002), ref: 00FDB69F
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: AsyncState$ClientCursorScreen
            • String ID:
            • API String ID: 4210589936-0
            • Opcode ID: b4815b7f48aaad9a31b3363bdf7dd2873682e671cb183388aa5cf9e12a17bf00
            • Instruction ID: be5ba77225619f1a66b7845368c1457974d02eb2e6e245a2b0f52eb42ed9fdbe
            • Opcode Fuzzy Hash: b4815b7f48aaad9a31b3363bdf7dd2873682e671cb183388aa5cf9e12a17bf00
            • Instruction Fuzzy Hash: 5341C275904115FFDF159FA8C884AEDBBB5FF45324F10835AF8A892290C734A990EF90
            APIs
            • GetWindowRect.USER32(?,?), ref: 00FFB369
            • PostMessageW.USER32(?,00000201,00000001), ref: 00FFB413
            • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00FFB41B
            • PostMessageW.USER32(?,00000202,00000000), ref: 00FFB429
            • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00FFB431
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessagePostSleep$RectWindow
            • String ID:
            • API String ID: 3382505437-0
            • Opcode ID: ad2f4299a0b5514d2526b009c0ecca456acfd29518982710f34b832261938cd0
            • Instruction ID: 860f840d3e12fbea0922040efbd7f1b74986f418de9f0cf1bc2cfa7916429b37
            • Opcode Fuzzy Hash: ad2f4299a0b5514d2526b009c0ecca456acfd29518982710f34b832261938cd0
            • Instruction Fuzzy Hash: 7331C0B190021DEBDF14CFA8DA8DAAE3BB5EF04329F104229F965A61D1C3B49914DB90
            APIs
            • IsWindowVisible.USER32(?), ref: 00FFDBD7
            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00FFDBF4
            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00FFDC2C
            • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00FFDC52
            • _wcsstr.LIBCMT ref: 00FFDC5C
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
            • String ID:
            • API String ID: 3902887630-0
            • Opcode ID: 0d062dc4e09dc5a232d62089d800c5bb0b842b246135065033ccd322d77a0a75
            • Instruction ID: 20646478060bbdab8f82d84d85e8799970296546f5215db99cd55f5ce2a5d178
            • Opcode Fuzzy Hash: 0d062dc4e09dc5a232d62089d800c5bb0b842b246135065033ccd322d77a0a75
            • Instruction Fuzzy Hash: 9D214C72604108BBE7259F79DD49E7B7BAADF45760F144039FA0ACA151DAA5CC00F360
            APIs
            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00FFBC90
            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00FFBCC2
            • __itow.LIBCMT ref: 00FFBCDA
            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00FFBD00
            • __itow.LIBCMT ref: 00FFBD11
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageSend$__itow
            • String ID:
            • API String ID: 3379773720-0
            • Opcode ID: c919be8d8618795a616086088b65f13c748f260d7ba063676a6866a141cf3732
            • Instruction ID: 78531f33d628f2a26a941c355230716c4f380a951182570e5d190218a78df980
            • Opcode Fuzzy Hash: c919be8d8618795a616086088b65f13c748f260d7ba063676a6866a141cf3732
            • Instruction Fuzzy Hash: 2D21F975B0020CBBDB20AAA5CD86FEF7B68AF59710F040028FB45EB191DB75894563A1
            APIs
              • Part of subcall function 00FC50E6: _wcsncpy.LIBCMT ref: 00FC50FA
            • GetFileAttributesW.KERNEL32(?,?,?,?,010060C3), ref: 01006369
            • GetLastError.KERNEL32(?,?,?,010060C3), ref: 01006374
            • CreateDirectoryW.KERNEL32(?,00000000,?,?,?,010060C3), ref: 01006388
            • _wcsrchr.LIBCMT ref: 010063AA
              • Part of subcall function 01006318: CreateDirectoryW.KERNEL32(?,00000000,?,?,?,010060C3), ref: 010063E0
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CreateDirectory$AttributesErrorFileLast_wcsncpy_wcsrchr
            • String ID:
            • API String ID: 3633006590-0
            • Opcode ID: 13bc4a4af1a65a323336559f594e41d181d739816548eaaf1bafe2e82562859a
            • Instruction ID: e98425567b14a60c64959ad223a4ee9c81a567992e9d9764c579f82d9b470a29
            • Opcode Fuzzy Hash: 13bc4a4af1a65a323336559f594e41d181d739816548eaaf1bafe2e82562859a
            • Instruction Fuzzy Hash: 4621F93190421557FB63AB78AD42FEE339DAF05360F1480A5F185C31C1EBA6D59497A0
            APIs
              • Part of subcall function 0101A82C: inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 0101A84E
            • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 01018BD3
            • WSAGetLastError.WSOCK32(00000000), ref: 01018BE2
            • connect.WSOCK32(00000000,?,00000010), ref: 01018BFE
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ErrorLastconnectinet_addrsocket
            • String ID:
            • API String ID: 3701255441-0
            • Opcode ID: 862650c0b5970036decfffb23541d7eaa5f19b7e9e17b9c5e0f37a98b52889f6
            • Instruction ID: d40fe13bbf9801ea374bc5a792c5760864c44caa563ae7a709f2adce2aadd61a
            • Opcode Fuzzy Hash: 862650c0b5970036decfffb23541d7eaa5f19b7e9e17b9c5e0f37a98b52889f6
            • Instruction Fuzzy Hash: DC21D1712001059FDB10EF68CD85F7E77A9BF54320F04844EE986973C6CB78A9018751
            APIs
            • IsWindow.USER32(00000000), ref: 01018441
            • GetForegroundWindow.USER32 ref: 01018458
            • GetDC.USER32(00000000), ref: 01018494
            • GetPixel.GDI32(00000000,?,00000003), ref: 010184A0
            • ReleaseDC.USER32(00000000,00000003), ref: 010184DB
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Window$ForegroundPixelRelease
            • String ID:
            • API String ID: 4156661090-0
            • Opcode ID: d3fb5d9f911248020fed6629864c1ca0800ce1d36def1badc11edf09c31cd3f8
            • Instruction ID: 884e6a71a0634859c5db6d2dbb6d66f9a428a5ceca6f5ac1d5dedc9eff63ef0f
            • Opcode Fuzzy Hash: d3fb5d9f911248020fed6629864c1ca0800ce1d36def1badc11edf09c31cd3f8
            • Instruction Fuzzy Hash: C721A17AA00204AFD710DFA4DD84AAEBBE5EF48301F04C479E98997345DE79AD00CB60
            APIs
            • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 00FDAFE3
            • SelectObject.GDI32(?,00000000), ref: 00FDAFF2
            • BeginPath.GDI32(?), ref: 00FDB009
            • SelectObject.GDI32(?,00000000), ref: 00FDB033
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ObjectSelect$BeginCreatePath
            • String ID:
            • API String ID: 3225163088-0
            • Opcode ID: cb51a540b3780ccead0d5d28cbad673a6c08e2b69b4c472478eb258e3bc4c0ed
            • Instruction ID: 1074b8a820a767861aca9426c8180059b7b1afdf94a0fd8aacc4c7cb4bfaf0e9
            • Opcode Fuzzy Hash: cb51a540b3780ccead0d5d28cbad673a6c08e2b69b4c472478eb258e3bc4c0ed
            • Instruction Fuzzy Hash: 4321C4B5904204EFDB319F94E84879E3B69BF143A9F18431AF4E092294C37A4862DB90
            APIs
            • __calloc_crt.LIBCMT ref: 00FE21A9
            • CreateThread.KERNEL32(?,?,00FE22DF,00000000,?,?), ref: 00FE21ED
            • GetLastError.KERNEL32 ref: 00FE21F7
            • _free.LIBCMT ref: 00FE2200
            • __dosmaperr.LIBCMT ref: 00FE220B
              • Part of subcall function 00FE7C0E: __getptd_noexit.LIBCMT ref: 00FE7C0E
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CreateErrorLastThread__calloc_crt__dosmaperr__getptd_noexit_free
            • String ID:
            • API String ID: 2664167353-0
            • Opcode ID: c17e6d0d0500b976f3f020fbea482e3cefb15d9f3140e09c8093012e5e80978c
            • Instruction ID: 3955515523b5c4c39b8fdcde3a02a0b0c08c478dd5d99b82d276a0b50e5cab4e
            • Opcode Fuzzy Hash: c17e6d0d0500b976f3f020fbea482e3cefb15d9f3140e09c8093012e5e80978c
            • Instruction Fuzzy Hash: 8511A5325043C66FEB21BFA79C41DAB379DEF45770B10042AFA14C6191EB79D911A7A0
            APIs
            • GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00FFABD7
            • GetLastError.KERNEL32(?,00FFA69F,?,?,?), ref: 00FFABE1
            • GetProcessHeap.KERNEL32(00000008,?,?,00FFA69F,?,?,?), ref: 00FFABF0
            • HeapAlloc.KERNEL32(00000000,?,00FFA69F,?,?,?), ref: 00FFABF7
            • GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00FFAC0E
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
            • String ID:
            • API String ID: 842720411-0
            • Opcode ID: ff91b1e0f717892219ad33a28b9805598f3f8e806963de1d30df3aa91e1a9947
            • Instruction ID: 64e608206b690ebec42ed4054c04cfd5e4301d31266ae3863e0b797a07402f61
            • Opcode Fuzzy Hash: ff91b1e0f717892219ad33a28b9805598f3f8e806963de1d30df3aa91e1a9947
            • Instruction Fuzzy Hash: 110181F4600208BFDB214FE5DD88D6B3BACEF893657100429F949C3260D672DC40DB60
            APIs
            • CLSIDFromProgID.OLE32 ref: 00FF9ADC
            • ProgIDFromCLSID.OLE32(?,00000000), ref: 00FF9AF7
            • lstrcmpiW.KERNEL32(?,00000000), ref: 00FF9B05
            • CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00FF9B15
            • CLSIDFromString.OLE32(?,?), ref: 00FF9B21
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: From$Prog$FreeStringTasklstrcmpi
            • String ID:
            • API String ID: 3897988419-0
            • Opcode ID: 3f9150e9cd97e15f6fb630ed687d6cb07d476f071446bdde8cf6941de75d825a
            • Instruction ID: 4adfa234ecb021b84527edccc21736bef3fa328254bacb262db9f96ef6946573
            • Opcode Fuzzy Hash: 3f9150e9cd97e15f6fb630ed687d6cb07d476f071446bdde8cf6941de75d825a
            • Instruction Fuzzy Hash: 040184BA600219BFDB114F54DD44BBD7AEDEF94351F144028FB49D2110D7B5DE41ABA0
            APIs
            • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 01007A74
            • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 01007A82
