Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LOI REQUEST.exe

Overview

General Information

Sample name:LOI REQUEST.exe
Analysis ID:1562310
MD5:8dad2a83f4440c44bbb9a47c18752626
SHA1:8d702707d4fe17b7bbe96fdcb20e3cdd6e5d0104
SHA256:fce3183e9d396e2fe176392fbdcd765daa5154aa9187a7dbbdde77c38dd1e079
Tags:exeFormbookuser-adrian__luca
Infos:

Detection

FormBook
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • LOI REQUEST.exe (PID: 5876 cmdline: "C:\Users\user\Desktop\LOI REQUEST.exe" MD5: 8DAD2A83F4440C44BBB9A47C18752626)
    • svchost.exe (PID: 3868 cmdline: "C:\Users\user\Desktop\LOI REQUEST.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000005.00000002.1698285609.00000000003A0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000005.00000002.1698899133.0000000003350000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      SourceRuleDescriptionAuthorStrings
      5.2.svchost.exe.3a0000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        5.2.svchost.exe.3a0000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

          System Summary

          barindex
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\LOI REQUEST.exe", CommandLine: "C:\Users\user\Desktop\LOI REQUEST.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\LOI REQUEST.exe", ParentImage: C:\Users\user\Desktop\LOI REQUEST.exe, ParentProcessId: 5876, ParentProcessName: LOI REQUEST.exe, ProcessCommandLine: "C:\Users\user\Desktop\LOI REQUEST.exe", ProcessId: 3868, ProcessName: svchost.exe
          Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\LOI REQUEST.exe", CommandLine: "C:\Users\user\Desktop\LOI REQUEST.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\LOI REQUEST.exe", ParentImage: C:\Users\user\Desktop\LOI REQUEST.exe, ParentProcessId: 5876, ParentProcessName: LOI REQUEST.exe, ProcessCommandLine: "C:\Users\user\Desktop\LOI REQUEST.exe", ProcessId: 3868, ProcessName: svchost.exe
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: LOI REQUEST.exeReversingLabs: Detection: 52%
          Source: Yara matchFile source: 5.2.svchost.exe.3a0000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.svchost.exe.3a0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.1698285609.00000000003A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.1698899133.0000000003350000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: LOI REQUEST.exeJoe Sandbox ML: detected
          Source: LOI REQUEST.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: Binary string: wntdll.pdbUGP source: LOI REQUEST.exe, 00000000.00000003.1274926966.0000000003E80000.00000004.00001000.00020000.00000000.sdmp, LOI REQUEST.exe, 00000000.00000003.1274546618.0000000004020000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1664121987.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.1698521682.000000000319E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.1698521682.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1666333853.0000000002E00000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: LOI REQUEST.exe, 00000000.00000003.1274926966.0000000003E80000.00000004.00001000.00020000.00000000.sdmp, LOI REQUEST.exe, 00000000.00000003.1274546618.0000000004020000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000005.00000003.1664121987.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.1698521682.000000000319E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.1698521682.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1666333853.0000000002E00000.00000004.00000020.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00456CA9 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00456CA9
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_004560DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_004560DD
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_004563F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_004563F9
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0045EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0045EB60
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0045F56F FindFirstFileW,FindClose,0_2_0045F56F
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0045F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0045F5FA
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00461B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00461B2F
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00461C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00461C8A
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00461F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00461F94
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00464EB5 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00464EB5
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00466B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00466B0C
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00466D07 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00466D07
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00466B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00466B0C
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00452B37 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00452B37