            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 01007A8A
            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 01007A94
            • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 01007AD0
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: PerformanceQuery$CounterSleep$Frequency
            • String ID:
            • API String ID: 2833360925-0
            • Opcode ID: 801f89887f33c196e18f836a1210f3d4d33dd323882c04f27a3b6cd8a10651a4
            • Instruction ID: f5cffb6dcbb98774a92f2ea45f9f0bba57410c4c50c6ee556daaa93840a38f3e
            • Opcode Fuzzy Hash: 801f89887f33c196e18f836a1210f3d4d33dd323882c04f27a3b6cd8a10651a4
            • Instruction Fuzzy Hash: A1018C75D00619EBEF21AFE4D988ADDBB78FF59311F040085D9C2B2284DB39A690C7A1
            APIs
            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00FFAADA
            • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00FFAAE4
            • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FFAAF3
            • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00FFAAFA
            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FFAB10
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: HeapInformationToken$AllocErrorLastProcess
            • String ID:
            • API String ID: 44706859-0
            • Opcode ID: db573216d76b0c0c253a494f68c711e53ffd5c8ac099deeaf0f5b7783810b07a
            • Instruction ID: 6ad74562626ec8d747a52624e0e3bff0653296b6e50e5f8c561ad17903ef05d9
            • Opcode Fuzzy Hash: db573216d76b0c0c253a494f68c711e53ffd5c8ac099deeaf0f5b7783810b07a
            • Instruction Fuzzy Hash: 3EF03CB53002086FEB220FE4EC88E7B3B6DFF85769B000029FA85C7190CA6598019B61
            APIs
            • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00FFAA79
            • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00FFAA83
            • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00FFAA92
            • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00FFAA99
            • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00FFAAAF
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: HeapInformationToken$AllocErrorLastProcess
            • String ID:
            • API String ID: 44706859-0
            • Opcode ID: 859c1573d9f6aac9c5271c5b71162df98dc8f118ae537061d849ceab94f6729e
            • Instruction ID: 761749a16c30f5b71532794a57d356d0c67d3e801d7576394af8299b470e7b30
            • Opcode Fuzzy Hash: 859c1573d9f6aac9c5271c5b71162df98dc8f118ae537061d849ceab94f6729e
            • Instruction Fuzzy Hash: 01F0A4B5200208BFD7201FE49D88F773B6CFF49794B000019FA45C7160D665DC05DB61
            APIs
            • GetDlgItem.USER32(?,000003E9), ref: 00FFEC94
            • GetWindowTextW.USER32(00000000,?,00000100), ref: 00FFECAB
            • MessageBeep.USER32(00000000), ref: 00FFECC3
            • KillTimer.USER32(?,0000040A), ref: 00FFECDF
            • EndDialog.USER32(?,00000001), ref: 00FFECF9
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: BeepDialogItemKillMessageTextTimerWindow
            • String ID:
            • API String ID: 3741023627-0
            • Opcode ID: 54ed46ae9a484dcbbc408c6e019b573a0917dae47fea1908d439e0b2ef06179d
            • Instruction ID: e7519b3db5f668a99267c08f391a1389787e112da782a541eeac27673fe9ca97
            • Opcode Fuzzy Hash: 54ed46ae9a484dcbbc408c6e019b573a0917dae47fea1908d439e0b2ef06179d
            • Instruction Fuzzy Hash: 6B01D174900758ABEB309F50DF8EBA677B8FF10B05F00055DB682A10E0DBF9AA44DB90
            APIs
            • EndPath.GDI32(?), ref: 00FDB0BA
            • StrokeAndFillPath.GDI32(?,?,0103E680,00000000,?,?,?), ref: 00FDB0D6
            • SelectObject.GDI32(?,00000000), ref: 00FDB0E9
            • DeleteObject.GDI32 ref: 00FDB0FC
            • StrokePath.GDI32(?), ref: 00FDB117
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Path$ObjectStroke$DeleteFillSelect
            • String ID:
            • API String ID: 2625713937-0
            • Opcode ID: 974e602884fa0fb35e674cd0a8083b54dcd935990556386bff441ff29b80568f
            • Instruction ID: d78abb77fa09354073f6fb2c5fdefe804a5b7a4845a72e776167a107a99d17c9
            • Opcode Fuzzy Hash: 974e602884fa0fb35e674cd0a8083b54dcd935990556386bff441ff29b80568f
            • Instruction Fuzzy Hash: AEF01979008244EFDB319FA5E90C7583B66AB147AAF188315F4E5451E8C73A89A6DF10
            APIs
            • CoInitialize.OLE32(00000000), ref: 0100F2DA
            • CoCreateInstance.OLE32(0104DA7C,00000000,00000001,0104D8EC,?), ref: 0100F2F2
            • CoUninitialize.OLE32 ref: 0100F555
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CreateInitializeInstanceUninitialize
            • String ID: .lnk
            • API String ID: 948891078-24824748
            • Opcode ID: 3bf9e7bca0ac5d2ae900be8b5c9c207e5ffad415e7dc83f8ef5e6dc96b4eb9c1
            • Instruction ID: de9b76a9c147a8e5a150a52ae686082eb67308d61ac841be8d1f49d6f62591f7
            • Opcode Fuzzy Hash: 3bf9e7bca0ac5d2ae900be8b5c9c207e5ffad415e7dc83f8ef5e6dc96b4eb9c1
            • Instruction Fuzzy Hash: 00A16C71104201AFD300EFA4CC92EABB7ECEF98714F04495DF19597292EB75EA09DB92
            APIs
              • Part of subcall function 00FC660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00FC53B1,?,?,00FC61FF,?,00000000,00000001,00000000), ref: 00FC662F
            • CoInitialize.OLE32(00000000), ref: 0100E85D
            • CoCreateInstance.OLE32(0104DA7C,00000000,00000001,0104D8EC,?), ref: 0100E876
            • CoUninitialize.OLE32 ref: 0100E893
              • Part of subcall function 00FC936C: __swprintf.LIBCMT ref: 00FC93AB
              • Part of subcall function 00FC936C: __itow.LIBCMT ref: 00FC93DF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
            • String ID: .lnk
            • API String ID: 2126378814-24824748
            • Opcode ID: 2b23b4fc298286c7c95d549414b36ce9437bea0f79e2c15bda692a95a2ea3233
            • Instruction ID: 87532d5103a75cd3ec59ec7caf820b95359178f395f686e5be7322ce0efba360
            • Opcode Fuzzy Hash: 2b23b4fc298286c7c95d549414b36ce9437bea0f79e2c15bda692a95a2ea3233
            • Instruction Fuzzy Hash: 8AA156756043019FDB11DF14C985E2ABBE5BF89310F04899CF99AAB3A2CB35EC45CB91
            APIs
            • __startOneArgErrorHandling.LIBCMT ref: 00FE32ED
              • Part of subcall function 00FEE0D0: __87except.LIBCMT ref: 00FEE10B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ErrorHandling__87except__start
            • String ID: pow
            • API String ID: 2905807303-2276729525
            • Opcode ID: fe6dabe9acfa76b7a6f96c5ff3383e34b00d3c5d94ec9bd7ea3fe8810a7711bd
            • Instruction ID: c7e0e3ee4bfb786e1b557f180f31d6dabb8dbd5185f189be5408b9c678090b30
            • Opcode Fuzzy Hash: fe6dabe9acfa76b7a6f96c5ff3383e34b00d3c5d94ec9bd7ea3fe8810a7711bd
            • Instruction Fuzzy Hash: B2514A32E09281D6CB257A16E90D77A3BA49B40730F308D68F4D58329DDE3D8DD8B742
            APIs
            • CharUpperBuffW.USER32(0000000C,00000016,00000016,00000000,00000000,?,00000000,0105DC50,?,0000000F,0000000C,00000016,0105DC50,?), ref: 01004645
              • Part of subcall function 00FC936C: __swprintf.LIBCMT ref: 00FC93AB
              • Part of subcall function 00FC936C: __itow.LIBCMT ref: 00FC93DF
            • CharUpperBuffW.USER32(?,?,00000000,?), ref: 010046C5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: BuffCharUpper$__itow__swprintf
            • String ID: REMOVE$THIS
            • API String ID: 3797816924-776492005
            • Opcode ID: f54baabd203551c53acbfe3c129fdb834ee8f1a3895f9f12286e373e51c526d9
            • Instruction ID: 8c044239169138f991f8e2cb8a3f4d5899e7caba6039b68063658912d59afe4b
            • Opcode Fuzzy Hash: f54baabd203551c53acbfe3c129fdb834ee8f1a3895f9f12286e373e51c526d9
            • Instruction Fuzzy Hash: D5418334A0020A9FEF02DF98C985AADB7F5FF49304F048059EA5AEB292DB74DD45CB54
            APIs
              • Part of subcall function 0100430B: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00FFBC08,?,?,00000034,00000800,?,00000034), ref: 01004335
            • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00FFC1D3
              • Part of subcall function 010042D6: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00FFBC37,?,?,00000800,?,00001073,00000000,?,?), ref: 01004300
              • Part of subcall function 0100422F: GetWindowThreadProcessId.USER32(?,?), ref: 0100425A
              • Part of subcall function 0100422F: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00FFBBCC,00000034,?,?,00001004,00000000,00000000), ref: 0100426A
              • Part of subcall function 0100422F: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00FFBBCC,00000034,?,?,00001004,00000000,00000000), ref: 01004280
            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00FFC240
            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00FFC28D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
            • String ID: @
            • API String ID: 4150878124-2766056989
            • Opcode ID: 70f9e61e34e5b0229e9d5ce8a373dbcbfa16077d73c7e2430af9e5d2559005b2
            • Instruction ID: 7dd89a6fd16ce4eadaccf4f6cc103c428d3b4051cbf4b3bf1849590c415d9c37
            • Opcode Fuzzy Hash: 70f9e61e34e5b0229e9d5ce8a373dbcbfa16077d73c7e2430af9e5d2559005b2
            • Instruction Fuzzy Hash: E6415B76A0021DBFDB11DFA4CE81AEEB7B8EF19310F004095EA85B7190DA716E45DBA1
            APIs
            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0105DC00,00000000,?,?,?,?), ref: 0102A6D8
            • GetWindowLongW.USER32 ref: 0102A6F5
            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0102A705
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Window$Long
            • String ID: SysTreeView32
            • API String ID: 847901565-1698111956
            • Opcode ID: 3d535d76101277242b034a9713345f330e95266fb79f40a5d9c0156d8d86a7bd
            • Instruction ID: acc5da83eb74b289752a01b4dfefe27a6e94bc6f0bad69eb67540b7df5ea21fb
            • Opcode Fuzzy Hash: 3d535d76101277242b034a9713345f330e95266fb79f40a5d9c0156d8d86a7bd
            • Instruction Fuzzy Hash: 5031E13120021AEFDB218E78CC45BEA7BA9FF49324F244359F9B5932D1CB34E8509B54
            APIs
            • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 0102A15E
            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 0102A172
            • SendMessageW.USER32(?,00001002,00000000,?), ref: 0102A196
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageSend$Window
            • String ID: SysMonthCal32
            • API String ID: 2326795674-1439706946
            • Opcode ID: 191078177400eeee3418b92b7024276b1f0637c57abf8f04df756dbc08c0a8ca
            • Instruction ID: 4be725745fad5c01d7798a3a96f67adae381066215d528cbdbf98ba1c9f0f8db
            • Opcode Fuzzy Hash: 191078177400eeee3418b92b7024276b1f0637c57abf8f04df756dbc08c0a8ca
            • Instruction Fuzzy Hash: D6219132610228BBEF168E94CC82FEA3BB5EF48764F110114FA956B1D1DAB5A855CB90
            APIs
            • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 0102A941
            • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 0102A94F
            • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0102A956
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageSend$DestroyWindow
            • String ID: msctls_updown32
            • API String ID: 4014797782-2298589950
            • Opcode ID: 51c721abbcc8c43add971c9a3b1e9be375ae7b3c5754520a03e0b9a12665f39e
            • Instruction ID: a35ef9a4d90c2bd24710d83af64dd3b9f5183ec6ba5ca84eba237f980d4bd954
            • Opcode Fuzzy Hash: 51c721abbcc8c43add971c9a3b1e9be375ae7b3c5754520a03e0b9a12665f39e
            • Instruction Fuzzy Hash: E321A1B5700219AFEB11DF59CCC1D7B37ADEF4A358B040099FA849B351CA31EC128B60
            APIs
            • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 01029A30
            • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 01029A40
            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 01029A65
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageSend$MoveWindow
            • String ID: Listbox
            • API String ID: 3315199576-2633736733
            • Opcode ID: cc7a5472944f5aa9e785de4428c94d20b8434ddca6d25d0af338268c943fa674
            • Instruction ID: 472021446461ec3a953210e6fbb2b12957fe860dc054e5de88eb35ffc82045de
            • Opcode Fuzzy Hash: cc7a5472944f5aa9e785de4428c94d20b8434ddca6d25d0af338268c943fa674
            • Instruction Fuzzy Hash: E821C572610128BFDF228F58CC85EBF3BAAEF89768F018125F9959B191C6719C1187A0
            APIs
            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0102A46D
            • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 0102A482
            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 0102A48F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: msctls_trackbar32
            • API String ID: 3850602802-1010561917
            • Opcode ID: 64bc8e161ae983aefe79c031bc8db981d60717d27598353bb7d7dbfa4a65494c
            • Instruction ID: 98f32a7810b57ef3bfdd573becca16bdcfe61580362aff2e9583f259a1359258
            • Opcode Fuzzy Hash: 64bc8e161ae983aefe79c031bc8db981d60717d27598353bb7d7dbfa4a65494c
            • Instruction Fuzzy Hash: 78110671240218FEEF215F65CC49FEB3BA9EFC9758F014218FA85A7091DA76E811CB24
            APIs
            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00FE2350,?), ref: 00FE22A1
            • GetProcAddress.KERNEL32(00000000), ref: 00FE22A8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: RoInitialize$combase.dll
            • API String ID: 2574300362-340411864
            • Opcode ID: 8697fe566eb14054611c4efdadae0548c1acfa65ed59609b1905f186a5ba18c3
            • Instruction ID: 94d3916beeff777c4d7d306b76278caf543f48c6e54ddc58891b93800cb1e6a3
            • Opcode Fuzzy Hash: 8697fe566eb14054611c4efdadae0548c1acfa65ed59609b1905f186a5ba18c3
            • Instruction Fuzzy Hash: 03E0EDB4A94300ABDF705FA19D89B193654BB10721F004424B2C1D618CDBBE4044DB04
            APIs
            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00FE2276), ref: 00FE2376
            • GetProcAddress.KERNEL32(00000000), ref: 00FE237D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: RoUninitialize$combase.dll
            • API String ID: 2574300362-2819208100
            • Opcode ID: 1a46ea3f8cfa6c5bee0d8ada19b9f68ccc7c2879a07df08a892bdecb9d3932d2
            • Instruction ID: 2ab74977481e75a82446e301c44581b1432fdcde40b5beb20f9c9efd9cfa0e6e
            • Opcode Fuzzy Hash: 1a46ea3f8cfa6c5bee0d8ada19b9f68ccc7c2879a07df08a892bdecb9d3932d2
            • Instruction Fuzzy Hash: B4E0BFB4A48700EFDB715FA1ED4DB093665B720722F100424F1C9E606CD7BE5414DB58
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: LocalTime__swprintf
            • String ID: %.3d$WIN_XPe
            • API String ID: 2070861257-2409531811
            • Opcode ID: 09c0dcd19bd9e14bc247f223e1c00cdfc67deb137d9271516ada5b65f0741f75
            • Instruction ID: b6da153c0bde824d5c784ffaa72cb1d18603f19e7bd57bf447e102d25ac82333
            • Opcode Fuzzy Hash: 09c0dcd19bd9e14bc247f223e1c00cdfc67deb137d9271516ada5b65f0741f75
            • Instruction Fuzzy Hash: 40E012B291461CDBCB109B91CE45DFD737CA744741F440092F9C6E3104D6399B95DB21
            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00FC42EC,?,00FC42AA,?), ref: 00FC4304
            • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00FC4316
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
            • API String ID: 2574300362-1355242751
            • Opcode ID: d22cf95af84167e66b3a1dcabf105b0d22b7c7ff8c20473fca5edec056e00ef6
            • Instruction ID: 834b08d950bde0ad917466319ef9c78cd9e796b11ec8b69e1c978f978f6de7c1
            • Opcode Fuzzy Hash: d22cf95af84167e66b3a1dcabf105b0d22b7c7ff8c20473fca5edec056e00ef6
            • Instruction Fuzzy Hash: C4D0A7B4D00B13BFD7305F61E95DB0276D8BB14311B00441DE8C1D2124D774D880EB10
            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll,?,010221FB,?,010223EF), ref: 01022213
            • GetProcAddress.KERNEL32(00000000,GetProcessId), ref: 01022225
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: GetProcessId$kernel32.dll
            • API String ID: 2574300362-399901964
            • Opcode ID: 67de5fef4af9d1510c684df70c59471cef1c39a2ac822c822421cca88f7cb415
            • Instruction ID: 99ef03961fd0aefbbdbf3f5281bd89648b921d9ef6dbdec4d00032101433ef7b
            • Opcode Fuzzy Hash: 67de5fef4af9d1510c684df70c59471cef1c39a2ac822c822421cca88f7cb415
            • Instruction Fuzzy Hash: ADD0A7B8900726FFD7315FB5F54860176D8EB05200B00445DECC1E2110E776D484C750
            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll,00FC41BB,00FC4341,?,00FC422F,?,00FC41BB,?,?,?,?,00FC39FE,?,00000001), ref: 00FC4359
            • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00FC436B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
            • API String ID: 2574300362-3689287502
            • Opcode ID: c9b890f85309fa5345832316962b72eaff7a6a03adf473c5fb4420041e179113
            • Instruction ID: 14a247c63a4777698a08d548cd32c383aaf96e2051e8712b0ebf43b34b275569
            • Opcode Fuzzy Hash: c9b890f85309fa5345832316962b72eaff7a6a03adf473c5fb4420041e179113
            • Instruction Fuzzy Hash: 56D0A7B4D00B53AFD7305F71E659B0276D8BB20725B00441DE8C1D2110D774E880E714
            APIs
            • LoadLibraryA.KERNEL32(oleaut32.dll,?,0100051D,?,010005FE), ref: 01000547
            • GetProcAddress.KERNEL32(00000000,RegisterTypeLibForUser), ref: 01000559
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: RegisterTypeLibForUser$oleaut32.dll
            • API String ID: 2574300362-1071820185
            • Opcode ID: 42b0942d20b7796293d6ec3c6f57947af6faf05331aac236d97972fffc3554c9
            • Instruction ID: 99e0abe1c4681ef6ca0d6d0319f635e4fc9821482ea9c40473908bccd98fc58d
            • Opcode Fuzzy Hash: 42b0942d20b7796293d6ec3c6f57947af6faf05331aac236d97972fffc3554c9
            • Instruction Fuzzy Hash: 9DD0A7F4900712AFE7319F75E44870276D4AB10302F50C46DF8C6D3158D676C480C710
            APIs
            • LoadLibraryA.KERNEL32(oleaut32.dll,00000000,0100052F,?,010006D7), ref: 01000572
            • GetProcAddress.KERNEL32(00000000,UnRegisterTypeLibForUser), ref: 01000584
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: UnRegisterTypeLibForUser$oleaut32.dll
            • API String ID: 2574300362-1587604923
            • Opcode ID: 78f537ad3e1f34a154ccc3db12f1d6cf427f9acf9c1b4caf0ecdf96fd15dc898
            • Instruction ID: 33ba8c9bf816f34dcf09a55ba5f9f69d9ee0865600bd049f108b7ff4f207d49e
            • Opcode Fuzzy Hash: 78f537ad3e1f34a154ccc3db12f1d6cf427f9acf9c1b4caf0ecdf96fd15dc898
            • Instruction Fuzzy Hash: 83D05EB4900312ABE7215F75E448B027BE4AB04211F10846DFCC1A2298DA75C0808720
            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll,?,0101ECBE,?,0101EBBB), ref: 0101ECD6
            • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0101ECE8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: GetSystemWow64DirectoryW$kernel32.dll
            • API String ID: 2574300362-1816364905
            • Opcode ID: 6cbd0822736192bf507241785911c9fd844dce4dae5fcb9ea346ad9f2b4de614