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 5.2.svchost.exe.3a0000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.svchost.exe.3a0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.1698285609.00000000003A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.1698899133.0000000003350000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: This is a third-party compiled AutoIt script.0_2_00413D19
          Source: LOI REQUEST.exeString found in binary or memory: This is a third-party compiled AutoIt script.
          Source: LOI REQUEST.exe, 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_74ec6a66-7
          Source: LOI REQUEST.exe, 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: DSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_e0629bfe-9
          Source: LOI REQUEST.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_be802d55-0
          Source: LOI REQUEST.exeString found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_befa8cf1-d
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_003CC9E3 NtClose,5_2_003CC9E3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_003A191B NtProtectVirtualMemory,5_2_003A191B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072B60 NtClose,LdrInitializeThunk,5_2_03072B60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072DF0 NtQuerySystemInformation,LdrInitializeThunk,5_2_03072DF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030735C0 NtCreateMutant,LdrInitializeThunk,5_2_030735C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03074340 NtSetContextThread,5_2_03074340
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03074650 NtSuspendThread,5_2_03074650
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072B80 NtQueryInformationFile,5_2_03072B80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072BA0 NtEnumerateValueKey,5_2_03072BA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072BE0 NtQueryValueKey,5_2_03072BE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072BF0 NtAllocateVirtualMemory,5_2_03072BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072AB0 NtWaitForSingleObject,5_2_03072AB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072AD0 NtReadFile,5_2_03072AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072AF0 NtWriteFile,5_2_03072AF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072F30 NtCreateSection,5_2_03072F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072F60 NtCreateProcessEx,5_2_03072F60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072F90 NtProtectVirtualMemory,5_2_03072F90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072FA0 NtQuerySection,5_2_03072FA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072FB0 NtResumeThread,5_2_03072FB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072FE0 NtCreateFile,5_2_03072FE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072E30 NtWriteVirtualMemory,5_2_03072E30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072E80 NtReadVirtualMemory,5_2_03072E80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072EA0 NtAdjustPrivilegesToken,5_2_03072EA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072EE0 NtQueueApcThread,5_2_03072EE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072D00 NtSetInformationFile,5_2_03072D00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072D10 NtMapViewOfSection,5_2_03072D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072D30 NtUnmapViewOfSection,5_2_03072D30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072DB0 NtEnumerateKey,5_2_03072DB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072DD0 NtDelayExecution,5_2_03072DD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072C00 NtQueryInformationProcess,5_2_03072C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072C60 NtCreateKey,5_2_03072C60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072C70 NtFreeVirtualMemory,5_2_03072C70
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072CA0 NtQueryInformationToken,5_2_03072CA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072CC0 NtQueryVirtualMemory,5_2_03072CC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072CF0 NtOpenProcess,5_2_03072CF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03073010 NtOpenDirectoryObject,5_2_03073010
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03073090 NtSetValueKey,5_2_03073090
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030739B0 NtGetContextThread,5_2_030739B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03073D10 NtOpenProcessToken,5_2_03073D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03073D70 NtOpenThread,5_2_03073D70
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00456606: CreateFileW,DeviceIoControl,CloseHandle,0_2_00456606
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0044ACC5 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_0044ACC5
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_004579D3 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_004579D3
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0043B0430_2_0043B043
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_004232000_2_00423200
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0044410F0_2_0044410F
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_004302A40_2_004302A4
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0041E3E30_2_0041E3E3
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0044038E0_2_0044038E
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0044467F0_2_0044467F
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_004306D90_2_004306D9
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0047AACE0_2_0047AACE
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00444BEF0_2_00444BEF
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0043CCC10_2_0043CCC1
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0041AF500_2_0041AF50
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00416F070_2_00416F07
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0042B11F0_2_0042B11F
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0043D1B90_2_0043D1B9
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_004731BC0_2_004731BC
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0044724D0_2_0044724D
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0043123A0_2_0043123A
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_004513CA0_2_004513CA
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_004193F00_2_004193F0
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0042F5630_2_0042F563
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_004196C00_2_004196C0
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0045B6CC0_2_0045B6CC
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_004177B00_2_004177B0
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_004479C90_2_004479C9
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0042FA570_2_0042FA57
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00419B600_2_00419B60
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00423B700_2_00423B70
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00417D190_2_00417D19
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0042FE6F0_2_0042FE6F
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00439ED00_2_00439ED0
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00417FA30_2_00417FA3
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_016592380_2_01659238
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_003A30505_2_003A3050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_003CF0835_2_003CF083
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_003B01635_2_003B0163
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_003B6B135_2_003B6B13
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_003B6B0E5_2_003B6B0E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_003A2B705_2_003A2B70
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_003A2B665_2_003A2B66
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_003B03835_2_003B0383
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_003AE3835_2_003AE383
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_003AE4D35_2_003AE4D3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_003AE4D15_2_003AE4D1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_003A27505_2_003A2750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_003A274A5_2_003A274A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030FA3525_2_030FA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0304E3F05_2_0304E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_031003E65_2_031003E6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030E02745_2_030E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030C02C05_2_030C02C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030301005_2_03030100
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030DA1185_2_030DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030C81585_2_030C8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030F41A25_2_030F41A2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_031001AA5_2_031001AA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030F81CC5_2_030F81CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030D20005_2_030D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030647505_2_03064750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030407705_2_03040770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303C7C05_2_0303C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305C6E05_2_0305C6E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030405355_2_03040535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_031005915_2_03100591
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030E44205_2_030E4420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030F24465_2_030F2446
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030EE4F65_2_030EE4F6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030FAB405_2_030FAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030F6BD75_2_030F6BD7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303EA805_2_0303EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030569625_2_03056962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030429A05_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0310A9A65_2_0310A9A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0304A8405_2_0304A840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030428405_2_03042840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030268B85_2_030268B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306E8F05_2_0306E8F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03082F285_2_03082F28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03060F305_2_03060F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030E2F305_2_030E2F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B4F405_2_030B4F40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030BEFA05_2_030BEFA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03032FC85_2_03032FC8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0304CFE05_2_0304CFE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030FEE265_2_030FEE26
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03040E595_2_03040E59
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03052E905_2_03052E90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030FCE935_2_030FCE93
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030FEEDB5_2_030FEEDB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0304AD005_2_0304AD00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030DCD1F5_2_030DCD1F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03058DBF5_2_03058DBF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303ADE05_2_0303ADE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03040C005_2_03040C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030E0CB55_2_030E0CB5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03030CF25_2_03030CF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030F132D5_2_030F132D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0302D34C5_2_0302D34C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0308739A5_2_0308739A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030452A05_2_030452A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305B2C05_2_0305B2C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030E12ED5_2_030E12ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0307516C5_2_0307516C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0302F1725_2_0302F172
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0310B16B5_2_0310B16B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0304B1B05_2_0304B1B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030EF0CC5_2_030EF0CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030470C05_2_030470C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030F70E95_2_030F70E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030FF0E05_2_030FF0E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030FF7B05_2_030FF7B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030F16CC5_2_030F16CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030F75715_2_030F7571
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030DD5B05_2_030DD5B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030FF43F5_2_030FF43F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030314605_2_03031460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030FFB765_2_030FFB76
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305FB805_2_0305FB80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B5BF05_2_030B5BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0307DBF95_2_0307DBF9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030FFA495_2_030FFA49
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030F7A465_2_030F7A46
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B3A6C5_2_030B3A6C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030DDAAC5_2_030DDAAC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03085AA05_2_03085AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030E1AA35_2_030E1AA3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030EDAC65_2_030EDAC6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030D59105_2_030D5910
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030499505_2_03049950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305B9505_2_0305B950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030AD8005_2_030AD800
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030438E05_2_030438E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030FFF095_2_030FFF09
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03041F925_2_03041F92
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030FFFB15_2_030FFFB1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03049EB05_2_03049EB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03043D405_2_03043D40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030F1D5A5_2_030F1D5A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030F7D735_2_030F7D73
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305FDC05_2_0305FDC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B9C325_2_030B9C32
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030FFCF25_2_030FFCF2
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: String function: 0043F8A0 appears 35 times
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: String function: 00436AC0 appears 42 times
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: String function: 0042EC2F appears 68 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 030AEA12 appears 86 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0302B970 appears 277 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 030BF290 appears 105 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03075130 appears 58 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03087E54 appears 102 times
          Source: LOI REQUEST.exe, 00000000.00000003.1277537286.000000000419D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs LOI REQUEST.exe
          Source: LOI REQUEST.exe, 00000000.00000003.1277310401.0000000003FF3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs LOI REQUEST.exe
          Source: LOI REQUEST.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: classification engineClassification label: mal80.troj.evad.winEXE@3/2@0/0
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0045CE7A GetLastError,FormatMessageW,0_2_0045CE7A
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0044AB84 AdjustTokenPrivileges,CloseHandle,0_2_0044AB84
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0044B134 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_0044B134
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0045E1FD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0045E1FD
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00456532 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,CloseHandle,0_2_00456532
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0046C18C CoInitializeSecurity,_memset,_memset,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,0_2_0046C18C
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0041406B CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_0041406B
          Source: C:\Users\user\Desktop\LOI REQUEST.exeFile created: C:\Users\user~1\AppData\Local\Temp\aut9044.tmpJump to behavior
          Source: LOI REQUEST.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\LOI REQUEST.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: LOI REQUEST.exeReversingLabs: Detection: 52%
          Source: unknownProcess created: C:\Users\user\Desktop\LOI REQUEST.exe "C:\Users\user\Desktop\LOI REQUEST.exe"
          Source: C:\Users\user\Desktop\LOI REQUEST.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\LOI REQUEST.exe"
          Source: C:\Users\user\Desktop\LOI REQUEST.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\LOI REQUEST.exe"Jump to behavior
          Source: C:\Users\user\Desktop\LOI REQUEST.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\LOI REQUEST.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\Desktop\LOI REQUEST.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\LOI REQUEST.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\LOI REQUEST.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\Desktop\LOI REQUEST.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\LOI REQUEST.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\LOI REQUEST.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\LOI REQUEST.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\LOI REQUEST.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\LOI REQUEST.exeSection loaded: ntmarta.dllJump to behavior
          Source: LOI REQUEST.exeStatic file information: File size 1209344 > 1048576
          Source: LOI REQUEST.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
          Source: LOI REQUEST.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
          Source: LOI REQUEST.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
          Source: LOI REQUEST.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: LOI REQUEST.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
          Source: LOI REQUEST.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
          Source: LOI REQUEST.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: wntdll.pdbUGP source: LOI REQUEST.exe, 00000000.00000003.1274926966.0000000003E80000.00000004.00001000.00020000.00000000.sdmp, LOI REQUEST.exe, 00000000.00000003.1274546618.0000000004020000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1664121987.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.1698521682.000000000319E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.1698521682.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1666333853.0000000002E00000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: LOI REQUEST.exe, 00000000.00000003.1274926966.0000000003E80000.00000004.00001000.00020000.00000000.sdmp, LOI REQUEST.exe, 00000000.00000003.1274546618.0000000004020000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000005.00000003.1664121987.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.1698521682.000000000319E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.1698521682.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.1666333853.0000000002E00000.00000004.00000020.00020000.00000000.sdmp
          Source: LOI REQUEST.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
          Source: LOI REQUEST.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
          Source: LOI REQUEST.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
          Source: LOI REQUEST.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
          Source: LOI REQUEST.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0042E01E LoadLibraryA,GetProcAddress,0_2_0042E01E
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00436B05 push ecx; ret 0_2_00436B18
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_003B6857 push esp; iretd 5_2_003B6858
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_003AD8D0 push esp; iretd 5_2_003AD8D1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_003A51E6 push esp; retf 5_2_003A5205
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_003A32C0 push eax; ret 5_2_003A32C2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_003B4B13 pushad ; iretd 5_2_003B4B78
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_003AD352 push dword ptr [ebp-59622DFFh]; iretd 5_2_003AD358
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_003B4BA2 pushad ; iretd 5_2_003B4B78
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_003B4B85 pushad ; iretd 5_2_003B4B78
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_003B64A9 push es; retf 5_2_003B64BD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_003B6505 push es; retf 5_2_003B64BD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_003B3653 push ebx; retf 5_2_003B369C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030309AD push ecx; mov dword ptr [esp], ecx5_2_030309B6
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00478111 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00478111
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0042EB42 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_0042EB42
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0043123A __initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0043123A
          Source: C:\Users\user\Desktop\LOI REQUEST.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\LOI REQUEST.exeAPI/Special instruction interceptor: Address: 1658E5C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0307096E rdtsc 5_2_0307096E
          Source: C:\Users\user\Desktop\LOI REQUEST.exeEvaded block: after key decisiongraph_0-94039
          Source: C:\Users\user\Desktop\LOI REQUEST.exeEvaded block: after key decisiongraph_0-94914
          Source: C:\Users\user\Desktop\LOI REQUEST.exeAPI coverage: 4.4 %
          Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.6 %
          Source: C:\Windows\SysWOW64\svchost.exe TID: 6592Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00456CA9 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00456CA9
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_004560DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_004560DD
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_004563F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_004563F9
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0045EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0045EB60
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0045F56F FindFirstFileW,FindClose,0_2_0045F56F
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0045F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0045F5FA
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00461B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00461B2F
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00461C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00461C8A
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00461F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00461F94
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0042DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_0042DDC0
          Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0307096E rdtsc 5_2_0307096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_003B7AA3 LdrLoadDll,5_2_003B7AA3
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00466AAF BlockInput,0_2_00466AAF
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00413D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00413D19
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00443920 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW,0_2_00443920
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0042E01E LoadLibraryA,GetProcAddress,0_2_0042E01E
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_01659128 mov eax, dword ptr fs:[00000030h]0_2_01659128
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_016590C8 mov eax, dword ptr fs:[00000030h]0_2_016590C8
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_01657A98 mov eax, dword ptr fs:[00000030h]0_2_01657A98
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306A30B mov eax, dword ptr fs:[00000030h]5_2_0306A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306A30B mov eax, dword ptr fs:[00000030h]5_2_0306A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306A30B mov eax, dword ptr fs:[00000030h]5_2_0306A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0302C310 mov ecx, dword ptr fs:[00000030h]5_2_0302C310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03050310 mov ecx, dword ptr fs:[00000030h]5_2_03050310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B2349 mov eax, dword ptr fs:[00000030h]5_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B2349 mov eax, dword ptr fs:[00000030h]5_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B2349 mov eax, dword ptr fs:[00000030h]5_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B2349 mov eax, dword ptr fs:[00000030h]5_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B2349 mov eax, dword ptr fs:[00000030h]5_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B2349 mov eax, dword ptr fs:[00000030h]5_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B2349 mov eax, dword ptr fs:[00000030h]5_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B2349 mov eax, dword ptr fs:[00000030h]5_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B2349 mov eax, dword ptr fs:[00000030h]5_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B2349 mov eax, dword ptr fs:[00000030h]5_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B2349 mov eax, dword ptr fs:[00000030h]5_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B2349 mov eax, dword ptr fs:[00000030h]5_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B2349 mov eax, dword ptr fs:[00000030h]5_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B2349 mov eax, dword ptr fs:[00000030h]5_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B2349 mov eax, dword ptr fs:[00000030h]5_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B035C mov eax, dword ptr fs:[00000030h]5_2_030B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B035C mov eax, dword ptr fs:[00000030h]5_2_030B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B035C mov eax, dword ptr fs:[00000030h]5_2_030B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B035C mov ecx, dword ptr fs:[00000030h]5_2_030B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B035C mov eax, dword ptr fs:[00000030h]5_2_030B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B035C mov eax, dword ptr fs:[00000030h]5_2_030B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030FA352 mov eax, dword ptr fs:[00000030h]5_2_030FA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030D8350 mov ecx, dword ptr fs:[00000030h]5_2_030D8350
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030D437C mov eax, dword ptr fs:[00000030h]5_2_030D437C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0302E388 mov eax, dword ptr fs:[00000030h]5_2_0302E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0302E388 mov eax, dword ptr fs:[00000030h]5_2_0302E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0302E388 mov eax, dword ptr fs:[00000030h]5_2_0302E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305438F mov eax, dword ptr fs:[00000030h]5_2_0305438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305438F mov eax, dword ptr fs:[00000030h]5_2_0305438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03028397 mov eax, dword ptr fs:[00000030h]5_2_03028397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03028397 mov eax, dword ptr fs:[00000030h]5_2_03028397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03028397 mov eax, dword ptr fs:[00000030h]5_2_03028397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030EC3CD mov eax, dword ptr fs:[00000030h]5_2_030EC3CD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303A3C0 mov eax, dword ptr fs:[00000030h]5_2_0303A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303A3C0 mov eax, dword ptr fs:[00000030h]5_2_0303A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303A3C0 mov eax, dword ptr fs:[00000030h]5_2_0303A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303A3C0 mov eax, dword ptr fs:[00000030h]5_2_0303A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303A3C0 mov eax, dword ptr fs:[00000030h]5_2_0303A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303A3C0 mov eax, dword ptr fs:[00000030h]5_2_0303A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030383C0 mov eax, dword ptr fs:[00000030h]5_2_030383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030383C0 mov eax, dword ptr fs:[00000030h]5_2_030383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030383C0 mov eax, dword ptr fs:[00000030h]5_2_030383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030383C0 mov eax, dword ptr fs:[00000030h]5_2_030383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B63C0 mov eax, dword ptr fs:[00000030h]5_2_030B63C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030DE3DB mov eax, dword ptr fs:[00000030h]5_2_030DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030DE3DB mov eax, dword ptr fs:[00000030h]5_2_030DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030DE3DB mov ecx, dword ptr fs:[00000030h]5_2_030DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030DE3DB mov eax, dword ptr fs:[00000030h]5_2_030DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030D43D4 mov eax, dword ptr fs:[00000030h]5_2_030D43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030D43D4 mov eax, dword ptr fs:[00000030h]5_2_030D43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030403E9 mov eax, dword ptr fs:[00000030h]5_2_030403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030403E9 mov eax, dword ptr fs:[00000030h]5_2_030403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030403E9 mov eax, dword ptr fs:[00000030h]5_2_030403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030403E9 mov eax, dword ptr fs:[00000030h]5_2_030403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030403E9 mov eax, dword ptr fs:[00000030h]5_2_030403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030403E9 mov eax, dword ptr fs:[00000030h]5_2_030403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030403E9 mov eax, dword ptr fs:[00000030h]5_2_030403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030403E9 mov eax, dword ptr fs:[00000030h]5_2_030403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0304E3F0 mov eax, dword ptr fs:[00000030h]5_2_0304E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0304E3F0 mov eax, dword ptr fs:[00000030h]5_2_0304E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0304E3F0 mov eax, dword ptr fs:[00000030h]5_2_0304E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030663FF mov eax, dword ptr fs:[00000030h]5_2_030663FF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0302823B mov eax, dword ptr fs:[00000030h]5_2_0302823B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B8243 mov eax, dword ptr fs:[00000030h]5_2_030B8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B8243 mov ecx, dword ptr fs:[00000030h]5_2_030B8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0302A250 mov eax, dword ptr fs:[00000030h]5_2_0302A250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03036259 mov eax, dword ptr fs:[00000030h]5_2_03036259
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030EA250 mov eax, dword ptr fs:[00000030h]5_2_030EA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030EA250 mov eax, dword ptr fs:[00000030h]5_2_030EA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03034260 mov eax, dword ptr fs:[00000030h]5_2_03034260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03034260 mov eax, dword ptr fs:[00000030h]5_2_03034260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03034260 mov eax, dword ptr fs:[00000030h]5_2_03034260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0302826B mov eax, dword ptr fs:[00000030h]5_2_0302826B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030E0274 mov eax, dword ptr fs:[00000030h]5_2_030E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030E0274 mov eax, dword ptr fs:[00000030h]5_2_030E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030E0274 mov eax, dword ptr fs:[00000030h]5_2_030E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030E0274 mov eax, dword ptr fs:[00000030h]5_2_030E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030E0274 mov eax, dword ptr fs:[00000030h]5_2_030E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030E0274 mov eax, dword ptr fs:[00000030h]5_2_030E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030E0274 mov eax, dword ptr fs:[00000030h]5_2_030E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030E0274 mov eax, dword ptr fs:[00000030h]5_2_030E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030E0274 mov eax, dword ptr fs:[00000030h]5_2_030E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030E0274 mov eax, dword ptr fs:[00000030h]5_2_030E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030E0274 mov eax, dword ptr fs:[00000030h]5_2_030E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030E0274 mov eax, dword ptr fs:[00000030h]5_2_030E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306E284 mov eax, dword ptr fs:[00000030h]5_2_0306E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306E284 mov eax, dword ptr fs:[00000030h]5_2_0306E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B0283 mov eax, dword ptr fs:[00000030h]5_2_030B0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B0283 mov eax, dword ptr fs:[00000030h]5_2_030B0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B0283 mov eax, dword ptr fs:[00000030h]5_2_030B0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030402A0 mov eax, dword ptr fs:[00000030h]5_2_030402A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030402A0 mov eax, dword ptr fs:[00000030h]5_2_030402A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030C62A0 mov eax, dword ptr fs:[00000030h]5_2_030C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030C62A0 mov ecx, dword ptr fs:[00000030h]5_2_030C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030C62A0 mov eax, dword ptr fs:[00000030h]5_2_030C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030C62A0 mov eax, dword ptr fs:[00000030h]5_2_030C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030C62A0 mov eax, dword ptr fs:[00000030h]5_2_030C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030C62A0 mov eax, dword ptr fs:[00000030h]5_2_030C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303A2C3 mov eax, dword ptr fs:[00000030h]5_2_0303A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303A2C3 mov eax, dword ptr fs:[00000030h]5_2_0303A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303A2C3 mov eax, dword ptr fs:[00000030h]5_2_0303A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303A2C3 mov eax, dword ptr fs:[00000030h]5_2_0303A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303A2C3 mov eax, dword ptr fs:[00000030h]5_2_0303A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030402E1 mov eax, dword ptr fs:[00000030h]5_2_030402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030402E1 mov eax, dword ptr fs:[00000030h]5_2_030402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030402E1 mov eax, dword ptr fs:[00000030h]5_2_030402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030DE10E mov eax, dword ptr fs:[00000030h]5_2_030DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030DE10E mov ecx, dword ptr fs:[00000030h]5_2_030DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030DE10E mov eax, dword ptr fs:[00000030h]5_2_030DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030DE10E mov eax, dword ptr fs:[00000030h]5_2_030DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030DE10E mov ecx, dword ptr fs:[00000030h]5_2_030DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030DE10E mov eax, dword ptr fs:[00000030h]5_2_030DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030DE10E mov eax, dword ptr fs:[00000030h]5_2_030DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030DE10E mov ecx, dword ptr fs:[00000030h]5_2_030DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030DE10E mov eax, dword ptr fs:[00000030h]5_2_030DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030DE10E mov ecx, dword ptr fs:[00000030h]5_2_030DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030DA118 mov ecx, dword ptr fs:[00000030h]5_2_030DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030DA118 mov eax, dword ptr fs:[00000030h]5_2_030DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030DA118 mov eax, dword ptr fs:[00000030h]5_2_030DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030DA118 mov eax, dword ptr fs:[00000030h]5_2_030DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030F0115 mov eax, dword ptr fs:[00000030h]5_2_030F0115
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03060124 mov eax, dword ptr fs:[00000030h]5_2_03060124
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030C4144 mov eax, dword ptr fs:[00000030h]5_2_030C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030C4144 mov eax, dword ptr fs:[00000030h]5_2_030C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030C4144 mov ecx, dword ptr fs:[00000030h]5_2_030C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030C4144 mov eax, dword ptr fs:[00000030h]5_2_030C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030C4144 mov eax, dword ptr fs:[00000030h]5_2_030C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0302C156 mov eax, dword ptr fs:[00000030h]5_2_0302C156
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030C8158 mov eax, dword ptr fs:[00000030h]5_2_030C8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03036154 mov eax, dword ptr fs:[00000030h]5_2_03036154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03036154 mov eax, dword ptr fs:[00000030h]5_2_03036154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03070185 mov eax, dword ptr fs:[00000030h]5_2_03070185
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030EC188 mov eax, dword ptr fs:[00000030h]5_2_030EC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030EC188 mov eax, dword ptr fs:[00000030h]5_2_030EC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030D4180 mov eax, dword ptr fs:[00000030h]5_2_030D4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030D4180 mov eax, dword ptr fs:[00000030h]5_2_030D4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B019F mov eax, dword ptr fs:[00000030h]5_2_030B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B019F mov eax, dword ptr fs:[00000030h]5_2_030B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B019F mov eax, dword ptr fs:[00000030h]5_2_030B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B019F mov eax, dword ptr fs:[00000030h]5_2_030B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0302A197 mov eax, dword ptr fs:[00000030h]5_2_0302A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0302A197 mov eax, dword ptr fs:[00000030h]5_2_0302A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0302A197 mov eax, dword ptr fs:[00000030h]5_2_0302A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030F61C3 mov eax, dword ptr fs:[00000030h]5_2_030F61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030F61C3 mov eax, dword ptr fs:[00000030h]5_2_030F61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030AE1D0 mov eax, dword ptr fs:[00000030h]5_2_030AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030AE1D0 mov eax, dword ptr fs:[00000030h]5_2_030AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030AE1D0 mov ecx, dword ptr fs:[00000030h]5_2_030AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030AE1D0 mov eax, dword ptr fs:[00000030h]5_2_030AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030AE1D0 mov eax, dword ptr fs:[00000030h]5_2_030AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_031061E5 mov eax, dword ptr fs:[00000030h]5_2_031061E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030601F8 mov eax, dword ptr fs:[00000030h]5_2_030601F8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B4000 mov ecx, dword ptr fs:[00000030h]5_2_030B4000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030D2000 mov eax, dword ptr fs:[00000030h]5_2_030D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030D2000 mov eax, dword ptr fs:[00000030h]5_2_030D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030D2000 mov eax, dword ptr fs:[00000030h]5_2_030D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030D2000 mov eax, dword ptr fs:[00000030h]5_2_030D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030D2000 mov eax, dword ptr fs:[00000030h]5_2_030D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030D2000 mov eax, dword ptr fs:[00000030h]5_2_030D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030D2000 mov eax, dword ptr fs:[00000030h]5_2_030D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030D2000 mov eax, dword ptr fs:[00000030h]5_2_030D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0304E016 mov eax, dword ptr fs:[00000030h]5_2_0304E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0304E016 mov eax, dword ptr fs:[00000030h]5_2_0304E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0304E016 mov eax, dword ptr fs:[00000030h]5_2_0304E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0304E016 mov eax, dword ptr fs:[00000030h]5_2_0304E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0302A020 mov eax, dword ptr fs:[00000030h]5_2_0302A020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0302C020 mov eax, dword ptr fs:[00000030h]5_2_0302C020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030C6030 mov eax, dword ptr fs:[00000030h]5_2_030C6030
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03032050 mov eax, dword ptr fs:[00000030h]5_2_03032050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B6050 mov eax, dword ptr fs:[00000030h]5_2_030B6050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305C073 mov eax, dword ptr fs:[00000030h]5_2_0305C073
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303208A mov eax, dword ptr fs:[00000030h]5_2_0303208A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030C80A8 mov eax, dword ptr fs:[00000030h]5_2_030C80A8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030F60B8 mov eax, dword ptr fs:[00000030h]5_2_030F60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030F60B8 mov ecx, dword ptr fs:[00000030h]5_2_030F60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B20DE mov eax, dword ptr fs:[00000030h]5_2_030B20DE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0302A0E3 mov ecx, dword ptr fs:[00000030h]5_2_0302A0E3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030380E9 mov eax, dword ptr fs:[00000030h]5_2_030380E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B60E0 mov eax, dword ptr fs:[00000030h]5_2_030B60E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0302C0F0 mov eax, dword ptr fs:[00000030h]5_2_0302C0F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030720F0 mov ecx, dword ptr fs:[00000030h]5_2_030720F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306C700 mov eax, dword ptr fs:[00000030h]5_2_0306C700
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03030710 mov eax, dword ptr fs:[00000030h]5_2_03030710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03060710 mov eax, dword ptr fs:[00000030h]5_2_03060710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306C720 mov eax, dword ptr fs:[00000030h]5_2_0306C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306C720 mov eax, dword ptr fs:[00000030h]5_2_0306C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306273C mov eax, dword ptr fs:[00000030h]5_2_0306273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306273C mov ecx, dword ptr fs:[00000030h]5_2_0306273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306273C mov eax, dword ptr fs:[00000030h]5_2_0306273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030AC730 mov eax, dword ptr fs:[00000030h]5_2_030AC730
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306674D mov esi, dword ptr fs:[00000030h]5_2_0306674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306674D mov eax, dword ptr fs:[00000030h]5_2_0306674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306674D mov eax, dword ptr fs:[00000030h]5_2_0306674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03030750 mov eax, dword ptr fs:[00000030h]5_2_03030750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030BE75D mov eax, dword ptr fs:[00000030h]5_2_030BE75D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072750 mov eax, dword ptr fs:[00000030h]5_2_03072750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072750 mov eax, dword ptr fs:[00000030h]5_2_03072750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B4755 mov eax, dword ptr fs:[00000030h]5_2_030B4755
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03038770 mov eax, dword ptr fs:[00000030h]5_2_03038770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03040770 mov eax, dword ptr fs:[00000030h]5_2_03040770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03040770 mov eax, dword ptr fs:[00000030h]5_2_03040770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03040770 mov eax, dword ptr fs:[00000030h]5_2_03040770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03040770 mov eax, dword ptr fs:[00000030h]5_2_03040770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03040770 mov eax, dword ptr fs:[00000030h]5_2_03040770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03040770 mov eax, dword ptr fs:[00000030h]5_2_03040770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03040770 mov eax, dword ptr fs:[00000030h]5_2_03040770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03040770 mov eax, dword ptr fs:[00000030h]5_2_03040770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03040770 mov eax, dword ptr fs:[00000030h]5_2_03040770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03040770 mov eax, dword ptr fs:[00000030h]5_2_03040770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03040770 mov eax, dword ptr fs:[00000030h]5_2_03040770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03040770 mov eax, dword ptr fs:[00000030h]5_2_03040770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030D678E mov eax, dword ptr fs:[00000030h]5_2_030D678E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030307AF mov eax, dword ptr fs:[00000030h]5_2_030307AF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030E47A0 mov eax, dword ptr fs:[00000030h]5_2_030E47A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303C7C0 mov eax, dword ptr fs:[00000030h]5_2_0303C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B07C3 mov eax, dword ptr fs:[00000030h]5_2_030B07C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030527ED mov eax, dword ptr fs:[00000030h]5_2_030527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030527ED mov eax, dword ptr fs:[00000030h]5_2_030527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030527ED mov eax, dword ptr fs:[00000030h]5_2_030527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030BE7E1 mov eax, dword ptr fs:[00000030h]5_2_030BE7E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030347FB mov eax, dword ptr fs:[00000030h]5_2_030347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030347FB mov eax, dword ptr fs:[00000030h]5_2_030347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030AE609 mov eax, dword ptr fs:[00000030h]5_2_030AE609
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0304260B mov eax, dword ptr fs:[00000030h]5_2_0304260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0304260B mov eax, dword ptr fs:[00000030h]5_2_0304260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0304260B mov eax, dword ptr fs:[00000030h]5_2_0304260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0304260B mov eax, dword ptr fs:[00000030h]5_2_0304260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0304260B mov eax, dword ptr fs:[00000030h]5_2_0304260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0304260B mov eax, dword ptr fs:[00000030h]5_2_0304260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0304260B mov eax, dword ptr fs:[00000030h]5_2_0304260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03072619 mov eax, dword ptr fs:[00000030h]5_2_03072619
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0304E627 mov eax, dword ptr fs:[00000030h]5_2_0304E627
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03066620 mov eax, dword ptr fs:[00000030h]5_2_03066620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03068620 mov eax, dword ptr fs:[00000030h]5_2_03068620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303262C mov eax, dword ptr fs:[00000030h]5_2_0303262C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0304C640 mov eax, dword ptr fs:[00000030h]5_2_0304C640
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030F866E mov eax, dword ptr fs:[00000030h]5_2_030F866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030F866E mov eax, dword ptr fs:[00000030h]5_2_030F866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306A660 mov eax, dword ptr fs:[00000030h]5_2_0306A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306A660 mov eax, dword ptr fs:[00000030h]5_2_0306A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03062674 mov eax, dword ptr fs:[00000030h]5_2_03062674