            • Instruction ID: 64097c861c6bcb3f643814282ab46fc7bfebdf9f1d2694711a9b3d0b15eb02bd
            • Opcode Fuzzy Hash: 6cbd0822736192bf507241785911c9fd844dce4dae5fcb9ea346ad9f2b4de614
            • Instruction Fuzzy Hash: 3ED0A7B4900723AFDB315FA5E9886067AE8AB01200B00845DFCC5D2115DF78D480DB10
            APIs
            • LoadLibraryA.KERNEL32(advapi32.dll,?,01023BD1,?,01023E06), ref: 01023BE9
            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 01023BFB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: RegDeleteKeyExW$advapi32.dll
            • API String ID: 2574300362-4033151799
            • Opcode ID: 734dec375fb0382c388c6b194d8ab99773b0cd96231ecb9c56436a923726572d
            • Instruction ID: ea333dca8253ea5a2788301eaeb4629287ee7ba63982e19f7c5c4326c9e31090
            • Opcode Fuzzy Hash: 734dec375fb0382c388c6b194d8ab99773b0cd96231ecb9c56436a923726572d
            • Instruction Fuzzy Hash: DCD05EB4A00766EBD7205BA6A548602BAE4AB08214B20845DE8C5D6210D7B8D0808F10
            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll,00000000,0101BAD3,00000001,0101B6EE,?,0105DC00), ref: 0101BAEB
            • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 0101BAFD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: GetModuleHandleExW$kernel32.dll
            • API String ID: 2574300362-199464113
            • Opcode ID: 122c15969c4dfac5fee401483665f1e74573d2655d95e07ad573cec21d31a4e4
            • Instruction ID: c1199dce16e5d390d4b9591e1bd2356e76d9d9a019990fd6a37719b8e6404ebb
            • Opcode Fuzzy Hash: 122c15969c4dfac5fee401483665f1e74573d2655d95e07ad573cec21d31a4e4
            • Instruction Fuzzy Hash: 16D05EB4D00712AFD7316F65A888A1276F8BB00200B10445DB8C3D2518D7B8C480C754
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b739a794a5133737c2ed8292e6ed2f52abbb355f7bedf7c66a7a129d340f31a4
            • Instruction ID: d5ec67655283b4a6c528b14e8c535af746f0206a779a98a9d1760f2f5b881541
            • Opcode Fuzzy Hash: b739a794a5133737c2ed8292e6ed2f52abbb355f7bedf7c66a7a129d340f31a4
            • Instruction Fuzzy Hash: BBC14D75A0421AEFCB14DF94C884BBEB7B5FF48710F104599EA059B2A1D7B0DE41EBA0
            APIs
            • CoInitialize.OLE32(00000000), ref: 0101AAB4
            • CoUninitialize.OLE32 ref: 0101AABF
              • Part of subcall function 01000213: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0100027B
            • VariantInit.OLEAUT32(?), ref: 0101AACA
            • VariantClear.OLEAUT32(?), ref: 0101AD9D
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
            • String ID:
            • API String ID: 780911581-0
            • Opcode ID: b574669192c307078be5c214f42dbfd45ae64e9bb50961ca0daceb432fc4a5fd
            • Instruction ID: 52e416b0e7fe81fbc6c17e753ed50584a7c4cb1f9fae38d4909876a7bae48101
            • Opcode Fuzzy Hash: b574669192c307078be5c214f42dbfd45ae64e9bb50961ca0daceb432fc4a5fd
            • Instruction Fuzzy Hash: 8AA14775204742DFDB11EF18C985B5AB7E5BF98310F044449FA9A9B3A2CB38ED04CB81
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Variant$AllocClearCopyInitString
            • String ID:
            • API String ID: 2808897238-0
            • Opcode ID: d956472d865fbe71cec800ca5f9e7c2bdde77505655f8dd12250b7ef030bb2bf
            • Instruction ID: 75c0d7251fcd93ef0d7d99b1740d2ae870a89f2f8235818b6b06c0017556c1b5
            • Opcode Fuzzy Hash: d956472d865fbe71cec800ca5f9e7c2bdde77505655f8dd12250b7ef030bb2bf
            • Instruction Fuzzy Hash: 2251B835A0830A9BDB24AF65D891B7EB3EDEF55314F20881FE646C72F1DBB49840A701
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: _memset$__filbuf__getptd_noexit_memcpy_s
            • String ID:
            • API String ID: 3877424927-0
            • Opcode ID: 065ad613f1183b824f05baa70d3d15c8958660488bca00daffb81e2f860a9d07
            • Instruction ID: c6c3baea0992fd2670a17c7c947e4d9a91dad3e3bf2b36be970a7d62c717fdbd
            • Opcode Fuzzy Hash: 065ad613f1183b824f05baa70d3d15c8958660488bca00daffb81e2f860a9d07
            • Instruction Fuzzy Hash: 8B5194B1E04285ABDB249F7B8C8DA6E77B5AF40330F248729F825972D0D7759F50AB40
            APIs
            • GetWindowRect.USER32(018C5600,?), ref: 0102C544
            • ScreenToClient.USER32(?,00000002), ref: 0102C574
            • MoveWindow.USER32(00000002,?,?,?,000000FF,00000001,?,00000002,?,?,?,00000002,?,?), ref: 0102C5DA
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Window$ClientMoveRectScreen
            • String ID:
            • API String ID: 3880355969-0
            • Opcode ID: c88e9b48f05264e9bd119d63dd28e27ea1fea82538fd07c7dd842a7ac6e96791
            • Instruction ID: b42330f552f14d4fdbeec51595d5d98f5bedf8b9dd71783da17a191ea71de09b
            • Opcode Fuzzy Hash: c88e9b48f05264e9bd119d63dd28e27ea1fea82538fd07c7dd842a7ac6e96791
            • Instruction Fuzzy Hash: 2F519275900225EFDF21DF68C984AAE7BF6FF48324F108299F99597281D734E981CB90
            APIs
            • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00FFC462
            • __itow.LIBCMT ref: 00FFC49C
              • Part of subcall function 00FFC6E8: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00FFC753
            • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00FFC505
            • __itow.LIBCMT ref: 00FFC55A
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageSend$__itow
            • String ID:
            • API String ID: 3379773720-0
            • Opcode ID: 29fad5512b53aea832da2e42872157337787e2384c170e173809bf5fbb454ebc
            • Instruction ID: 5d682a43fd8901b375cf2960f593eafc9ecf971ead5c50d2d4b1f0b007651008
            • Opcode Fuzzy Hash: 29fad5512b53aea832da2e42872157337787e2384c170e173809bf5fbb454ebc
            • Instruction Fuzzy Hash: AF41F671A0021D6BDF21EF54CE46FFE7BB5AF48710F040019F605A7191DB74AA499B91
            APIs
            • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 01003966
            • SetKeyboardState.USER32(00000080,?,00000001), ref: 01003982
            • PostMessageW.USER32(00000000,00000102,?,00000001), ref: 010039EF
            • SendInput.USER32(00000001,?,0000001C,00000000,?,00000001), ref: 01003A4D
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: KeyboardState$InputMessagePostSend
            • String ID:
            • API String ID: 432972143-0
            • Opcode ID: 9be1d159700bfcd5a6d0bc96a027f27c745128b9637a02e71b7af1fc5d816d44
            • Instruction ID: 0d08324b6754f3b4d3b4217005642e5351951bd4fc50542dad24784aac53d4c7
            • Opcode Fuzzy Hash: 9be1d159700bfcd5a6d0bc96a027f27c745128b9637a02e71b7af1fc5d816d44
            • Instruction Fuzzy Hash: E7412770E44248AEFF738B688849BFDBBF5BB55310F04019AE5C19A2C1CB758985C765
            APIs
            • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0100E742
            • GetLastError.KERNEL32(?,00000000), ref: 0100E768
            • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0100E78D
            • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0100E7B9
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CreateHardLink$DeleteErrorFileLast
            • String ID:
            • API String ID: 3321077145-0
            • Opcode ID: a14f331826e95a7b9ade4651c5f63be89f66d77a96a225228a357963a2c6a055
            • Instruction ID: a15b3c1f6ea701de3b53073ad9f55ea2a4ba849be6f294895108e7d7435d6d18
            • Opcode Fuzzy Hash: a14f331826e95a7b9ade4651c5f63be89f66d77a96a225228a357963a2c6a055
            • Instruction Fuzzy Hash: 60418E39200611DFDF11EF14C945A4DBBE5BF99720F088489E956AB3A2CB79FC00DB81
            APIs
            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0102B5D1
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: InvalidateRect
            • String ID:
            • API String ID: 634782764-0
            • Opcode ID: 74fa9321e2f3da09e98fb0a75c9cc1024fd28f2e95da981ed9bb1e724aa9afed
            • Instruction ID: 467116edf8b220346cb52d0cf6fbfa0fc44c1ea2595b407476b790738d55b14e
            • Opcode Fuzzy Hash: 74fa9321e2f3da09e98fb0a75c9cc1024fd28f2e95da981ed9bb1e724aa9afed
            • Instruction Fuzzy Hash: F931EE74600238BFEF709E5CCC88FAC7BA5EB0A314F944542FBD1DA2E1CA39A5408B51
            APIs
            • ClientToScreen.USER32(?,?), ref: 0102D807
            • GetWindowRect.USER32(?,?), ref: 0102D87D
            • PtInRect.USER32(?,?,0102ED5A), ref: 0102D88D
            • MessageBeep.USER32(00000000), ref: 0102D8FE
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Rect$BeepClientMessageScreenWindow
            • String ID:
            • API String ID: 1352109105-0
            • Opcode ID: 5402cd427a3ffbb914c508541a48a248cf9f949d6390aedc04f96166e6b8cf32
            • Instruction ID: 56ecee51e6e03025775fba978ec6ac7eda1ae3805203b7491dae8f6222e329ad
            • Opcode Fuzzy Hash: 5402cd427a3ffbb914c508541a48a248cf9f949d6390aedc04f96166e6b8cf32
            • Instruction Fuzzy Hash: 8D41DD74A00229DFDB22CF98C480BADBBF5FF48314F1881AAE5C89B245C771E841CB50
            APIs
            • GetKeyboardState.USER32(?,75A4C0D0,?,00008000), ref: 01003AB8
            • SetKeyboardState.USER32(00000080,?,00008000), ref: 01003AD4
            • PostMessageW.USER32(00000000,00000101,00000000,?), ref: 01003B34
            • SendInput.USER32(00000001,?,0000001C,75A4C0D0,?,00008000), ref: 01003B92
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: KeyboardState$InputMessagePostSend
            • String ID:
            • API String ID: 432972143-0
            • Opcode ID: c88793647506bd3c2fe47539dfa94360f38f6aae3257d83f83b819c86e87e989
            • Instruction ID: 9679d8b584f2b67c1ed38ad7df1b510261982a5b38200f9f296ad9a10cc6e2e4