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03034690 mov eax, dword ptr fs:[00000030h]5_2_03034690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03034690 mov eax, dword ptr fs:[00000030h]5_2_03034690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306C6A6 mov eax, dword ptr fs:[00000030h]5_2_0306C6A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030666B0 mov eax, dword ptr fs:[00000030h]5_2_030666B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306A6C7 mov ebx, dword ptr fs:[00000030h]5_2_0306A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306A6C7 mov eax, dword ptr fs:[00000030h]5_2_0306A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030AE6F2 mov eax, dword ptr fs:[00000030h]5_2_030AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030AE6F2 mov eax, dword ptr fs:[00000030h]5_2_030AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030AE6F2 mov eax, dword ptr fs:[00000030h]5_2_030AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030AE6F2 mov eax, dword ptr fs:[00000030h]5_2_030AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B06F1 mov eax, dword ptr fs:[00000030h]5_2_030B06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B06F1 mov eax, dword ptr fs:[00000030h]5_2_030B06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030C6500 mov eax, dword ptr fs:[00000030h]5_2_030C6500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03104500 mov eax, dword ptr fs:[00000030h]5_2_03104500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03104500 mov eax, dword ptr fs:[00000030h]5_2_03104500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03104500 mov eax, dword ptr fs:[00000030h]5_2_03104500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03104500 mov eax, dword ptr fs:[00000030h]5_2_03104500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03104500 mov eax, dword ptr fs:[00000030h]5_2_03104500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03104500 mov eax, dword ptr fs:[00000030h]5_2_03104500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03104500 mov eax, dword ptr fs:[00000030h]5_2_03104500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03040535 mov eax, dword ptr fs:[00000030h]5_2_03040535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03040535 mov eax, dword ptr fs:[00000030h]5_2_03040535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03040535 mov eax, dword ptr fs:[00000030h]5_2_03040535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03040535 mov eax, dword ptr fs:[00000030h]5_2_03040535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03040535 mov eax, dword ptr fs:[00000030h]5_2_03040535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03040535 mov eax, dword ptr fs:[00000030h]5_2_03040535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305E53E mov eax, dword ptr fs:[00000030h]5_2_0305E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305E53E mov eax, dword ptr fs:[00000030h]5_2_0305E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305E53E mov eax, dword ptr fs:[00000030h]5_2_0305E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305E53E mov eax, dword ptr fs:[00000030h]5_2_0305E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305E53E mov eax, dword ptr fs:[00000030h]5_2_0305E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03038550 mov eax, dword ptr fs:[00000030h]5_2_03038550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03038550 mov eax, dword ptr fs:[00000030h]5_2_03038550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306656A mov eax, dword ptr fs:[00000030h]5_2_0306656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306656A mov eax, dword ptr fs:[00000030h]5_2_0306656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306656A mov eax, dword ptr fs:[00000030h]5_2_0306656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03032582 mov eax, dword ptr fs:[00000030h]5_2_03032582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03032582 mov ecx, dword ptr fs:[00000030h]5_2_03032582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03064588 mov eax, dword ptr fs:[00000030h]5_2_03064588
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306E59C mov eax, dword ptr fs:[00000030h]5_2_0306E59C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B05A7 mov eax, dword ptr fs:[00000030h]5_2_030B05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B05A7 mov eax, dword ptr fs:[00000030h]5_2_030B05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B05A7 mov eax, dword ptr fs:[00000030h]5_2_030B05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030545B1 mov eax, dword ptr fs:[00000030h]5_2_030545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030545B1 mov eax, dword ptr fs:[00000030h]5_2_030545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306E5CF mov eax, dword ptr fs:[00000030h]5_2_0306E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306E5CF mov eax, dword ptr fs:[00000030h]5_2_0306E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030365D0 mov eax, dword ptr fs:[00000030h]5_2_030365D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306A5D0 mov eax, dword ptr fs:[00000030h]5_2_0306A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306A5D0 mov eax, dword ptr fs:[00000030h]5_2_0306A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305E5E7 mov eax, dword ptr fs:[00000030h]5_2_0305E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305E5E7 mov eax, dword ptr fs:[00000030h]5_2_0305E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305E5E7 mov eax, dword ptr fs:[00000030h]5_2_0305E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305E5E7 mov eax, dword ptr fs:[00000030h]5_2_0305E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305E5E7 mov eax, dword ptr fs:[00000030h]5_2_0305E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305E5E7 mov eax, dword ptr fs:[00000030h]5_2_0305E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305E5E7 mov eax, dword ptr fs:[00000030h]5_2_0305E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305E5E7 mov eax, dword ptr fs:[00000030h]5_2_0305E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030325E0 mov eax, dword ptr fs:[00000030h]5_2_030325E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306C5ED mov eax, dword ptr fs:[00000030h]5_2_0306C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306C5ED mov eax, dword ptr fs:[00000030h]5_2_0306C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03068402 mov eax, dword ptr fs:[00000030h]5_2_03068402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03068402 mov eax, dword ptr fs:[00000030h]5_2_03068402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03068402 mov eax, dword ptr fs:[00000030h]5_2_03068402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0302E420 mov eax, dword ptr fs:[00000030h]5_2_0302E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0302E420 mov eax, dword ptr fs:[00000030h]5_2_0302E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0302E420 mov eax, dword ptr fs:[00000030h]5_2_0302E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0302C427 mov eax, dword ptr fs:[00000030h]5_2_0302C427
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B6420 mov eax, dword ptr fs:[00000030h]5_2_030B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B6420 mov eax, dword ptr fs:[00000030h]5_2_030B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B6420 mov eax, dword ptr fs:[00000030h]5_2_030B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B6420 mov eax, dword ptr fs:[00000030h]5_2_030B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B6420 mov eax, dword ptr fs:[00000030h]5_2_030B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B6420 mov eax, dword ptr fs:[00000030h]5_2_030B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B6420 mov eax, dword ptr fs:[00000030h]5_2_030B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306A430 mov eax, dword ptr fs:[00000030h]5_2_0306A430
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306E443 mov eax, dword ptr fs:[00000030h]5_2_0306E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306E443 mov eax, dword ptr fs:[00000030h]5_2_0306E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306E443 mov eax, dword ptr fs:[00000030h]5_2_0306E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306E443 mov eax, dword ptr fs:[00000030h]5_2_0306E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306E443 mov eax, dword ptr fs:[00000030h]5_2_0306E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306E443 mov eax, dword ptr fs:[00000030h]5_2_0306E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306E443 mov eax, dword ptr fs:[00000030h]5_2_0306E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306E443 mov eax, dword ptr fs:[00000030h]5_2_0306E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030EA456 mov eax, dword ptr fs:[00000030h]5_2_030EA456
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0302645D mov eax, dword ptr fs:[00000030h]5_2_0302645D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305245A mov eax, dword ptr fs:[00000030h]5_2_0305245A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030BC460 mov ecx, dword ptr fs:[00000030h]5_2_030BC460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305A470 mov eax, dword ptr fs:[00000030h]5_2_0305A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305A470 mov eax, dword ptr fs:[00000030h]5_2_0305A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305A470 mov eax, dword ptr fs:[00000030h]5_2_0305A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030EA49A mov eax, dword ptr fs:[00000030h]5_2_030EA49A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030364AB mov eax, dword ptr fs:[00000030h]5_2_030364AB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030644B0 mov ecx, dword ptr fs:[00000030h]5_2_030644B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030BA4B0 mov eax, dword ptr fs:[00000030h]5_2_030BA4B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030304E5 mov ecx, dword ptr fs:[00000030h]5_2_030304E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030AEB1D mov eax, dword ptr fs:[00000030h]5_2_030AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030AEB1D mov eax, dword ptr fs:[00000030h]5_2_030AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030AEB1D mov eax, dword ptr fs:[00000030h]5_2_030AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030AEB1D mov eax, dword ptr fs:[00000030h]5_2_030AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030AEB1D mov eax, dword ptr fs:[00000030h]5_2_030AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030AEB1D mov eax, dword ptr fs:[00000030h]5_2_030AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030AEB1D mov eax, dword ptr fs:[00000030h]5_2_030AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030AEB1D mov eax, dword ptr fs:[00000030h]5_2_030AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030AEB1D mov eax, dword ptr fs:[00000030h]5_2_030AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305EB20 mov eax, dword ptr fs:[00000030h]5_2_0305EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305EB20 mov eax, dword ptr fs:[00000030h]5_2_0305EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030F8B28 mov eax, dword ptr fs:[00000030h]5_2_030F8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030F8B28 mov eax, dword ptr fs:[00000030h]5_2_030F8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030E4B4B mov eax, dword ptr fs:[00000030h]5_2_030E4B4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030E4B4B mov eax, dword ptr fs:[00000030h]5_2_030E4B4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030C6B40 mov eax, dword ptr fs:[00000030h]5_2_030C6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030C6B40 mov eax, dword ptr fs:[00000030h]5_2_030C6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030FAB40 mov eax, dword ptr fs:[00000030h]5_2_030FAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030D8B42 mov eax, dword ptr fs:[00000030h]5_2_030D8B42
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030DEB50 mov eax, dword ptr fs:[00000030h]5_2_030DEB50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0302CB7E mov eax, dword ptr fs:[00000030h]5_2_0302CB7E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03040BBE mov eax, dword ptr fs:[00000030h]5_2_03040BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03040BBE mov eax, dword ptr fs:[00000030h]5_2_03040BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030E4BB0 mov eax, dword ptr fs:[00000030h]5_2_030E4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030E4BB0 mov eax, dword ptr fs:[00000030h]5_2_030E4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03050BCB mov eax, dword ptr fs:[00000030h]5_2_03050BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03050BCB mov eax, dword ptr fs:[00000030h]5_2_03050BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03050BCB mov eax, dword ptr fs:[00000030h]5_2_03050BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03030BCD mov eax, dword ptr fs:[00000030h]5_2_03030BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03030BCD mov eax, dword ptr fs:[00000030h]5_2_03030BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03030BCD mov eax, dword ptr fs:[00000030h]5_2_03030BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030DEBD0 mov eax, dword ptr fs:[00000030h]5_2_030DEBD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03038BF0 mov eax, dword ptr fs:[00000030h]5_2_03038BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03038BF0 mov eax, dword ptr fs:[00000030h]5_2_03038BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03038BF0 mov eax, dword ptr fs:[00000030h]5_2_03038BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305EBFC mov eax, dword ptr fs:[00000030h]5_2_0305EBFC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030BCBF0 mov eax, dword ptr fs:[00000030h]5_2_030BCBF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030BCA11 mov eax, dword ptr fs:[00000030h]5_2_030BCA11
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306CA24 mov eax, dword ptr fs:[00000030h]5_2_0306CA24
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305EA2E mov eax, dword ptr fs:[00000030h]5_2_0305EA2E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03054A35 mov eax, dword ptr fs:[00000030h]5_2_03054A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03054A35 mov eax, dword ptr fs:[00000030h]5_2_03054A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306CA38 mov eax, dword ptr fs:[00000030h]5_2_0306CA38
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03036A50 mov eax, dword ptr fs:[00000030h]5_2_03036A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03036A50 mov eax, dword ptr fs:[00000030h]5_2_03036A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03036A50 mov eax, dword ptr fs:[00000030h]5_2_03036A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03036A50 mov eax, dword ptr fs:[00000030h]5_2_03036A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03036A50 mov eax, dword ptr fs:[00000030h]5_2_03036A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03036A50 mov eax, dword ptr fs:[00000030h]5_2_03036A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03036A50 mov eax, dword ptr fs:[00000030h]5_2_03036A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03040A5B mov eax, dword ptr fs:[00000030h]5_2_03040A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03040A5B mov eax, dword ptr fs:[00000030h]5_2_03040A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306CA6F mov eax, dword ptr fs:[00000030h]5_2_0306CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306CA6F mov eax, dword ptr fs:[00000030h]5_2_0306CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306CA6F mov eax, dword ptr fs:[00000030h]5_2_0306CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030DEA60 mov eax, dword ptr fs:[00000030h]5_2_030DEA60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030ACA72 mov eax, dword ptr fs:[00000030h]5_2_030ACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030ACA72 mov eax, dword ptr fs:[00000030h]5_2_030ACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303EA80 mov eax, dword ptr fs:[00000030h]5_2_0303EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303EA80 mov eax, dword ptr fs:[00000030h]5_2_0303EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303EA80 mov eax, dword ptr fs:[00000030h]5_2_0303EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303EA80 mov eax, dword ptr fs:[00000030h]5_2_0303EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303EA80 mov eax, dword ptr fs:[00000030h]5_2_0303EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303EA80 mov eax, dword ptr fs:[00000030h]5_2_0303EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303EA80 mov eax, dword ptr fs:[00000030h]5_2_0303EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303EA80 mov eax, dword ptr fs:[00000030h]5_2_0303EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303EA80 mov eax, dword ptr fs:[00000030h]5_2_0303EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03104A80 mov eax, dword ptr fs:[00000030h]5_2_03104A80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03068A90 mov edx, dword ptr fs:[00000030h]5_2_03068A90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03038AA0 mov eax, dword ptr fs:[00000030h]5_2_03038AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03038AA0 mov eax, dword ptr fs:[00000030h]5_2_03038AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03086AA4 mov eax, dword ptr fs:[00000030h]5_2_03086AA4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03086ACC mov eax, dword ptr fs:[00000030h]5_2_03086ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03086ACC mov eax, dword ptr fs:[00000030h]5_2_03086ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03086ACC mov eax, dword ptr fs:[00000030h]5_2_03086ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03030AD0 mov eax, dword ptr fs:[00000030h]5_2_03030AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03064AD0 mov eax, dword ptr fs:[00000030h]5_2_03064AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03064AD0 mov eax, dword ptr fs:[00000030h]5_2_03064AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306AAEE mov eax, dword ptr fs:[00000030h]5_2_0306AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306AAEE mov eax, dword ptr fs:[00000030h]5_2_0306AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030AE908 mov eax, dword ptr fs:[00000030h]5_2_030AE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030AE908 mov eax, dword ptr fs:[00000030h]5_2_030AE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030BC912 mov eax, dword ptr fs:[00000030h]5_2_030BC912
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03028918 mov eax, dword ptr fs:[00000030h]5_2_03028918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03028918 mov eax, dword ptr fs:[00000030h]5_2_03028918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B892A mov eax, dword ptr fs:[00000030h]5_2_030B892A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030C892B mov eax, dword ptr fs:[00000030h]5_2_030C892B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B0946 mov eax, dword ptr fs:[00000030h]5_2_030B0946
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03056962 mov eax, dword ptr fs:[00000030h]5_2_03056962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03056962 mov eax, dword ptr fs:[00000030h]5_2_03056962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03056962 mov eax, dword ptr fs:[00000030h]5_2_03056962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0307096E mov eax, dword ptr fs:[00000030h]5_2_0307096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0307096E mov edx, dword ptr fs:[00000030h]5_2_0307096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0307096E mov eax, dword ptr fs:[00000030h]5_2_0307096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030D4978 mov eax, dword ptr fs:[00000030h]5_2_030D4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030D4978 mov eax, dword ptr fs:[00000030h]5_2_030D4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030BC97C mov eax, dword ptr fs:[00000030h]5_2_030BC97C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030429A0 mov eax, dword ptr fs:[00000030h]5_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030429A0 mov eax, dword ptr fs:[00000030h]5_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030429A0 mov eax, dword ptr fs:[00000030h]5_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030429A0 mov eax, dword ptr fs:[00000030h]5_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030429A0 mov eax, dword ptr fs:[00000030h]5_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030429A0 mov eax, dword ptr fs:[00000030h]5_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030429A0 mov eax, dword ptr fs:[00000030h]5_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030429A0 mov eax, dword ptr fs:[00000030h]5_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030429A0 mov eax, dword ptr fs:[00000030h]5_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030429A0 mov eax, dword ptr fs:[00000030h]5_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030429A0 mov eax, dword ptr fs:[00000030h]5_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030429A0 mov eax, dword ptr fs:[00000030h]5_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030429A0 mov eax, dword ptr fs:[00000030h]5_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030309AD mov eax, dword ptr fs:[00000030h]5_2_030309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030309AD mov eax, dword ptr fs:[00000030h]5_2_030309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B89B3 mov esi, dword ptr fs:[00000030h]5_2_030B89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B89B3 mov eax, dword ptr fs:[00000030h]5_2_030B89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030B89B3 mov eax, dword ptr fs:[00000030h]5_2_030B89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030C69C0 mov eax, dword ptr fs:[00000030h]5_2_030C69C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303A9D0 mov eax, dword ptr fs:[00000030h]5_2_0303A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303A9D0 mov eax, dword ptr fs:[00000030h]5_2_0303A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303A9D0 mov eax, dword ptr fs:[00000030h]5_2_0303A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303A9D0 mov eax, dword ptr fs:[00000030h]5_2_0303A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303A9D0 mov eax, dword ptr fs:[00000030h]5_2_0303A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0303A9D0 mov eax, dword ptr fs:[00000030h]5_2_0303A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030649D0 mov eax, dword ptr fs:[00000030h]5_2_030649D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030FA9D3 mov eax, dword ptr fs:[00000030h]5_2_030FA9D3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030BE9E0 mov eax, dword ptr fs:[00000030h]5_2_030BE9E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030629F9 mov eax, dword ptr fs:[00000030h]5_2_030629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030629F9 mov eax, dword ptr fs:[00000030h]5_2_030629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030BC810 mov eax, dword ptr fs:[00000030h]5_2_030BC810
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03052835 mov eax, dword ptr fs:[00000030h]5_2_03052835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03052835 mov eax, dword ptr fs:[00000030h]5_2_03052835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03052835 mov eax, dword ptr fs:[00000030h]5_2_03052835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03052835 mov ecx, dword ptr fs:[00000030h]5_2_03052835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03052835 mov eax, dword ptr fs:[00000030h]5_2_03052835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03052835 mov eax, dword ptr fs:[00000030h]5_2_03052835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306A830 mov eax, dword ptr fs:[00000030h]5_2_0306A830
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030D483A mov eax, dword ptr fs:[00000030h]5_2_030D483A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030D483A mov eax, dword ptr fs:[00000030h]5_2_030D483A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03042840 mov ecx, dword ptr fs:[00000030h]5_2_03042840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03060854 mov eax, dword ptr fs:[00000030h]5_2_03060854
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03034859 mov eax, dword ptr fs:[00000030h]5_2_03034859
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03034859 mov eax, dword ptr fs:[00000030h]5_2_03034859
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030BE872 mov eax, dword ptr fs:[00000030h]5_2_030BE872
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030BE872 mov eax, dword ptr fs:[00000030h]5_2_030BE872
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030C6870 mov eax, dword ptr fs:[00000030h]5_2_030C6870
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030C6870 mov eax, dword ptr fs:[00000030h]5_2_030C6870
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03030887 mov eax, dword ptr fs:[00000030h]5_2_03030887
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030BC89D mov eax, dword ptr fs:[00000030h]5_2_030BC89D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305E8C0 mov eax, dword ptr fs:[00000030h]5_2_0305E8C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030FA8E4 mov eax, dword ptr fs:[00000030h]5_2_030FA8E4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306C8F9 mov eax, dword ptr fs:[00000030h]5_2_0306C8F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306C8F9 mov eax, dword ptr fs:[00000030h]5_2_0306C8F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_030E6F00 mov eax, dword ptr fs:[00000030h]5_2_030E6F00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_03032F12 mov eax, dword ptr fs:[00000030h]5_2_03032F12
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0306CF1F mov eax, dword ptr fs:[00000030h]5_2_0306CF1F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 5_2_0305EF28 mov eax, dword ptr fs:[00000030h]5_2_0305EF28
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0044A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_0044A66C
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00438189 SetUnhandledExceptionFilter,0_2_00438189
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_004381AC SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004381AC