            • Opcode Fuzzy Hash: c88793647506bd3c2fe47539dfa94360f38f6aae3257d83f83b819c86e87e989
            • Instruction Fuzzy Hash: 88312870A40A58AEFF339BA888187FE7FE5BB55318F04019AE6C19B1C1C7758A45C761
            APIs
            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00FF4038
            • __isleadbyte_l.LIBCMT ref: 00FF4066
            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 00FF4094
            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 00FF40CA
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
            • String ID:
            • API String ID: 3058430110-0
            • Opcode ID: 37bdf70b51d776135806ac75f57b9ba5f7e47c487c3fefcf54d1c280db03383c
            • Instruction ID: 704f0ea9f96570a7bfc5db01c1ad10a23aa292c5a436286f32aed897621cfe11
            • Opcode Fuzzy Hash: 37bdf70b51d776135806ac75f57b9ba5f7e47c487c3fefcf54d1c280db03383c
            • Instruction Fuzzy Hash: EC31B231A0024AAFDB219F75C844B7B7BB5FF40320F154429EB65871B1EB31E890E790
            APIs
            • GetForegroundWindow.USER32 ref: 01027CB9
              • Part of subcall function 01005F55: GetWindowThreadProcessId.USER32(?,00000000), ref: 01005F6F
              • Part of subcall function 01005F55: GetCurrentThreadId.KERNEL32 ref: 01005F76
              • Part of subcall function 01005F55: AttachThreadInput.USER32(00000000,?,0100781F), ref: 01005F7D
            • GetCaretPos.USER32(?), ref: 01027CCA
            • ClientToScreen.USER32(00000000,?), ref: 01027D03
            • GetForegroundWindow.USER32 ref: 01027D09
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
            • String ID:
            • API String ID: 2759813231-0
            • Opcode ID: 6129965c128d74c5c6bae01dfa1933d27b2b5cdcc8ad1df4d64cfb6bb03599a9
            • Instruction ID: 5c5bf10e4b22573bf4a9e238557102c855f360505d316b26adc49ee4af1dac80
            • Opcode Fuzzy Hash: 6129965c128d74c5c6bae01dfa1933d27b2b5cdcc8ad1df4d64cfb6bb03599a9
            • Instruction Fuzzy Hash: E3314F72900108AFDB11EFA9CC859EFBBF9EF64310B10806AE855E3211DB359E01DFA1
            APIs
              • Part of subcall function 00FDB34E: GetWindowLongW.USER32(?,000000EB), ref: 00FDB35F
            • GetCursorPos.USER32(?), ref: 0102F211
            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0103E4C0,?,?,?,?,?), ref: 0102F226
            • GetCursorPos.USER32(?), ref: 0102F270
            • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0103E4C0,?,?,?), ref: 0102F2A6
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Cursor$LongMenuPopupProcTrackWindow
            • String ID:
            • API String ID: 2864067406-0
            • Opcode ID: f277af8b877ac95f2ec0b4e6fa1a3c75ba4bbddb2f0155d9a31aae69cccccc5f
            • Instruction ID: fd5471bdd366c8015a07231266deb1cfddbdfff48aa0a8c968cde05971c3a510
            • Opcode Fuzzy Hash: f277af8b877ac95f2ec0b4e6fa1a3c75ba4bbddb2f0155d9a31aae69cccccc5f
            • Instruction Fuzzy Hash: 5B21E139600028EFDB258F98C888EEE7FB5EF0B350F184099FA8547295D3759951DB90
            APIs
            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 01014358
              • Part of subcall function 010143E2: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 01014401
              • Part of subcall function 010143E2: InternetCloseHandle.WININET(00000000), ref: 0101449E
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Internet$CloseConnectHandleOpen
            • String ID:
            • API String ID: 1463438336-0
            • Opcode ID: 34553ef962fb30ba9bc7ac49cb2633840a73aa6500fc54bf2f08836757130291
            • Instruction ID: 3465789f9d1dcb6d07b9b448ec19dd2b0addc85c19734ea74283efa72b11f57f
            • Opcode Fuzzy Hash: 34553ef962fb30ba9bc7ac49cb2633840a73aa6500fc54bf2f08836757130291
            • Instruction Fuzzy Hash: B121F675200601BFEB129FA4DC40FBBBBE9FF54710F00801AFA95D6564E779D4219B90
            APIs
            • GetWindowLongW.USER32(?,000000EC), ref: 01028AA6
            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 01028AC0
            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 01028ACE
            • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 01028ADC
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Window$Long$AttributesLayered
            • String ID:
            • API String ID: 2169480361-0
            • Opcode ID: c8ce1875cf2a50b92b778ad1dad8835a6dc54fb1cd913ba18b2bea5f4894ca1c
            • Instruction ID: 67b41edf6a7841bc35ab83ff0b575ce26dce11de86b0ab13ae7416e3e4bdcea7
            • Opcode Fuzzy Hash: c8ce1875cf2a50b92b778ad1dad8835a6dc54fb1cd913ba18b2bea5f4894ca1c
            • Instruction Fuzzy Hash: B011D035305121AFE754AB18CD45FBE77D9EF95320F18811AF956C72D1CF69AC008794
            APIs
            • select.WSOCK32(00000000,00000001,00000000,00000000,?), ref: 01018AE0
            • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 01018AF2
            • accept.WSOCK32(00000000,00000000,00000000), ref: 01018AFF
            • WSAGetLastError.WSOCK32(00000000), ref: 01018B16
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ErrorLastacceptselect
            • String ID:
            • API String ID: 385091864-0
            • Opcode ID: cae44f2c98e01c6d527e8252ab6bccbe810d148edf0220ed480867d4b7b7906b
            • Instruction ID: 6ff866f865e23083d81e11c52d09f965be13793238d87fa5cb44ff15a49d3a55
            • Opcode Fuzzy Hash: cae44f2c98e01c6d527e8252ab6bccbe810d148edf0220ed480867d4b7b7906b
            • Instruction Fuzzy Hash: 18219676A001249FD721DF68DD84A9E7BECFF59310F0481AAF849D7280DB789A418F90
            APIs
              • Part of subcall function 01001E68: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,01000ABB,?,?,?,0100187A,00000000,000000EF,00000119,?,?), ref: 01001E77
              • Part of subcall function 01001E68: lstrcpyW.KERNEL32(00000000,?,?,01000ABB,?,?,?,0100187A,00000000,000000EF,00000119,?,?,00000000), ref: 01001E9D
              • Part of subcall function 01001E68: lstrcmpiW.KERNEL32(00000000,?,01000ABB,?,?,?,0100187A,00000000,000000EF,00000119,?,?), ref: 01001ECE
            • lstrlenW.KERNEL32(?,00000002,?,?,?,?,0100187A,00000000,000000EF,00000119,?,?,00000000), ref: 01000AD4
            • lstrcpyW.KERNEL32(00000000,?,?,0100187A,00000000,000000EF,00000119,?,?,00000000), ref: 01000AFA
            • lstrcmpiW.KERNEL32(00000002,cdecl,?,0100187A,00000000,000000EF,00000119,?,?,00000000), ref: 01000B2E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: lstrcmpilstrcpylstrlen
            • String ID: cdecl
            • API String ID: 4031866154-3896280584
            • Opcode ID: 2d80512f73bc55eec454f000be9e201671ecbe5f316d4925231519a1021fa371
            • Instruction ID: 1bfcff87288541f17877d89577624d4bbeea63ea91603ec3005d031ca4b03f7e
            • Opcode Fuzzy Hash: 2d80512f73bc55eec454f000be9e201671ecbe5f316d4925231519a1021fa371
            • Instruction Fuzzy Hash: A111D63A200305AFEB26AF68DC45E7A77A9FF45350F80406AF946CB294EB71D850C7A0
            APIs
            • _free.LIBCMT ref: 00FF2FB5
              • Part of subcall function 00FE395C: __FF_MSGBANNER.LIBCMT ref: 00FE3973
              • Part of subcall function 00FE395C: __NMSG_WRITE.LIBCMT ref: 00FE397A
              • Part of subcall function 00FE395C: RtlAllocateHeap.NTDLL(018A0000,00000000,00000001,00000001,00000000,?,?,00FDF507,?,0000000E), ref: 00FE399F
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: AllocateHeap_free
            • String ID:
            • API String ID: 614378929-0
            • Opcode ID: 6f0b334ad4339d9678038a29c525455846e5fd6a57e1de738d47c861c732c282
            • Instruction ID: 7e8767b05585f7a41b13a5fe25fc46651c14816ae34bd6a84b174654510dfc9b
            • Opcode Fuzzy Hash: 6f0b334ad4339d9678038a29c525455846e5fd6a57e1de738d47c861c732c282
            • Instruction Fuzzy Hash: 79110D7290835AABCB313BB5AC4467D3B98AF10374F304515FA89D62A5DF39C940B790
            APIs
            • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 010005AC
            • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 010005C7
            • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 010005DD
            • FreeLibrary.KERNEL32(?), ref: 01000632
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Type$FileFreeLibraryLoadModuleNameRegister
            • String ID:
            • API String ID: 3137044355-0
            • Opcode ID: 1b58e990c0c52f8f4d1b116f47460b75063f625384bc4e7f0b223a02277f90ec
            • Instruction ID: 5417970acf33821e6a88ddb52ba372e437ec399663c6c87251023f994174bda1
            • Opcode Fuzzy Hash: 1b58e990c0c52f8f4d1b116f47460b75063f625384bc4e7f0b223a02277f90ec
            • Instruction Fuzzy Hash: 3221D271940209EFEB228FD4DC88BDABBB9EF44380F108469F68692184DB75E604CF51
            APIs
              • Part of subcall function 00FFAA62: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00FFAA79
              • Part of subcall function 00FFAA62: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00FFAA83
              • Part of subcall function 00FFAA62: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00FFAA92
              • Part of subcall function 00FFAA62: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00FFAA99
              • Part of subcall function 00FFAA62: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00FFAAAF
            • GetLengthSid.ADVAPI32(?,00000000,00FFADE4,?,?), ref: 00FFB21B
            • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00FFB227
            • HeapAlloc.KERNEL32(00000000), ref: 00FFB22E
            • CopySid.ADVAPI32(?,00000000,?), ref: 00FFB247
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Heap$AllocInformationProcessToken$CopyErrorLastLength
            • String ID:
            • API String ID: 4217664535-0
            • Opcode ID: f9ebbee3138918eb49987ffcae203f2db759e64523c4e9cb16a55f0f489429b6
            • Instruction ID: 3e2886ecd5dfbfe581ba01328bb9685d6efd40de96a3c184689f0b6b8e9afbe3
            • Opcode Fuzzy Hash: f9ebbee3138918eb49987ffcae203f2db759e64523c4e9cb16a55f0f489429b6
            • Instruction Fuzzy Hash: 8711E3B5A00209FFCB159F94DD84ABEB7B9EF84314B14802DEA82D7220D735EE44EB10
            APIs
            • SendMessageW.USER32(?,000000B0,?,?), ref: 00FFB498
            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00FFB4AA
            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00FFB4C0
            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00FFB4DB
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageSend
            • String ID:
            • API String ID: 3850602802-0
            • Opcode ID: 463bee56a85f4f21a3519a1709745eff2e92ee0a1a14e54c21da40d574653811
            • Instruction ID: fc0d2169c16de462dd0d70545eb9a8ecc570e5b7175c83204b7a6393c008b491
            • Opcode Fuzzy Hash: 463bee56a85f4f21a3519a1709745eff2e92ee0a1a14e54c21da40d574653811
            • Instruction Fuzzy Hash: 8811187A900218FFDB11DFA9C985EADBBB4FF08710F204091E604B7295D771AE11EB94
            APIs
              • Part of subcall function 00FDB34E: GetWindowLongW.USER32(?,000000EB), ref: 00FDB35F
            • DefDlgProcW.USER32(?,00000020,?,00000000), ref: 00FDB5A5
            • GetClientRect.USER32(?,?), ref: 0103E69A
            • GetCursorPos.USER32(?), ref: 0103E6A4
            • ScreenToClient.USER32(?,?), ref: 0103E6AF
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Client$CursorLongProcRectScreenWindow
            • String ID:
            • API String ID: 4127811313-0
            • Opcode ID: 329d78b0a4e216060c297a84e68847d78e3351e93a2d4b133730ccadd64f8cdb
            • Instruction ID: 643a5e58e6ad05884bae51079997025061d23bb439d4cc6f58adb609ee8596b4
            • Opcode Fuzzy Hash: 329d78b0a4e216060c297a84e68847d78e3351e93a2d4b133730ccadd64f8cdb
            • Instruction Fuzzy Hash: 6F113A7550002AFFCF10DF98D9859EE77B9EF48304F150452E981E7244D738AA91DBA1
            APIs
            • GetCurrentThreadId.KERNEL32 ref: 01007352
            • MessageBoxW.USER32(?,?,?,?), ref: 01007385
            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0100739B
            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 010073A2
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
            • String ID:
            • API String ID: 2880819207-0
            • Opcode ID: c4f9cb39803531dccbddeac6e3e8a2df7551ade22d01c160ab95e599ec624351
            • Instruction ID: 908dcd276d5293924c4b3f38db5241d17f157258ccfa4a1a4fd26583360f76e8
            • Opcode Fuzzy Hash: c4f9cb39803531dccbddeac6e3e8a2df7551ade22d01c160ab95e599ec624351
            • Instruction Fuzzy Hash: 5C1148B6A04204BFE7228BACDC46A9E7FEDAB44310F004355F9E0D3285D779D90087A0
            APIs
            • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00FDD1BA
            • GetStockObject.GDI32(00000011), ref: 00FDD1CE
            • SendMessageW.USER32(00000000,00000030,00000000), ref: 00FDD1D8
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CreateMessageObjectSendStockWindow
            • String ID:
            • API String ID: 3970641297-0
            • Opcode ID: 5d1917a3ac7a68843e6dc91914938e83f69d5189585a88949c557f66a96f1b55
            • Instruction ID: 642beb83b39a3042a23e30fd6d36b2a979d4f946a60c82a2a0ac6f49957cc13c
            • Opcode Fuzzy Hash: 5d1917a3ac7a68843e6dc91914938e83f69d5189585a88949c557f66a96f1b55
            • Instruction Fuzzy Hash: 1B11C4B2501549BFEF224F90DC50EEA7B6EFF18368F080112FA5452154D736DC60EBA0
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
            • String ID:
            • API String ID: 3016257755-0
            • Opcode ID: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
            • Instruction ID: e1c8fe78cbde72a209c722a5b98d473b6b2a0628e57d3bc7bd8669898fb0592b
            • Opcode Fuzzy Hash: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
            • Instruction Fuzzy Hash: 1201363644014EBBCF125F88DC518EE3F62BF18764B588455FB2899031D336EAB2BB85
            APIs
              • Part of subcall function 00FE7A0D: __getptd_noexit.LIBCMT ref: 00FE7A0E
            • __lock.LIBCMT ref: 00FE748F
            • InterlockedDecrement.KERNEL32(?), ref: 00FE74AC
            • _free.LIBCMT ref: 00FE74BF
            • InterlockedIncrement.KERNEL32(018B2AD0), ref: 00FE74D7
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Interlocked$DecrementIncrement__getptd_noexit__lock_free
            • String ID:
            • API String ID: 2704283638-0
            • Opcode ID: ed5cbc88b84805f22b9187471667fd62532bb32ac0b1555bb050473023f0ae25
            • Instruction ID: e4e43efe701d4261a41f9040011d0cca9a588d6f84c70ac4dafca1d617b03d39
            • Opcode Fuzzy Hash: ed5cbc88b84805f22b9187471667fd62532bb32ac0b1555bb050473023f0ae25
            • Instruction Fuzzy Hash: 87018E32E09795D7E622FF66990575EBB60BB04B20F148009F854A76C0C7786901EBD1
            APIs
            • __lock.LIBCMT ref: 00FE7AD8
              • Part of subcall function 00FE7CF4: __mtinitlocknum.LIBCMT ref: 00FE7D06
              • Part of subcall function 00FE7CF4: EnterCriticalSection.KERNEL32(00000000,?,00FE7ADD,0000000D), ref: 00FE7D1F
            • InterlockedIncrement.KERNEL32(?), ref: 00FE7AE5
            • __lock.LIBCMT ref: 00FE7AF9
            • ___addlocaleref.LIBCMT ref: 00FE7B17
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: __lock$CriticalEnterIncrementInterlockedSection___addlocaleref__mtinitlocknum
            • String ID:
            • API String ID: 1687444384-0
            • Opcode ID: c23eba35b234cf6afacd5587d5a8ebd8c1a428664fc1fa2e7bce35c265f701f3
            • Instruction ID: f15acf54fefdcafb52b58865aa81d34757ae77339a4091b9dcaf529db279f88b
            • Opcode Fuzzy Hash: c23eba35b234cf6afacd5587d5a8ebd8c1a428664fc1fa2e7bce35c265f701f3
            • Instruction Fuzzy Hash: 70016D71904B44EFD730EF7AC90574AB7F0AF50325F20890EA4DAD7291CB78A680DB05
            APIs
            • _memset.LIBCMT ref: 0102E33D
            • _memset.LIBCMT ref: 0102E34C
            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,01083D00,01083D44), ref: 0102E37B
            • CloseHandle.KERNEL32 ref: 0102E38D
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: _memset$CloseCreateHandleProcess
            • String ID:
            • API String ID: 3277943733-0
            • Opcode ID: 7f53b4caca244cc92c3cae58c4a5e1556e70d21c8b0c7eec40632415696689e4
            • Instruction ID: f2e7d4106d8682cf7ff238e7e7b9edbe47b3ef56be02c104d88fb24885fd6bd5
            • Opcode Fuzzy Hash: 7f53b4caca244cc92c3cae58c4a5e1556e70d21c8b0c7eec40632415696689e4
            • Instruction Fuzzy Hash: 8AF03AF1544314BAE2203AA5BC45F7B7E6CEB44A54F004421FEC8DA186D6BA980097A8
            APIs
              • Part of subcall function 00FDAF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 00FDAFE3
              • Part of subcall function 00FDAF83: SelectObject.GDI32(?,00000000), ref: 00FDAFF2
              • Part of subcall function 00FDAF83: BeginPath.GDI32(?), ref: 00FDB009
              • Part of subcall function 00FDAF83: SelectObject.GDI32(?,00000000), ref: 00FDB033
            • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0102EA8E
            • LineTo.GDI32(00000000,?,?), ref: 0102EA9B
            • EndPath.GDI32(00000000), ref: 0102EAAB
            • StrokePath.GDI32(00000000), ref: 0102EAB9
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
            • String ID:
            • API String ID: 1539411459-0
            • Opcode ID: bbc273ae27d27e050b4a857a2d8bfec123170ec31b0e3d28d7f8262449c07575
            • Instruction ID: 8d9cb6d2448cef64117dedd10df1d33fa191317a936ad282f0393883816c6f82
            • Opcode Fuzzy Hash: bbc273ae27d27e050b4a857a2d8bfec123170ec31b0e3d28d7f8262449c07575
            • Instruction Fuzzy Hash: 8DF0B435045154BBDB229F94AD09FCE3F556F15310F144141FA81610D1837E5122DB95
            APIs
            • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00FFC84A
            • GetWindowThreadProcessId.USER32(?,00000000), ref: 00FFC85D
            • GetCurrentThreadId.KERNEL32 ref: 00FFC864
            • AttachThreadInput.USER32(00000000), ref: 00FFC86B
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
            • String ID:
            • API String ID: 2710830443-0
            • Opcode ID: 15ca06bc1e0867d9f3bf83848bf7c62b031db61516ad3d88ca84d577df4c716c
            • Instruction ID: 1d9dddfddc07e87e63f16e84446b3e6a475a994fedb989efdabcddbd79dda902
            • Opcode Fuzzy Hash: 15ca06bc1e0867d9f3bf83848bf7c62b031db61516ad3d88ca84d577df4c716c
            • Instruction Fuzzy Hash: F3E030B554122C77DB201AA29D4DEDB7F1CEF157B1F008411B64D84450C6768580D7E0
            APIs
            • GetCurrentThread.KERNEL32 ref: 00FFB0D6
            • OpenThreadToken.ADVAPI32(00000000,?,?,?,00FFAC9D), ref: 00FFB0DD
            • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00FFAC9D), ref: 00FFB0EA
            • OpenProcessToken.ADVAPI32(00000000,?,?,?,00FFAC9D), ref: 00FFB0F1
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CurrentOpenProcessThreadToken
            • String ID:
            • API String ID: 3974789173-0
            • Opcode ID: cd45591314ca552ab28f9e7810ca5875c4558c9c9e2b4708e22316198ab61324
            • Instruction ID: c34859a48583eedb1cd8290af323a08aa40808c2afc675c993e823652f8cd331