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\LOI REQUEST.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\LOI REQUEST.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 4C2008Jump to behavior
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0044B106 LogonUserW,0_2_0044B106
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00413D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00413D19
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0045411C SendInput,keybd_event,0_2_0045411C
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_004574E7 mouse_event,0_2_004574E7
          Source: C:\Users\user\Desktop\LOI REQUEST.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\LOI REQUEST.exe"Jump to behavior
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0044A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_0044A66C
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_004571FA AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_004571FA
          Source: LOI REQUEST.exeBinary or memory string: Shell_TrayWnd
          Source: LOI REQUEST.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndTHISREMOVEblankinfoquestionstopwarning
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_004365C4 cpuid 0_2_004365C4
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0046091D GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,__wsplitpath,_wcscat,_wcscat,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,_wcscpy,SetCurrentDirectoryW,0_2_0046091D
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0048B340 GetUserNameW,0_2_0048B340
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00441E8E __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00441E8E
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0042DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_0042DDC0

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 5.2.svchost.exe.3a0000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.svchost.exe.3a0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.1698285609.00000000003A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.1698899133.0000000003350000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: LOI REQUEST.exeBinary or memory string: WIN_81
          Source: LOI REQUEST.exeBinary or memory string: WIN_XP
          Source: LOI REQUEST.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 12, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubytep
          Source: LOI REQUEST.exeBinary or memory string: WIN_XPe
          Source: LOI REQUEST.exeBinary or memory string: WIN_VISTA
          Source: LOI REQUEST.exeBinary or memory string: WIN_7
          Source: LOI REQUEST.exeBinary or memory string: WIN_8