            • Opcode Fuzzy Hash: cd45591314ca552ab28f9e7810ca5875c4558c9c9e2b4708e22316198ab61324
            • Instruction Fuzzy Hash: B2E04FB6B01211ABD7301FF19E4CB573BA8EF657A6F018818B781D6044DA2984018760
            APIs
            • GetSysColor.USER32(00000008), ref: 00FDB496
            • SetTextColor.GDI32(?,000000FF), ref: 00FDB4A0
            • SetBkMode.GDI32(?,00000001), ref: 00FDB4B5
            • GetStockObject.GDI32(00000005), ref: 00FDB4BD
            • GetWindowDC.USER32(?,00000000), ref: 0103DE2B
            • GetPixel.GDI32(00000000,00000000,00000000), ref: 0103DE38
            • GetPixel.GDI32(00000000,?,00000000), ref: 0103DE51
            • GetPixel.GDI32(00000000,00000000,?), ref: 0103DE6A
            • GetPixel.GDI32(00000000,?,?), ref: 0103DE8A
            • ReleaseDC.USER32(?,00000000), ref: 0103DE95
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
            • String ID:
            • API String ID: 1946975507-0
            • Opcode ID: 9b7a1868247b90326e7434b4ab58d73b71dcdcd3d14f75fcb858f3bc26d11d8f
            • Instruction ID: 3aa983d790adb34c989665448f409a02ed65a8219e1e74f9279200b52b3b49e1
            • Opcode Fuzzy Hash: 9b7a1868247b90326e7434b4ab58d73b71dcdcd3d14f75fcb858f3bc26d11d8f
            • Instruction Fuzzy Hash: 2FE06D75100280BBEB326FE8A84DBD83F11AB62335F04C266FBEA580E6C7764580DB11
            APIs
            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00FFB2DF
            • UnloadUserProfile.USERENV(?,?), ref: 00FFB2EB
            • CloseHandle.KERNEL32(?), ref: 00FFB2F4
            • CloseHandle.KERNEL32(?), ref: 00FFB2FC
              • Part of subcall function 00FFAB24: GetProcessHeap.KERNEL32(00000000,?,00FFA848), ref: 00FFAB2B
              • Part of subcall function 00FFAB24: HeapFree.KERNEL32(00000000), ref: 00FFAB32
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
            • String ID:
            • API String ID: 146765662-0
            • Opcode ID: ac9699bf27bf1a3903ce6a3d85186ef8834cee9cf87d561c18a04fc1a2ddd929
            • Instruction ID: 34f0b6686550e2011f451aea9b9d4cb4fad02bbf1b0628fbe8123eced42d93d6
            • Opcode Fuzzy Hash: ac9699bf27bf1a3903ce6a3d85186ef8834cee9cf87d561c18a04fc1a2ddd929
            • Instruction Fuzzy Hash: A7E0BF7A104005BBCB126BD5DD48859FBA6FFA87213108221F65581579CB3B9471EB50
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CapsDesktopDeviceReleaseWindow
            • String ID:
            • API String ID: 2889604237-0
            • Opcode ID: 316918434503ce00c07c789a4d63c26c3fe6175f855422eb61093187afb54eba
            • Instruction ID: 0aa29ba77ab8fed75087b23833ef15106a1e8ec9d429766e3978fb8b15aa46d6
            • Opcode Fuzzy Hash: 316918434503ce00c07c789a4d63c26c3fe6175f855422eb61093187afb54eba
            • Instruction Fuzzy Hash: D3E04FF9100204EFDB115FB0C98862D7BA9EF5C354F15C806FC9A87300CB7A98409B40
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CapsDesktopDeviceReleaseWindow
            • String ID:
            • API String ID: 2889604237-0
            • Opcode ID: 73e6943697c0d246bcd151c1fe30872c320e6e105f058416780af8e7e04ab524
            • Instruction ID: 5e66b3a72ed00693b4bf85a88c01d7fd68573b5a92181970db62ccc72c1beb7b
            • Opcode Fuzzy Hash: 73e6943697c0d246bcd151c1fe30872c320e6e105f058416780af8e7e04ab524
            • Instruction Fuzzy Hash: 6DE04FF9500200EFDB115FB0C98862D7BA5EB5C350B158406F99A87300CB7E98009B40
            APIs
            • OleSetContainedObject.OLE32(?,00000001), ref: 00FFDEAA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ContainedObject
            • String ID: AutoIt3GUI$Container
            • API String ID: 3565006973-3941886329
            • Opcode ID: dadad5c35ab86404762327f6e4928138619ed2c539bf101e88a6d3c9965cadc8
            • Instruction ID: ef0c1d4a0863e582fbb6047b4800d44b8d4a3f6be43fc7c1b5cbda3881032107
            • Opcode Fuzzy Hash: dadad5c35ab86404762327f6e4928138619ed2c539bf101e88a6d3c9965cadc8
            • Instruction Fuzzy Hash: 71913774600609AFDB14DF64C884F6AB7BABF49710F10856EF94ACF2A0DB71E841DB60
            APIs
            • Sleep.KERNEL32(00000000), ref: 00FDBCDA
            • GlobalMemoryStatusEx.KERNEL32 ref: 00FDBCF3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: GlobalMemorySleepStatus
            • String ID: @
            • API String ID: 2783356886-2766056989
            • Opcode ID: f1acaa31280e791976472a356d1f2dcc0d3126dc9e2c2ffd0529828af142d154
            • Instruction ID: e64f603e97f82b450f752948c51fc2140b390920f4eaeb450cd88ca619016774
            • Opcode Fuzzy Hash: f1acaa31280e791976472a356d1f2dcc0d3126dc9e2c2ffd0529828af142d154
            • Instruction Fuzzy Hash: 5E5179714087449BE360AF10DC85BAFBBECFFA4354F41484EF1C8422A6DF7588A89792
            APIs
              • Part of subcall function 00FC44ED: __fread_nolock.LIBCMT ref: 00FC450B
            • _wcscmp.LIBCMT ref: 0100C65D
            • _wcscmp.LIBCMT ref: 0100C670
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: _wcscmp$__fread_nolock
            • String ID: FILE
            • API String ID: 4029003684-3121273764
            • Opcode ID: 28a594201326c812f8a996c004632d9346b378bd74434e6cad72fc8b4ee79a23
            • Instruction ID: ae9cead236d0cfe854ba21bd2bf397bd23920f66bb5244bc079b0733b9f746fc
            • Opcode Fuzzy Hash: 28a594201326c812f8a996c004632d9346b378bd74434e6cad72fc8b4ee79a23
            • Instruction Fuzzy Hash: E641F876A0020ABBEF21DAA4CC42FEF77B9AF49700F000469FA41EB181D675AA04DB51
            APIs
            • SendMessageW.USER32(?,00001132,00000000,?), ref: 0102A85A
            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0102A86F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: '
            • API String ID: 3850602802-1997036262
            • Opcode ID: 9780e836df08b2aaf6bcb6da9a35b6c873a34a74944d26460f2c34e7d0e3e959
            • Instruction ID: 173bb33d9500b7785daf92e4abd5662fcb3033b47dc686bc632ba7be958528dd
            • Opcode Fuzzy Hash: 9780e836df08b2aaf6bcb6da9a35b6c873a34a74944d26460f2c34e7d0e3e959
            • Instruction Fuzzy Hash: 20410774B01219DFDB54CFA8C981BDA7BB9FF08304F1000AAEA45AB741DB75A942CF94
            APIs
            • _memset.LIBCMT ref: 01015190
            • InternetCrackUrlW.WININET(?,00000000,00000000,?), ref: 010151C6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: CrackInternet_memset
            • String ID: |
            • API String ID: 1413715105-2343686810
            • Opcode ID: 25788f228f0e7f697f9fabfc5a55d792f2739facdc015d90e6ed3e20095c11a0
            • Instruction ID: e95012605b517057835d55531d550f86780ca16f17dc43983f5012845a503c8a
            • Opcode Fuzzy Hash: 25788f228f0e7f697f9fabfc5a55d792f2739facdc015d90e6ed3e20095c11a0
            • Instruction Fuzzy Hash: 32311971800119ABCF11EFE4CD86EEE7FB9FF59700F000059F919A6166EA35A946DBA0
            APIs
            • DestroyWindow.USER32(?,?,?,?), ref: 0102980E
            • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0102984A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Window$DestroyMove
            • String ID: static
            • API String ID: 2139405536-2160076837
            • Opcode ID: ae2bb5dd9e0542eecb25ed04b10e9b63b30e51f1075c001f474135853da823c3
            • Instruction ID: 6999b1033ad1e331ea91f174f32ff2959bc82a9443b6fb3983ed6850a5f062fe
            • Opcode Fuzzy Hash: ae2bb5dd9e0542eecb25ed04b10e9b63b30e51f1075c001f474135853da823c3
            • Instruction Fuzzy Hash: 8B317C71100624AEEB219F78CC80BFB77A9FF58764F048619F9E9C7191CA75A882D760
            APIs
            • _memset.LIBCMT ref: 010051C6
            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 01005201
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: InfoItemMenu_memset
            • String ID: 0
            • API String ID: 2223754486-4108050209
            • Opcode ID: c6a250f9dfb0cae6ed082ad76e87fe0f61017a48d58684d5b5e77f700c26e95a
            • Instruction ID: 7a129682484d90c1b1d68f04c4d05eeee2e6cbca5b4c4daa31eefd18662d61e3
            • Opcode Fuzzy Hash: c6a250f9dfb0cae6ed082ad76e87fe0f61017a48d58684d5b5e77f700c26e95a
            • Instruction Fuzzy Hash: 7C31AE31A00204EBFB66CE9DDC45BAEBBF8AF46350F144459FAC1A61D0E7749644CF10
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: __snwprintf
            • String ID: , $$AUTOITCALLVARIABLE%d
            • API String ID: 2391506597-2584243854
            • Opcode ID: 86d3e32f4d26e13e2b324c9cbc9b7444ea1e9a3c4a9aad87cc0ef04a4afc69f1
            • Instruction ID: da40b060b313a4f3c20578e0954183fafc5b30398f81c793966f915a5edf63cb
            • Opcode Fuzzy Hash: 86d3e32f4d26e13e2b324c9cbc9b7444ea1e9a3c4a9aad87cc0ef04a4afc69f1
            • Instruction Fuzzy Hash: F2219A31A00219AACF10EFA4DD82FAE77B4AF48700F04046DF545AF146DB78E945EBA5
            APIs
            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0102945C
            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 01029467
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: Combobox
            • API String ID: 3850602802-2096851135
            • Opcode ID: 604d849af66b59c0cdc923b3069890c2cfebc157ed7c00224a179ac5408af66a
            • Instruction ID: 4d79ef4cd4032d3d986731ab590593c9fd47691a8f35305eebfc16f992864012
            • Opcode Fuzzy Hash: 604d849af66b59c0cdc923b3069890c2cfebc157ed7c00224a179ac5408af66a
            • Instruction Fuzzy Hash: C011B6713001287FEF269E58DC80EFB37AEEB483A8F104125F99997291D6359C518760
            APIs
              • Part of subcall function 00FDD17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00FDD1BA
              • Part of subcall function 00FDD17C: GetStockObject.GDI32(00000011), ref: 00FDD1CE