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 5.2.svchost.exe.3a0000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.svchost.exe.3a0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.1698285609.00000000003A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.1698899133.0000000003350000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_00468C4F socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00468C4F
          Source: C:\Users\user\Desktop\LOI REQUEST.exeCode function: 0_2_0046923B socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_0046923B
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure2
          Valid Accounts
          2
          Native API
          2
          Valid Accounts
          2
          Valid Accounts
          2
          Valid Accounts
          11
          Input Capture
          2
          System Time Discovery
          Remote Services11
          Input Capture
          1
          Encrypted Channel
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          DLL Side-Loading
          1
          Exploitation for Privilege Escalation
          1
          Disable or Modify Tools
          LSASS Memory15
          Security Software Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          1
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)21
          Access Token Manipulation
          2
          Virtualization/Sandbox Evasion
          Security Account Manager2
          Virtualization/Sandbox Evasion
          SMB/Windows Admin Shares3
          Clipboard Data
          SteganographyAutomated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook212
          Process Injection
          21
          Access Token Manipulation
          NTDS3
          Process Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
          DLL Side-Loading
          212
          Process Injection
          LSA Secrets1
          Application Window Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Deobfuscate/Decode Files or Information
          Cached Domain Credentials1
          Account Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
          Obfuscated Files or Information
          DCSync1
          System Owner/User Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          DLL Side-Loading
          Proc Filesystem1
          File and Directory Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow115
          System Information Discovery
          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          LOI REQUEST.exe53%ReversingLabsWin32.Trojan.AutoitInject
          LOI REQUEST.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No contacted domains info
          No contacted IP infos
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1562310
          Start date and time:2024-11-25 13:50:07 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 6m 9s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:14
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:LOI REQUEST.exe
          Detection:MAL
          Classification:mal80.troj.evad.winEXE@3/2@0/0
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 98%
          • Number of executed functions: 48
          • Number of non-executed functions: 302
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
          • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size exceeded maximum capacity and may have missing disassembly code.
          • VT rate limit hit for: LOI REQUEST.exe
          TimeTypeDescription
          09:42:45API Interceptor3x Sleep call for process: svchost.exe modified
          No context
          No context
          No context
          No context
          No context
          Process:C:\Users\user\Desktop\LOI REQUEST.exe
          File Type:data
          Category:dropped
          Size (bytes):289280
          Entropy (8bit):7.994135352598386
          Encrypted:true
          SSDEEP:6144:xRCNSsZeytuVfVDixkp/Uv98iYEmNlkRvf8q66Ztg2A7pHq:xRwSsTtuVfB0kpGFYEmNmBi9ddHq
          MD5:4AF134549716B3B7E18C193FAC24C499
          SHA1:27E4AE9407BE0CCD5F316FB80AE6F4DF76C964B1
          SHA-256:17B6458669C5383E200A60A7CB1252EDAC53E25490A95D9151E321D75362FD75
          SHA-512:D90BCF46CDD2A93582B5F498D9163509692621B2121F475E1BFD1FA9EE8E424CDD4914FC3E623871167782EF8318F163068E29754D833CE755A4BF028531473E
          Malicious:false
          Reputation:low
          Preview:...R4EVW5WM1..WU.CSSUA1J.9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AA.R7EXH.YM.H.v.3..r.)X9jI+ZP3 ;rT$89^#mS$z% \c:=u.~.jT6QRoL[X.EVW1WM18[^..#4.h!V.wY>.-..hW".M....!=.O..o5&..#Z1.W&.VR7EVW1W.tAZ.T3C..<.1JJ9Y57A.VP6NW\1W.5AZWU2CSSU."JJ9I57A1RR7E.W1GM1AXWU4CSSUA1JL9Y57AAVRGAVW3WM1AZWW2..SUQ1JZ9Y57QAVB7EVW1W]1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9wAR95VR7..S1W]1AZ.Q2CCSUA1JJ9Y57AAVR.EV71WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZ
          Process:C:\Users\user\Desktop\LOI REQUEST.exe
          File Type:data
          Category:modified
          Size (bytes):289280
          Entropy (8bit):7.994135352598386
          Encrypted:true
          SSDEEP:6144:xRCNSsZeytuVfVDixkp/Uv98iYEmNlkRvf8q66Ztg2A7pHq:xRwSsTtuVfB0kpGFYEmNmBi9ddHq
          MD5:4AF134549716B3B7E18C193FAC24C499
          SHA1:27E4AE9407BE0CCD5F316FB80AE6F4DF76C964B1
          SHA-256:17B6458669C5383E200A60A7CB1252EDAC53E25490A95D9151E321D75362FD75
          SHA-512:D90BCF46CDD2A93582B5F498D9163509692621B2121F475E1BFD1FA9EE8E424CDD4914FC3E623871167782EF8318F163068E29754D833CE755A4BF028531473E
          Malicious:false
          Reputation:low
          Preview:...R4EVW5WM1..WU.CSSUA1J.9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AA.R7EXH.YM.H.v.3..r.)X9jI+ZP3 ;rT$89^#mS$z% \c:=u.~.jT6QRoL[X.EVW1WM18[^..#4.h!V.wY>.-..hW".M....!=.O..o5&..#Z1.W&.VR7EVW1W.tAZ.T3C..<.1JJ9Y57A.VP6NW\1W.5AZWU2CSSU."JJ9I57A1RR7E.W1GM1AXWU4CSSUA1JL9Y57AAVRGAVW3WM1AZWW2..SUQ1JZ9Y57QAVB7EVW1W]1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9wAR95VR7..S1W]1AZ.Q2CCSUA1JJ9Y57AAVR.EV71WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57AAVR7EVW1WM1AZ
          File type:PE32 executable (GUI) Intel 80386, for MS Windows
          Entropy (8bit):7.144254426296748
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.96%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:LOI REQUEST.exe
          File size:1'209'344 bytes
          MD5:8dad2a83f4440c44bbb9a47c18752626
          SHA1:8d702707d4fe17b7bbe96fdcb20e3cdd6e5d0104
          SHA256:fce3183e9d396e2fe176392fbdcd765daa5154aa9187a7dbbdde77c38dd1e079
          SHA512:698461900e7ecf982612d11177557a2f6621029f40f9ea121ab800190ea8cc06e5739221a55c1b425f823c9abfa1c684e3d5260d30e696896495461387c31275
          SSDEEP:24576:4tb20pkaCqT5TBWgNQ7ax8wnHQI70svAikIV6A:BVg5tQ7ax8oHQ3Zc5
          TLSH:0345C01363DD8361C3B25273BA55BB41BEBF782506B5F96B2FD4093DA820122521EB73
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d..............'.a.....H.k.....H.h.....H.i......}%......}5...............~.......k.......o.......1.......j.....Rich...........
          Icon Hash:aaf3e3e3938382a0
          Entrypoint:0x425f74
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
          Time Stamp:0x6743BE51 [Mon Nov 25 00:01:21 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:5
          OS Version Minor:1
          File Version Major:5
          File Version Minor:1
          Subsystem Version Major:5
          Subsystem Version Minor:1
          Import Hash:3d95adbf13bbe79dc24dccb401c12091
          Instruction
          call 00007F4D6497C95Fh
          jmp 00007F4D6496F974h
          int3
          int3
          push edi
          push esi
          mov esi, dword ptr [esp+10h]
          mov ecx, dword ptr [esp+14h]
          mov edi, dword ptr [esp+0Ch]
          mov eax, ecx
          mov edx, ecx
          add eax, esi
          cmp edi, esi
          jbe 00007F4D6496FAFAh
          cmp edi, eax
          jc 00007F4D6496FE5Eh
          bt dword ptr [004C0158h], 01h
          jnc 00007F4D6496FAF9h
          rep movsb
          jmp 00007F4D6496FE0Ch
          cmp ecx, 00000080h
          jc 00007F4D6496FCC4h
          mov eax, edi
          xor eax, esi
          test eax, 0000000Fh
          jne 00007F4D6496FB00h
          bt dword ptr [004BA370h], 01h
          jc 00007F4D6496FFD0h
          bt dword ptr [004C0158h], 00000000h
          jnc 00007F4D6496FC9Dh
          test edi, 00000003h
          jne 00007F4D6496FCAEh
          test esi, 00000003h
          jne 00007F4D6496FC8Dh
          bt edi, 02h
          jnc 00007F4D6496FAFFh
          mov eax, dword ptr [esi]
          sub ecx, 04h
          lea esi, dword ptr [esi+04h]
          mov dword ptr [edi], eax
          lea edi, dword ptr [edi+04h]
          bt edi, 03h
          jnc 00007F4D6496FB03h
          movq xmm1, qword ptr [esi]
          sub ecx, 08h
          lea esi, dword ptr [esi+08h]
          movq qword ptr [edi], xmm1
          lea edi, dword ptr [edi+08h]
          test esi, 00000007h
          je 00007F4D6496FB55h
          bt esi, 03h
          jnc 00007F4D6496FBA8h
          movdqa xmm1, dqword ptr [esi+00h]
          Programming Language:
          • [ C ] VS2008 SP1 build 30729
          • [IMP] VS2008 SP1 build 30729
          • [ASM] VS2012 UPD4 build 61030
          • [RES] VS2012 UPD4 build 61030
          • [LNK] VS2012 UPD4 build 61030
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0xb70040x17c.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0xc40000x5e2a4.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x1230000x6c4c.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x8d8d00x1c.rdata
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb27300x40.rdata
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x8d0000x860.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x8b54f0x8b600f437a6545e938612764dbb0a314376fcFalse0.5699499019058296data6.680413749210956IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x8d0000x2cc420x2ce00827ffd24759e8e420890ecf164be989eFalse0.330464397632312data5.770192333189168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0xba0000x9d540x6200e0a519f8e3a35fae0d9c2cfd5a4bacfcFalse0.16402264030612246data2.002691099965349IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0xc40000x5e2a40x5e40052a60b27a105957e403a19ddd687d1fcFalse0.9320214066644562data7.905147334926679IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x1230000xa4740xa6000bc98f8631ef0bde830a7f83bb06ff08False0.5017884036144579data5.245426654116355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_ICON0xc44a00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
          RT_ICON0xc45c80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
          RT_ICON0xc48b00x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
          RT_ICON0xc49d80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
          RT_ICON0xc58800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
          RT_ICON0xc61280x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
          RT_ICON0xc66900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
          RT_ICON0xc8c380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
          RT_ICON0xc9ce00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
          RT_STRING0xca1480x594dataEnglishGreat Britain0.3333333333333333
          RT_STRING0xca6dc0x68adataEnglishGreat Britain0.2747909199522103
          RT_STRING0xcad680x490dataEnglishGreat Britain0.3715753424657534
          RT_STRING0xcb1f80x5fcdataEnglishGreat Britain0.3087467362924282
          RT_STRING0xcb7f40x65cdataEnglishGreat Britain0.34336609336609336
          RT_STRING0xcbe500x466dataEnglishGreat Britain0.3605683836589698
          RT_STRING0xcc2b80x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
          RT_RCDATA0xcc4100x5597bdata1.0003308736490515
          RT_GROUP_ICON0x121d8c0x76dataEnglishGreat Britain0.6610169491525424
          RT_GROUP_ICON0x121e040x14dataEnglishGreat Britain1.15
          RT_VERSION0x121e180xdcdataEnglishGreat Britain0.6181818181818182
          RT_MANIFEST0x121ef40x3b0ASCII text, with CRLF line terminatorsEnglishGreat Britain0.5116525423728814
          DLLImport
          WSOCK32.dll__WSAFDIsSet, recv, send, setsockopt, ntohs, recvfrom, select, WSAStartup, htons, accept, listen, bind, closesocket, connect, WSACleanup, ioctlsocket, sendto, WSAGetLastError, inet_addr, gethostbyname, gethostname, socket
          VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
          COMCTL32.dllImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_Create, InitCommonControlsEx, ImageList_ReplaceIcon
          MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
          WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetConnectW, InternetQueryDataAvailable
          PSAPI.DLLGetProcessMemoryInfo
          IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
          USERENV.dllUnloadUserProfile, DestroyEnvironmentBlock, CreateEnvironmentBlock, LoadUserProfileW
          UxTheme.dllIsThemeActive
          KERNEL32.dllHeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetCurrentThread, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, DeleteCriticalSection, WaitForSingleObject, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, CloseHandle, GetLastError, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, RaiseException, InitializeCriticalSectionAndSpinCount, InterlockedDecrement, InterlockedIncrement, CreateThread, DuplicateHandle, EnterCriticalSection, GetCurrentProcess, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, HeapSize, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, SetFilePointer, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, HeapReAlloc, WriteConsoleW, SetEndOfFile, DeleteFileW, SetEnvironmentVariableA
          USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, DrawMenuBar, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, MonitorFromRect, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, CopyImage, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, UnregisterHotKey, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, DeleteMenu, PeekMessageW, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, CharLowerBuffW, GetWindowTextW
          GDI32.dllSetPixel, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, GetDeviceCaps, CloseFigure, LineTo, AngleArc, CreateCompatibleBitmap, CreateCompatibleDC, MoveToEx, Ellipse, PolyDraw, BeginPath, SelectObject, StretchBlt, GetDIBits, DeleteDC, GetPixel, CreateDCW, GetStockObject, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, EndPath
          COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
          ADVAPI32.dllGetAclInformation, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, InitiateSystemShutdownExW, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, SetSecurityDescriptorDacl, AddAce, GetAce
          SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
          ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
          OLEAUT32.dllRegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, UnRegisterTypeLib, SafeArrayCreateVector, SysAllocString, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, QueryPathOfRegTypeLib, VariantCopy, VariantClear, CreateDispTypeInfo, CreateStdDispatch, DispCallFunc, VariantChangeType, SafeArrayAllocDescriptorEx, VariantInit
          Language of compilation systemCountry where language is spokenMap
          EnglishGreat Britain
          No network behavior found

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:07:51:01
          Start date:25/11/2024
          Path:C:\Users\user\Desktop\LOI REQUEST.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\LOI REQUEST.exe"
          Imagebase:0x410000
          File size:1'209'344 bytes
          MD5 hash:8DAD2A83F4440C44BBB9A47C18752626
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:5
          Start time:07:51:02
          Start date:25/11/2024
          Path:C:\Windows\SysWOW64\svchost.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\LOI REQUEST.exe"
          Imagebase:0x770000
          File size:46'504 bytes
          MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.1698285609.00000000003A0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.1698899133.0000000003350000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
          Reputation:high
          Has exited:true

          Reset < >

            Execution Graph

            Execution Coverage:3.7%
            Dynamic/Decrypted Code Coverage:0.9%
            Signature Coverage:6.6%
            Total number of Nodes:1946
            Total number of Limit Nodes:150
            execution_graph 92829 488eb8 92833 45a635 92829->92833 92831 488ec3 92832 45a635 84 API calls 92831->92832 92832->92831 92834 45a66f 92833->92834 92839 45a642 92833->92839 92834->92831 92835 45a671 92874 42ec4e 81 API calls 92835->92874 92836 45a676 92844 41936c 92836->92844 92839->92834 92839->92835 92839->92836 92842 45a669 92839->92842 92840 45a67d 92864 41510d 92840->92864 92873 424525 61 API calls _memcpy_s 92842->92873 92845 419384 92844->92845 92862 419380 92844->92862 92846 484cbd __i64tow 92845->92846 92847 484bbf 92845->92847 92848 419398 92845->92848 92856 4193b0 __itow Mailbox _wcscpy 92845->92856 92849 484bc8 92847->92849 92850 484ca5 92847->92850 92875 43172b 80 API calls 3 library calls 92848->92875 92855 484be7 92849->92855 92849->92856 92891 43172b 80 API calls 3 library calls 92850->92891 92854 4193ba 92854->92862 92885 41ce19 92854->92885 92857 42f4ea 48 API calls 92855->92857 92876 42f4ea 92856->92876 92859 484c04 92857->92859 92860 42f4ea 48 API calls 92859->92860 92861 484c2a 92860->92861 92861->92862 92863 41ce19 48 API calls 92861->92863 92862->92840 92863->92862 92865 41511f 92864->92865 92866 481be7 92864->92866 92925 41b384 92865->92925 92934 44a58f 48 API calls _memcpy_s 92866->92934 92869 41512b 92869->92834 92870 481bf1 92935 416eed 92870->92935 92872 481bf9 Mailbox 92873->92834 92874->92836 92875->92856 92878 42f4f2 __calloc_impl 92876->92878 92879 42f50c 92878->92879 92880 42f50e std::exception::exception 92878->92880 92892 43395c 92878->92892 92879->92854 92906 436805 RaiseException 92880->92906 92882 42f538 92907 43673b 47 API calls _free 92882->92907 92884 42f54a 92884->92854 92886 41ce28 __NMSG_WRITE 92885->92886 92914 42ee75 92886->92914 92888 41ce50 _memcpy_s 92889 42f4ea 48 API calls 92888->92889 92890 41ce66 92889->92890 92890->92862 92891->92856 92893 4339d7 __calloc_impl 92892->92893 92895 433968 __calloc_impl 92892->92895 92913 437c0e 47 API calls __getptd_noexit 92893->92913 92894 433973 92894->92895 92908 4381c2 47 API calls 2 library calls 92894->92908 92909 43821f 47 API calls 6 library calls 92894->92909 92910 431145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 92894->92910 92895->92894 92898 43399b RtlAllocateHeap 92895->92898 92901 4339c3 92895->92901 92904 4339c1 92895->92904 92898->92895 92899 4339cf 92898->92899 92899->92878 92911 437c0e 47 API calls __getptd_noexit 92901->92911 92912 437c0e 47 API calls __getptd_noexit 92904->92912 92906->92882 92907->92884 92908->92894 92909->92894 92911->92904 92912->92899 92913->92899 92916 42f4ea __calloc_impl 92914->92916 92915 43395c _W_store_winword 47 API calls 92915->92916 92916->92915 92917 42f50c 92916->92917 92918 42f50e std::exception::exception 92916->92918 92917->92888 92923 436805 RaiseException 92918->92923 92920 42f538 92924 43673b 47 API calls _free 92920->92924 92922 42f54a 92922->92888 92923->92920 92924->92922 92926 41b392 92925->92926 92933 41b3c5 _memcpy_s 92925->92933 92927 41b3b8 92926->92927 92928 41b3fd 92926->92928 92926->92933 92939 41bb85 92927->92939 92929 42f4ea 48 API calls 92928->92929 92931 41b407 92929->92931 92932 42f4ea 48 API calls 92931->92932 92932->92933 92933->92869 92934->92870 92936 416f00 92935->92936 92937 416ef8 92935->92937 92936->92872 92944 41dd47 48 API calls _memcpy_s 92937->92944 92940 41bb9b 92939->92940 92943 41bb96 _memcpy_s 92939->92943 92941 42ee75 48 API calls 92940->92941 92942 481b77 92940->92942 92941->92943 92942->92942 92943->92933 92944->92936 92945 41b7b1 92954 41c62c 92945->92954 92947 41b7c2 92952 41b7ec 92947->92952 92962 41bc74 92947->92962 92948 41ba85 48 API calls 92953 41b6b7 Mailbox 92948->92953 92952->92948 92974 41bcce 92954->92974 92956 41c63b 92957 4839fd 92956->92957 92959 41c799 48 API calls 92956->92959 92960 41c68b 92956->92960 92980 4526bc 88 API calls 4 library calls 92957->92980 92959->92956 92960->92947 92961 483a0b 92963 41bc84 92962->92963 92964 42f4ea 48 API calls 92963->92964 92965 41b7e0 92964->92965 92966 41ba85 92965->92966 92967 41bb25 92966->92967 92973 41ba98 _memcpy_s 92966->92973 92969 42f4ea 48 API calls 92967->92969 92968 42f4ea 48 API calls 92970 41ba9f 92968->92970 92969->92973 92971 42f4ea 48 API calls 92970->92971 92972 41bac8 92970->92972 92971->92972 92972->92952 92973->92968 92975 41bce8 92974->92975 92976 41bcdb 92974->92976 92977 42f4ea 48 API calls 92975->92977 92976->92956 92978 41bcf2 92977->92978 92979 42ee75 48 API calls 92978->92979 92979->92976 92980->92961 92981 4819ba 92986 42c75a 92981->92986 92985 4819c9 92994 41d7f7 92986->92994 92991 42c865 92992 42c881 92991->92992 93002 42d1fa 48 API calls _memcpy_s 92991->93002 92993 430f0a 52 API calls __cinit 92992->92993 92993->92985 92995 42f4ea 48 API calls 92994->92995 92996 41d818 92995->92996 92997 42f4ea 48 API calls 92996->92997 92998 41d826 92997->92998 92999 42d26c 92998->92999 93003 42d298 92999->93003 93002->92991 93004 42d28b 93003->93004 93005 42d2a5 93003->93005 93004->92991 93005->93004 93006 42d2ac RegOpenKeyExW 93005->93006 93006->93004 93007 42d2c6 RegQueryValueExW 93006->93007 93008 42d2fc RegCloseKey 93007->93008 93009 42d2e7 93007->93009 93008->93004 93009->93008 93010 413742 93011 41374b 93010->93011 93012 413769 93011->93012 93013 4137c8 93011->93013 93051 4137c6 93011->93051 93017 413776 93012->93017 93018 41382c PostQuitMessage 93012->93018 93015 481e00 93013->93015 93016 4137ce 93013->93016 93014 4137ab DefWindowProcW 93044 4137b9 93014->93044 93065 412ff6 16 API calls 93015->93065 93019 4137d3 93016->93019 93020 4137f6 SetTimer RegisterWindowMessageW 93016->93020 93022 481e88 93017->93022 93023 413781 93017->93023 93018->93044 93024 481da3 93019->93024 93025 4137da KillTimer 93019->93025 93027 41381f CreatePopupMenu 93020->93027 93020->93044 93071 454ddd 60 API calls _memset 93022->93071 93028 413836 93023->93028 93029 413789 93023->93029 93031 481da8 93024->93031 93032 481ddc MoveWindow 93024->93032 93062 413847 Shell_NotifyIconW _memset 93025->93062 93026 481e27 93066 42e312 335 API calls Mailbox 93026->93066 93027->93044 93055 42eb83 93028->93055 93035 413794 93029->93035 93040 481e6d 93029->93040 93037 481dcb SetFocus 93031->93037 93038 481dac 93031->93038 93032->93044 93041 41379f 93035->93041 93042 481e58 93035->93042 93037->93044 93038->93041 93045 481db5 93038->93045 93039 4137ed 93063 41390f DeleteObject DestroyWindow Mailbox 93039->93063 93040->93014 93070 44a5f3 48 API calls 93040->93070 93041->93014 93067 413847 Shell_NotifyIconW _memset 93041->93067 93069 4555bd 70 API calls _memset 93042->93069 93043 481e9a 93043->93014 93043->93044 93064 412ff6 16 API calls 93045->93064 93050 481e68 93050->93044 93051->93014 93053 481e4c 93068 414ffc 67 API calls _memset 93053->93068 93056 42eb9a _memset 93055->93056 93057 42ec1c 93055->93057 93072 4151af 93056->93072 93057->93044 93059 42ec05 KillTimer SetTimer 93059->93057 93060 42ebc1 93060->93059 93061 483c7a Shell_NotifyIconW 93060->93061 93061->93059 93062->93039 93063->93044 93064->93044 93065->93026 93066->93041 93067->93053 93068->93051 93069->93050 93070->93051 93071->93043 93073 4152a2 Mailbox 93072->93073 93074 4151cb 93072->93074 93073->93060 93094 416b0f 93074->93094 93077 4151e6 93099 416a63 93077->93099 93078 483ca1 LoadStringW 93081 483cbb 93078->93081 93080 4151fb 93080->93081 93082 41520c 93080->93082 93083 41510d 48 API calls 93081->93083 93084 4152a7 93082->93084 93085 415216 93082->93085 93088 483cc5 93083->93088 93086 416eed 48 API calls 93084->93086 93087 41510d 48 API calls 93085->93087 93091 415220 _memset _wcscpy 93086->93091 93087->93091 93088->93091 93110 41518c 93088->93110 93090 483ce7 93092 41518c 48 API calls 93090->93092 93093 415288 Shell_NotifyIconW 93091->93093 93092->93091 93093->93073 93095 42f4ea 48 API calls 93094->93095 93096 416b34 93095->93096 93120 416b4a 93096->93120 93100 416adf 93099->93100 93103 416a6f __NMSG_WRITE 93099->93103 93124 41b18b 93100->93124 93102 416ab6 _memcpy_s 93102->93080 93104 416ad7 93103->93104 93105 416a8b 93103->93105 93123 41c369 48 API calls 93104->93123 93107 416b4a 48 API calls 93105->93107 93108 416a95 93107->93108 93109 42ee75 48 API calls 93108->93109 93109->93102 93111 415197 93110->93111 93112 481ace 93111->93112 93113 41519f 93111->93113 93115 416b4a 48 API calls 93112->93115 93134 415130 93113->93134 93117 481adb __NMSG_WRITE 93115->93117 93116 4151aa 93116->93090 93118 42ee75 48 API calls 93117->93118 93119 481b07 _memcpy_s 93118->93119 93121 42f4ea 48 API calls 93120->93121 93122 4151d9 93121->93122 93122->93077 93122->93078 93123->93102 93125 41b199 93124->93125 93127 41b1a2 _memcpy_s 93124->93127 93125->93127 93128 41bdfa 93125->93128 93127->93102 93129 41be0d 93128->93129 93133 41be0a _memcpy_s 93128->93133 93130 42f4ea 48 API calls 93129->93130 93131 41be17 93130->93131 93132 42ee75 48 API calls 93131->93132 93132->93133 93133->93127 93135 41513f __NMSG_WRITE 93134->93135 93136 415151 93135->93136 93137 481b27 93135->93137 93139 41bb85 48 API calls 93136->93139 93138 416b4a 48 API calls 93137->93138 93140 481b34 93138->93140 93141 41515e _memcpy_s 93139->93141 93142 42ee75 48 API calls 93140->93142 93141->93116 93143 481b57 _memcpy_s 93142->93143 93144 48197b 93149 42dd94 93144->93149 93148 48198a 93150 42f4ea 48 API calls 93149->93150 93151 42dd9c 93150->93151 93152 42ddb0 93151->93152 93157 42df3d 93151->93157 93156 430f0a 52 API calls __cinit 93152->93156 93156->93148 93158 42df46 93157->93158 93159 42dda8 93157->93159 93189 430f0a 52 API calls __cinit 93158->93189 93161 42ddc0 93159->93161 93162 41d7f7 48 API calls 93161->93162 93163 42ddd7 GetVersionExW 93162->93163 93164 416a63 48 API calls 93163->93164 93165 42de1a 93164->93165 93190 42dfb4 93165->93190 93170 4824c8 93172 42debb 93174 42dee3 93172->93174 93175 42df31 GetSystemInfo 93172->93175 93173 42dea4 GetCurrentProcess 93207 42df5f LoadLibraryA GetProcAddress 93173->93207 93201 42e00c 93174->93201 93178 42df0e 93175->93178 93181 42df21 93178->93181 93182 42df1c FreeLibrary 93178->93182 93181->93152 93182->93181 93183 42df29 GetSystemInfo 93186 42df03 93183->93186 93184 42def9 93204 42dff4 93184->93204 93186->93178 93188 42df09 FreeLibrary 93186->93188 93188->93178 93189->93159 93191 42dfbd 93190->93191 93192 41b18b 48 API calls 93191->93192 93193 42de22 93192->93193 93194 416571 93193->93194 93195 41657f 93194->93195 93196 41b18b 48 API calls 93195->93196 93197 41658f 93196->93197 93197->93170 93198 42df77 93197->93198 93208 42df89 93198->93208 93212 42e01e 93201->93212 93205 42e00c 2 API calls 93204->93205 93206 42df01 GetNativeSystemInfo 93205->93206 93206->93186 93207->93172 93209 42dea0 93208->93209 93210 42df92 LoadLibraryA 93208->93210 93209->93172 93209->93173 93210->93209 93211 42dfa3 GetProcAddress 93210->93211 93211->93209 93213 42def1 93212->93213 93214 42e027 LoadLibraryA 93212->93214 93213->93183 93213->93184 93214->93213 93215 42e038 GetProcAddress 93214->93215 93215->93213 93216 4819cb 93221 412322 93216->93221 93218 4819d1 93254 430f0a 52 API calls __cinit 93218->93254 93220 4819db 93222 412344 93221->93222 93255 4126df 93222->93255 93227 41d7f7 48 API calls 93228 412384 93227->93228 93229 41d7f7 48 API calls 93228->93229 93230 41238e 93229->93230 93231 41d7f7 48 API calls 93230->93231 93232 412398 93231->93232 93233 41d7f7 48 API calls 93232->93233 93234 4123de 93233->93234 93235 41d7f7 48 API calls 93234->93235 93236 4124c1 93235->93236 93263 41263f 93236->93263 93240 4124f1 93241 41d7f7 48 API calls 93240->93241 93242 4124fb 93241->93242 93292 412745 93242->93292 93244 412546 93245 412556 GetStdHandle 93244->93245 93246 4125b1 93245->93246 93247 48501d 93245->93247 93248 4125b7 CoInitialize 93246->93248 93247->93246 93249 485026 93247->93249 93248->93218 93299 4592d4 53 API calls 93249->93299 93251 48502d 93300 4599f9 CreateThread 93251->93300 93253 485039 CloseHandle 93253->93248 93254->93220 93301 412854 93255->93301 93258 416a63 48 API calls 93259 41234a 93258->93259 93260 41272e 93259->93260 93315 4127ec 6 API calls 93260->93315 93262 41237a 93262->93227 93264 41d7f7 48 API calls 93263->93264 93265 41264f 93264->93265 93266 41d7f7 48 API calls 93265->93266 93267 412657 93266->93267 93316 4126a7 93267->93316 93270 4126a7 48 API calls 93271 412667 93270->93271 93272 41d7f7 48 API calls 93271->93272 93273 412672 93272->93273 93274 42f4ea 48 API calls 93273->93274 93275 4124cb 93274->93275 93276 4122a4 93275->93276 93277 4122b2 93276->93277 93278 41d7f7 48 API calls 93277->93278 93279 4122bd 93278->93279 93280 41d7f7 48 API calls 93279->93280 93281 4122c8 93280->93281 93282 41d7f7 48 API calls 93281->93282 93283 4122d3 93282->93283 93284 41d7f7 48 API calls 93283->93284 93285 4122de 93284->93285 93286 4126a7 48 API calls 93285->93286 93287 4122e9 93286->93287 93288 42f4ea 48 API calls 93287->93288 93289 4122f0 93288->93289 93290 4122f9 RegisterWindowMessageW 93289->93290 93291 481fe7 93289->93291 93290->93240 93293 412755 93292->93293 93294 485f4d 93292->93294 93296 42f4ea 48 API calls 93293->93296 93321 45c942 50 API calls 93294->93321 93298 41275d 93296->93298 93297 485f58 93298->93244 93299->93251 93300->93253 93322 4599df 54 API calls 93300->93322 93308 412870 93301->93308 93304 412870 48 API calls 93305 412864 93304->93305 93306 41d7f7 48 API calls 93305->93306 93307 412716 93306->93307 93307->93258 93309 41d7f7 48 API calls 93308->93309 93310 41287b 93309->93310 93311 41d7f7 48 API calls 93310->93311 93312 412883 93311->93312 93313 41d7f7 48 API calls 93312->93313 93314 41285c 93313->93314 93314->93304 93315->93262 93317 41d7f7 48 API calls 93316->93317 93318 4126b0 93317->93318 93319 41d7f7 48 API calls 93318->93319 93320 41265f 93319->93320 93320->93270 93321->93297 93323 489bec 93327 420ae0 _memcpy_s Mailbox 93323->93327 93325 42f4ea 48 API calls 93325->93327 93326 421526 Mailbox 93408 45cc5c 86 API calls 4 library calls 93326->93408 93327->93325 93327->93326 93331 41ffe1 Mailbox 93327->93331 93351 41ce19 48 API calls 93327->93351 93354 41fec8 93327->93354 93360 48a706 93327->93360 93362 4497ed InterlockedDecrement 93327->93362 93365 470d1d 93327->93365 93368 470d09 93327->93368 93373 41fe30 93327->93373 93402 46ef61 82 API calls 2 library calls 93327->93402 93403 46f0ac 90 API calls Mailbox 93327->93403 93404 45a6ef 48 API calls 93327->93404 93405 46e822 335 API calls Mailbox 93327->93405 93330 420509 93411 45cc5c 86 API calls 4 library calls 93330->93411 93332 42146e 93342 416eed 48 API calls 93332->93342 93336 416eed 48 API calls 93336->93354 93337 42f4ea 48 API calls 93337->93354 93338 48a922 93340 48a246 93345 416eed 48 API calls 93340->93345 93341 421473 93410 45cc5c 86 API calls 4 library calls 93341->93410 93342->93331 93345->93331 93346 48a873 93347 48a30e 93347->93331 93406 4497ed InterlockedDecrement 93347->93406 93348 4497ed InterlockedDecrement 93348->93354 93349 41d7f7 48 API calls 93349->93354 93350 430f0a 52 API calls __cinit 93350->93354 93351->93327 93353 48a973 93412 45cc5c 86 API calls 4 library calls 93353->93412 93354->93330 93354->93331 93354->93332 93354->93336 93354->93337 93354->93340 93354->93341 93354->93347 93354->93348 93354->93349 93354->93350 93354->93353 93358 4215b5 93354->93358 93371 421820 335 API calls 2 library calls 93354->93371 93372 421d10 59 API calls Mailbox 93354->93372 93356 48a982 93409 45cc5c 86 API calls 4 library calls 93358->93409 93407 45cc5c 86 API calls 4 library calls 93360->93407 93362->93327 93413 46f8ae 93365->93413 93367 470d2d 93367->93327 93369 46f8ae 129 API calls 93368->93369 93370 470d19 93369->93370 93370->93327 93371->93354 93372->93354 93374 41fe50 93373->93374 93398 41fe7e 93373->93398 93375 42f4ea 48 API calls 93374->93375 93375->93398 93376 430f0a 52 API calls __cinit 93376->93398 93377 42146e 93378 416eed 48 API calls 93377->93378 93399 41ffe1 93378->93399 