              • Part of subcall function 00FDD17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 00FDD1D8
            • GetWindowRect.USER32(00000000,?), ref: 01029968
            • GetSysColor.USER32(00000012), ref: 01029982
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Window$ColorCreateMessageObjectRectSendStock
            • String ID: static
            • API String ID: 1983116058-2160076837
            • Opcode ID: f19ff47813f754346be70729c4625f48e7310cdb53052033d8792ac0671b93f5
            • Instruction ID: d9416fae6485cfa79ecbd6436988551fa8320502ae973ed99c6c7df2a91bd975
            • Opcode Fuzzy Hash: f19ff47813f754346be70729c4625f48e7310cdb53052033d8792ac0671b93f5
            • Instruction Fuzzy Hash: 87116A7261021AAFDB15DFB8CC45AEE7BA8FF08318F050618F995D3240D735E810DB50
            APIs
            • GetWindowTextLengthW.USER32(00000000), ref: 01029699
            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 010296A8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: LengthMessageSendTextWindow
            • String ID: edit
            • API String ID: 2978978980-2167791130
            • Opcode ID: 20d82dd777345f6722a31ea523a742a6fed11d9ed78eafe871f24ca49664cf17
            • Instruction ID: 9a3296df54bb76db9ff27b1685756e6e03cfb0114f2fe669702849a574db761e
            • Opcode Fuzzy Hash: 20d82dd777345f6722a31ea523a742a6fed11d9ed78eafe871f24ca49664cf17
            • Instruction Fuzzy Hash: 42119A71100128AFEB614EA8DC88AEB3BEAEB0936CF100314F9A5931E0C7369C50D760
            APIs
            • _memset.LIBCMT ref: 010052D5
            • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 010052F4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: InfoItemMenu_memset
            • String ID: 0
            • API String ID: 2223754486-4108050209
            • Opcode ID: 094b7be019e5032a9f8bc0ecc4430ebc6ac3457bdc673d3dd17a9e45c25e38e1
            • Instruction ID: 0fea4ef20d6e857b4da3f382d3007fbf058b6cf410cb49c1f85c384cb5215859
            • Opcode Fuzzy Hash: 094b7be019e5032a9f8bc0ecc4430ebc6ac3457bdc673d3dd17a9e45c25e38e1
            • Instruction Fuzzy Hash: 8511DD72901214EBFB62EA9CDD45BAD7BF8AF06710F044065EAC1A72D4D7B0A905CFA0
            APIs
            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 01014DF5
            • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 01014E1E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Internet$OpenOption
            • String ID: <local>
            • API String ID: 942729171-4266983199
            • Opcode ID: 87d999a0f4c98b2740cedce474e675524de2efc851de7ac5b36ce6d766341ccc
            • Instruction ID: eabadf42d631a4eb6049fc8b2a32aaf42d61e38abc512c89df9ddb532e36c0b1
            • Opcode Fuzzy Hash: 87d999a0f4c98b2740cedce474e675524de2efc851de7ac5b36ce6d766341ccc
            • Instruction Fuzzy Hash: 2711E0B0600221BBDF259EA5C888EFBFEE8FF06350F40822AF18596054E3B85845C6E0
            APIs
            • inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 0101A84E
            • htons.WSOCK32(00000000,?,00000000), ref: 0101A88B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: htonsinet_addr
            • String ID: 255.255.255.255
            • API String ID: 3832099526-2422070025
            • Opcode ID: 225eaed352e8b6f585c0946970fcf5c4936b005bf4e650d02a2f200bf263b675
            • Instruction ID: e4812a12351b2cd86eee59d34eca4665339e900d09cc130f1a723dd53e2f1372
            • Opcode Fuzzy Hash: 225eaed352e8b6f585c0946970fcf5c4936b005bf4e650d02a2f200bf263b675
            • Instruction Fuzzy Hash: 96014578300345EBDB21DFA8C886FAEB3A4FF44314F10846AE9569B2D1D739E801C751
            APIs
            • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00FFB7EF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: ComboBox$ListBox
            • API String ID: 3850602802-1403004172
            • Opcode ID: 65919190b427327331b10c8a7c3881c29a3cf7ad75a0b04122ec1d1fd5a4557a
            • Instruction ID: 483f75cc01d5aa77aeef8169e95d60a1629480506dbe9162262e97d0a28944e8
            • Opcode Fuzzy Hash: 65919190b427327331b10c8a7c3881c29a3cf7ad75a0b04122ec1d1fd5a4557a
            • Instruction Fuzzy Hash: 0001D871A41119ABCB04FBA4CD53EFE3369BF86350B08061DF561572E2DF785908E794
            APIs
            • SendMessageW.USER32(?,00000180,00000000,?), ref: 00FFB6EB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: ComboBox$ListBox
            • API String ID: 3850602802-1403004172
            • Opcode ID: de1341ec395c002366bade062fcf5283c489b3471e81d915f01353c8d5b446dd
            • Instruction ID: ba22fc5c7be9ef297f8c153342df309e1e71c5cb540085ce3c18a02d3b2fa912
            • Opcode Fuzzy Hash: de1341ec395c002366bade062fcf5283c489b3471e81d915f01353c8d5b446dd
            • Instruction Fuzzy Hash: 260184B1A41009ABCB04EBA4CE53FFE73A99F45344F14001DF542A71A2EB585E18A7E5
            APIs
            • SendMessageW.USER32(?,00000182,?,00000000), ref: 00FFB76C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: ComboBox$ListBox
            • API String ID: 3850602802-1403004172
            • Opcode ID: 423a14477a1ea7cb363a2ea07bda875230fa0e2fc77966cda8d61e4097a822bc
            • Instruction ID: 19e50a67f184d9f8321af0dac707d350c36870ab209ed51f3d7821b973246be1
            • Opcode Fuzzy Hash: 423a14477a1ea7cb363a2ea07bda875230fa0e2fc77966cda8d61e4097a822bc
            • Instruction Fuzzy Hash: 5B018FB6A41109ABCB00F6A4CE43FFE73A99F45344B18001DF541B31A2DB685E09A7A5
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: ClassName_wcscmp
            • String ID: #32770
            • API String ID: 2292705959-463685578
            • Opcode ID: 9a1700a8504e39ce0ba37d21f52c14b4cff2843248e6c51e7acf439dfe3c119d
            • Instruction ID: ae2f4394fc7546605c8d6a622f59c34995e46bff67ce13c1e8ff96c920dc0ccc
            • Opcode Fuzzy Hash: 9a1700a8504e39ce0ba37d21f52c14b4cff2843248e6c51e7acf439dfe3c119d
            • Instruction Fuzzy Hash: 06E0D877A0432427E720EAEADC49ECBFBACFB95B60F00405AF985D7141D674E60187D4
            APIs
            • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00FFA63F
              • Part of subcall function 00FE13F1: _doexit.LIBCMT ref: 00FE13FB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: Message_doexit
            • String ID: AutoIt$Error allocating memory.
            • API String ID: 1993061046-4017498283
            • Opcode ID: 0aefb876d19eb2b42b839cdbb8a5a979e42543397171a360842831627983fafb
            • Instruction ID: 5657acaa11966c6cf883340a5b537bcc154890e1805565cdbfa03966c9c21809
            • Opcode Fuzzy Hash: 0aefb876d19eb2b42b839cdbb8a5a979e42543397171a360842831627983fafb
            • Instruction Fuzzy Hash: 85D0C23138031833D210269A6C07FC576488B18BA1F08002ABB489968249EA958052D9
            APIs
            • GetSystemDirectoryW.KERNEL32(?), ref: 0103ACC0
            • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 0103AEBD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: DirectoryFreeLibrarySystem
            • String ID: WIN_XPe
            • API String ID: 510247158-3257408948
            • Opcode ID: 8bef71988099d87c1fffe3fed48fde8391d87efe1d5a086c7189d8ca8dccf192
            • Instruction ID: fc8cbed37656a047df4b9aeb9763604160b1a8ad52e7b321e072c96a22118f2f
            • Opcode Fuzzy Hash: 8bef71988099d87c1fffe3fed48fde8391d87efe1d5a086c7189d8ca8dccf192
            • Instruction Fuzzy Hash: F5E065B0D1010DDFDB11DBA8DA849ECB7BCAB98300F048091E5C6F3154C7354645DF21
            APIs
            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 010286A2
            • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 010286B5
              • Part of subcall function 01007A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 01007AD0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: FindMessagePostSleepWindow
            • String ID: Shell_TrayWnd
            • API String ID: 529655941-2988720461
            • Opcode ID: 200dce15ba93f1a7db8337f52d175c633af1287f4fd06eb529652c02ffb752c5
            • Instruction ID: 86479a3038da9693e33a0293e50d837f53c4f6f36fd10e11495ae909a1d91c6e
            • Opcode Fuzzy Hash: 200dce15ba93f1a7db8337f52d175c633af1287f4fd06eb529652c02ffb752c5
            • Instruction Fuzzy Hash: A9D01275794314B7F27466B09D4BFC67A18AB64B11F100819B7C9AE1C4C9E9E940C754
            APIs
            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 010286E2
            • PostMessageW.USER32(00000000), ref: 010286E9
              • Part of subcall function 01007A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 01007AD0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1275548696.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
            • Associated: 00000000.00000002.1275521672.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000104D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275614615.000000000106E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275675458.000000000107A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1275696281.0000000001084000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_fc0000_NRFQFP.jbxd
            Similarity
            • API ID: FindMessagePostSleepWindow
            • String ID: Shell_TrayWnd
            • API String ID: 529655941-2988720461
            • Opcode ID: 54fa8c088cc6c24ec4038e23e73944b9d04ee04817ed0beb55f6db2b14ce64f3
            • Instruction ID: d223017235cb24501657509a507ecccd103bc7b7120788106d27f75b0977df26
            • Opcode Fuzzy Hash: 54fa8c088cc6c24ec4038e23e73944b9d04ee04817ed0beb55f6db2b14ce64f3
            • Instruction Fuzzy Hash: A4D022713C03147BF23462B09C4BFC23A08AB28B10F000808B3C9EE0C0C8E9F940C758