93379 4497ed InterlockedDecrement 93379->93398 93380 42f4ea 48 API calls 93380->93398 93381 41d7f7 48 API calls 93381->93398 93382 420509 93535 45cc5c 86 API calls 4 library calls 93382->93535 93386 48a922 93386->93327 93387 421473 93534 45cc5c 86 API calls 4 library calls 93387->93534 93388 48a246 93390 416eed 48 API calls 93388->93390 93390->93399 93392 416eed 48 API calls 93392->93398 93393 48a873 93393->93327 93394 48a30e 93394->93399 93532 4497ed InterlockedDecrement 93394->93532 93396 48a973 93536 45cc5c 86 API calls 4 library calls 93396->93536 93398->93376 93398->93377 93398->93379 93398->93380 93398->93381 93398->93382 93398->93387 93398->93388 93398->93392 93398->93394 93398->93396 93398->93399 93401 4215b5 93398->93401 93530 421820 335 API calls 2 library calls 93398->93530 93531 421d10 59 API calls Mailbox 93398->93531 93399->93327 93400 48a982 93533 45cc5c 86 API calls 4 library calls 93401->93533 93402->93327 93403->93327 93404->93327 93405->93327 93406->93331 93407->93326 93408->93331 93409->93331 93410->93346 93411->93338 93412->93356 93414 41936c 81 API calls 93413->93414 93415 46f8ea 93414->93415 93416 46f92c Mailbox 93415->93416 93449 470567 93415->93449 93416->93367 93418 46fb8b 93419 46fcfa 93418->93419 93423 46fb95 93418->93423 93512 470688 89 API calls Mailbox 93419->93512 93422 46fd07 93422->93423 93425 46fd13 93422->93425 93462 46f70a 93423->93462 93424 41936c 81 API calls 93442 46f984 Mailbox 93424->93442 93425->93416 93430 46fbc9 93476 42ed18 93430->93476 93433 46fbe3 93482 45cc5c 86 API calls 4 library calls 93433->93482 93434 46fbfd 93483 42c050 93434->93483 93437 46fbee GetCurrentProcess TerminateProcess 93437->93434 93438 46fc14 93447 46fc3e 93438->93447 93494 421b90 93438->93494 93440 46fd65 93440->93416 93445 46fd7e FreeLibrary 93440->93445 93441 46fc2d 93510 47040f 105 API calls _free 93441->93510 93442->93416 93442->93418 93442->93424 93442->93442 93480 4729e8 48 API calls _memcpy_s 93442->93480 93481 46fda5 60 API calls 2 library calls 93442->93481 93444 421b90 48 API calls 93444->93447 93445->93416 93447->93440 93447->93444 93511 41dcae 50 API calls Mailbox 93447->93511 93513 47040f 105 API calls _free 93447->93513 93450 41bdfa 48 API calls 93449->93450 93451 470582 CharLowerBuffW 93450->93451 93514 451f11 93451->93514 93455 41d7f7 48 API calls 93456 4705bb 93455->93456 93521 4169e9 48 API calls _memcpy_s 93456->93521 93458 4705d2 93459 41b18b 48 API calls 93458->93459 93460 4705de Mailbox 93459->93460 93461 47061a Mailbox 93460->93461 93522 46fda5 60 API calls 2 library calls 93460->93522 93461->93442 93463 46f77a 93462->93463 93464 46f725 93462->93464 93468 470828 93463->93468 93465 42f4ea 48 API calls 93464->93465 93467 46f747 93465->93467 93466 42f4ea 48 API calls 93466->93467 93467->93463 93467->93466 93469 470a53 Mailbox 93468->93469 93472 47084b _strcat _wcscpy __NMSG_WRITE 93468->93472 93469->93430 93470 41d286 48 API calls 93470->93472 93471 41cf93 58 API calls 93471->93472 93472->93469 93472->93470 93472->93471 93473 43395c 47 API calls _W_store_winword 93472->93473 93474 41936c 81 API calls 93472->93474 93525 458035 50 API calls __NMSG_WRITE 93472->93525 93473->93472 93474->93472 93478 42ed2d 93476->93478 93477 42edc5 VirtualProtect 93479 42ed93 93477->93479 93478->93477 93478->93479 93479->93433 93479->93434 93480->93442 93481->93442 93482->93437 93484 42c064 93483->93484 93486 42c069 Mailbox 93483->93486 93526 42c1af 48 API calls 93484->93526 93491 42c077 93486->93491 93527 42c15c 48 API calls 93486->93527 93488 42f4ea 48 API calls 93490 42c108 93488->93490 93489 42c152 93489->93438 93492 42f4ea 48 API calls 93490->93492 93491->93488 93491->93489 93493 42c113 93492->93493 93493->93438 93495 421cf6 93494->93495 93497 421ba2 93494->93497 93495->93441 93496 421bae 93504 421bb9 93496->93504 93529 42c15c 48 API calls 93496->93529 93497->93496 93499 42f4ea 48 API calls 93497->93499 93500 4849c4 93499->93500 93502 42f4ea 48 API calls 93500->93502 93501 421c5d 93501->93441 93509 4849cf 93502->93509 93503 42f4ea 48 API calls 93505 421c9f 93503->93505 93504->93501 93504->93503 93506 421cb2 93505->93506 93528 412925 48 API calls 93505->93528 93506->93441 93508 42f4ea 48 API calls 93508->93509 93509->93496 93509->93508 93510->93447 93511->93447 93512->93422 93513->93447 93515 451f3b __NMSG_WRITE 93514->93515 93516 451f79 93515->93516 93519 451f6f 93515->93519 93520 451ffa 93515->93520 93516->93455 93516->93460 93519->93516 93523 42d37a 60 API calls 93519->93523 93520->93516 93524 42d37a 60 API calls 93520->93524 93521->93458 93522->93461 93523->93519 93524->93520 93525->93472 93526->93486 93527->93491 93528->93506 93529->93504 93530->93398 93531->93398 93532->93399 93533->93399 93534->93393 93535->93386 93536->93400 93537 4819dd 93542 414a30 93537->93542 93539 4819f1 93562 430f0a 52 API calls __cinit 93539->93562 93541 4819fb 93543 414a40 __ftell_nolock 93542->93543 93544 41d7f7 48 API calls 93543->93544 93545 414af6 93544->93545 93563 415374 93545->93563 93547 414aff 93570 41363c 93547->93570 93550 41518c 48 API calls 93551 414b18 93550->93551 93576 4164cf 93551->93576 93554 41d7f7 48 API calls 93555 414b32 93554->93555 93582 4149fb 93555->93582 93557 414b43 Mailbox 93557->93539 93558 4161a6 48 API calls 93561 414b3d _wcscat Mailbox __NMSG_WRITE 93558->93561 93559 41ce19 48 API calls 93559->93561 93560 4164cf 48 API calls 93560->93561 93561->93557 93561->93558 93561->93559 93561->93560 93562->93541 93596 43f8a0 93563->93596 93566 41ce19 48 API calls 93567 4153a7 93566->93567 93598 41660f 93567->93598 93569 4153b1 Mailbox 93569->93547 93571 413649 __ftell_nolock 93570->93571 93605 41366c GetFullPathNameW 93571->93605 93573 41365a 93574 416a63 48 API calls 93573->93574 93575 413669 93574->93575 93575->93550 93577 41651b 93576->93577 93581 4164dd _memcpy_s 93576->93581 93579 42f4ea 48 API calls 93577->93579 93578 42f4ea 48 API calls 93580 414b29 93578->93580 93579->93581 93580->93554 93581->93578 93583 41bcce 48 API calls 93582->93583 93584 414a0a RegOpenKeyExW 93583->93584 93585 4841cc RegQueryValueExW 93584->93585 93586 414a2b 93584->93586 93587 4841e5 93585->93587 93588 484246 RegCloseKey 93585->93588 93586->93561 93589 42f4ea 48 API calls 93587->93589 93590 4841fe 93589->93590 93607 4147b7 93590->93607 93593 48423b 93593->93588 93594 484224 93595 416a63 48 API calls 93594->93595 93595->93593 93597 415381 GetModuleFileNameW 93596->93597 93597->93566 93599 43f8a0 __ftell_nolock 93598->93599 93600 41661c GetFullPathNameW 93599->93600 93601 416a63 48 API calls 93600->93601 93602 416643 93601->93602 93603 416571 48 API calls 93602->93603 93604 41664f 93603->93604 93604->93569 93606 41368a 93605->93606 93606->93573 93608 42f4ea 48 API calls 93607->93608 93609 4147c9 RegQueryValueExW 93608->93609 93609->93593 93609->93594 93610 1657fd8 93624 1655c28 93610->93624 93612 165809d 93627 1657ec8 93612->93627 93614 16580c6 CreateFileW 93616 1658115 93614->93616 93617 165811a 93614->93617 93617->93616 93618 1658131 VirtualAlloc 93617->93618 93618->93616 93619 165814f ReadFile 93618->93619 93619->93616 93620 165816a 93619->93620 93621 1656ec8 13 API calls 93620->93621 93623 165819d 93621->93623 93622 16581c0 ExitProcess 93622->93616 93623->93622 93626 16562b3 93624->93626 93630 16590c8 GetPEB 93624->93630 93626->93612 93628 1657ed1 Sleep 93627->93628 93629 1657edf 93628->93629 93630->93626 93631 435dfd 93632 435e09 _flsall 93631->93632 93668 437eeb GetStartupInfoW 93632->93668 93634 435e0e 93670 439ca7 GetProcessHeap 93634->93670 93636 435e66 93637 435e71 93636->93637 93755 435f4d 47 API calls 3 library calls 93636->93755 93671 437b47 93637->93671 93640 435e77 93641 435e82 __RTC_Initialize 93640->93641 93756 435f4d 47 API calls 3 library calls 93640->93756 93692 43acb3 93641->93692 93644 435e91 93645 435e9d GetCommandLineW 93644->93645 93757 435f4d 47 API calls 3 library calls 93644->93757 93711 442e7d GetEnvironmentStringsW 93645->93711 93649 435e9c 93649->93645 93652 435ec2 93724 442cb4 93652->93724 93655 435ec8 93659 435ed3 93655->93659 93759 43115b 47 API calls 3 library calls 93655->93759 93658 435edb 93660 435ee6 __wwincmdln 93658->93660 93760 43115b 47 API calls 3 library calls 93658->93760 93738 431195 93659->93738 93742 413a0f 93660->93742 93663 435efa 93664 435f09 93663->93664 93761 4313f1 47 API calls _doexit 93663->93761 93762 431186 47 API calls _doexit 93664->93762 93667 435f0e _flsall 93669 437f01 93668->93669 93669->93634 93670->93636 93763 43123a 30 API calls 2 library calls 93671->93763 93673 437b4c 93764 437e23 InitializeCriticalSectionAndSpinCount 93673->93764 93675 437b51 93676 437b55 93675->93676 93766 437e6d TlsAlloc 93675->93766 93765 437bbd 50 API calls 2 library calls 93676->93765 93679 437b67 93679->93676 93681 437b72 93679->93681 93680 437b5a 93680->93640 93767 436986 93681->93767 93684 437bb4 93775 437bbd 50 API calls 2 library calls 93684->93775 93687 437b93 93687->93684 93689 437b99 93687->93689 93688 437bb9 93688->93640 93774 437a94 47 API calls 4 library calls 93689->93774 93691 437ba1 GetCurrentThreadId 93691->93640 93693 43acbf _flsall 93692->93693 93784 437cf4 93693->93784 93695 43acc6 93696 436986 __calloc_crt 47 API calls 93695->93696 93698 43acd7 93696->93698 93697 43ad42 GetStartupInfoW 93705 43ae80 93697->93705 93708 43ad57 93697->93708 93698->93697 93699 43ace2 _flsall @_EH4_CallFilterFunc@8 93698->93699 93699->93644 93700 43af44 93791 43af58 LeaveCriticalSection _doexit 93700->93791 93702 43aec9 GetStdHandle 93702->93705 93703 436986 __calloc_crt 47 API calls 93703->93708 93704 43aedb GetFileType 93704->93705 93705->93700 93705->93702 93705->93704 93707 43af08 InitializeCriticalSectionAndSpinCount 93705->93707 93706 43ada5 93706->93705 93709 43add7 GetFileType 93706->93709 93710 43ade5 InitializeCriticalSectionAndSpinCount 93706->93710 93707->93705 93708->93703 93708->93705 93708->93706 93709->93706 93709->93710 93710->93706 93712 435ead 93711->93712 93713 442e8e 93711->93713 93718 442a7b GetModuleFileNameW 93712->93718 93830 4369d0 47 API calls _W_store_winword 93713->93830 93716 442eb4 _memcpy_s 93717 442eca FreeEnvironmentStringsW 93716->93717 93717->93712 93719 442aaf _wparse_cmdline 93718->93719 93720 435eb7 93719->93720 93721 442ae9 93719->93721 93720->93652 93758 43115b 47 API calls 3 library calls 93720->93758 93831 4369d0 47 API calls _W_store_winword 93721->93831 93723 442aef _wparse_cmdline 93723->93720 93725 442ccd __NMSG_WRITE 93724->93725 93729 442cc5 93724->93729 93726 436986 __calloc_crt 47 API calls 93725->93726 93734 442cf6 __NMSG_WRITE 93726->93734 93727 442d4d 93728 431c9d _free 47 API calls 93727->93728 93728->93729 93729->93655 93730 436986 __calloc_crt 47 API calls 93730->93734 93731 442d72 93732 431c9d _free 47 API calls 93731->93732 93732->93729 93734->93727 93734->93729 93734->93730 93734->93731 93735 442d89 93734->93735 93832 442567 47 API calls ___crtsetenv 93734->93832 93833 436e20 IsProcessorFeaturePresent 93735->93833 93737 442d95 93737->93655 93739 4311a1 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 93738->93739 93741 4311e0 __IsNonwritableInCurrentImage 93739->93741 93856 430f0a 52 API calls __cinit 93739->93856 93741->93658 93743 481ebf 93742->93743 93744 413a29 93742->93744 93745 413a63 IsThemeActive 93744->93745 93857 431405 93745->93857 93749 413a8f 93869 413adb SystemParametersInfoW SystemParametersInfoW 93749->93869 93751 413a9b 93870 413d19 93751->93870 93753 413aa3 SystemParametersInfoW 93754 413ac8 93753->93754 93754->93663 93755->93637 93756->93641 93757->93649 93761->93664 93762->93667 93763->93673 93764->93675 93765->93680 93766->93679 93769 43698d 93767->93769 93770 4369ca 93769->93770 93771 4369ab Sleep 93769->93771 93776 4430aa 93769->93776 93770->93684 93773 437ec9 TlsSetValue 93770->93773 93772 4369c2 93771->93772 93772->93769 93772->93770 93773->93687 93774->93691 93775->93688 93777 4430b5 93776->93777 93782 4430d0 __calloc_impl 93776->93782 93778 4430c1 93777->93778 93777->93782 93783 437c0e 47 API calls __getptd_noexit 93778->93783 93780 4430e0 RtlAllocateHeap 93781 4430c6 93780->93781 93780->93782 93781->93769 93782->93780 93782->93781 93783->93781 93785 437d05 93784->93785 93786 437d18 EnterCriticalSection 93784->93786 93792 437d7c 93785->93792 93786->93695 93788 437d0b 93788->93786 93816 43115b 47 API calls 3 library calls 93788->93816 93791->93699 93793 437d88 _flsall 93792->93793 93794 437d91 93793->93794 93795 437da9 93793->93795 93817 4381c2 47 API calls 2 library calls 93794->93817 93797 437da7 93795->93797 93803 437e11 _flsall 93795->93803 93797->93795 93820 4369d0 47 API calls _W_store_winword 93797->93820 93798 437d96 93818 43821f 47 API calls 6 library calls 93798->93818 93801 437dbd 93804 437dd3 93801->93804 93805 437dc4 93801->93805 93802 437d9d 93819 431145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 93802->93819 93803->93788 93806 437cf4 __lock 46 API calls 93804->93806 93821 437c0e 47 API calls __getptd_noexit 93805->93821 93809 437dda 93806->93809 93811 437de9 InitializeCriticalSectionAndSpinCount 93809->93811 93812 437dfe 93809->93812 93810 437dc9 93810->93803 93813 437e04 93811->93813 93822 431c9d 93812->93822 93828 437e1a LeaveCriticalSection _doexit 93813->93828 93817->93798 93818->93802 93820->93801 93821->93810 93823 431ccf __dosmaperr 93822->93823 93824 431ca6 RtlFreeHeap 93822->93824 93823->93813 93824->93823 93825 431cbb 93824->93825 93829 437c0e 47 API calls __getptd_noexit 93825->93829 93827 431cc1 GetLastError 93827->93823 93828->93803 93829->93827 93830->93716 93831->93723 93832->93734 93834 436e2b 93833->93834 93839 436cb5 93834->93839 93838 436e46 93838->93737 93840 436ccf _memset __call_reportfault 93839->93840 93841 436cef IsDebuggerPresent 93840->93841 93847 4381ac SetUnhandledExceptionFilter UnhandledExceptionFilter 93841->93847 93843 436db3 __call_reportfault 93848 43a70c 93843->93848 93845 436dd6 93846 438197 GetCurrentProcess TerminateProcess 93845->93846 93846->93838 93847->93843 93849 43a716 IsProcessorFeaturePresent 93848->93849 93850 43a714 93848->93850 93852 4437b0 93849->93852 93850->93845 93855 44375f 5 API calls 2 library calls 93852->93855 93854 443893 93854->93845 93855->93854 93856->93741 93858 437cf4 __lock 47 API calls 93857->93858 93859 431410 93858->93859 93922 437e58 LeaveCriticalSection 93859->93922 93861 413a88 93862 43146d 93861->93862 93863 431491 93862->93863 93864 431477 93862->93864 93863->93749 93864->93863 93923 437c0e 47 API calls __getptd_noexit 93864->93923 93866 431481 93924 436e10 8 API calls ___crtsetenv 93866->93924 93868 43148c 93868->93749 93869->93751 93871 413d26 __ftell_nolock 93870->93871 93872 41d7f7 48 API calls 93871->93872 93873 413d31 GetCurrentDirectoryW 93872->93873 93925 4161ca 93873->93925 93875 413d57 IsDebuggerPresent 93876 413d65 93875->93876 93877 481cc1 MessageBoxA 93875->93877 93878 413e3a 93876->93878 93880 481cd9 93876->93880 93881 413d82 93876->93881 93877->93880 93879 413e41 SetCurrentDirectoryW 93878->93879 93884 413e4e Mailbox 93879->93884 94102 42c682 48 API calls 93880->94102 93999 4140e5 93881->93999 93884->93753 93885 481ce9 93890 481cff SetCurrentDirectoryW 93885->93890 93887 413da0 GetFullPathNameW 93888 416a63 48 API calls 93887->93888 93889 413ddb 93888->93889 94015 416430 93889->94015 93890->93884 93893 413df6 93894 413e00 93893->93894 94103 4571fa AllocateAndInitializeSid CheckTokenMembership FreeSid 93893->94103 94031 413e6e GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 93894->94031 93897 481d1c 93897->93894 93901 481d2d 93897->93901 93900 413e0a 93902 413e1f 93900->93902 94100 414ffc 67 API calls _memset 93900->94100 93903 415374 50 API calls 93901->93903 94039 41e8d0 93902->94039 93904 481d35 93903->93904 93907 41ce19 48 API calls 93904->93907 93909 481d42 93907->93909 93910 481d49 93909->93910 93911 481d6e 93909->93911 93913 41518c 48 API calls 93910->93913 93914 41518c 48 API calls 93911->93914 93915 481d54 93913->93915 93916 481d6a GetForegroundWindow ShellExecuteW 93914->93916 93917 41510d 48 API calls 93915->93917 93920 481d9e Mailbox 93916->93920 93919 481d61 93917->93919 93921 41518c 48 API calls 93919->93921 93920->93878 93921->93916 93922->93861 93923->93866 93924->93868 94104 42e99b 93925->94104 93929 4161eb 93930 415374 50 API calls 93929->93930 93931 4161ff 93930->93931 93932 41ce19 48 API calls 93931->93932 93933 41620c 93932->93933 94121 4139db 93933->94121 93935 416216 Mailbox 93936 416eed 48 API calls 93935->93936 93937 41622b 93936->93937 94133 419048 93937->94133 93940 41ce19 48 API calls 93941 416244 93940->93941 94136 41d6e9 93941->94136 93943 416254 Mailbox 93944 41ce19 48 API calls 93943->93944 93945 41627c 93944->93945 93946 41d6e9 55 API calls 93945->93946 93947 41628f Mailbox 93946->93947 93948 41ce19 48 API calls 93947->93948 93949 4162a0 93948->93949 94140 41d645 93949->94140 93951 4162b2 Mailbox 93952 41d7f7 48 API calls 93951->93952 93953 4162c5 93952->93953 94150 4163fc 93953->94150 93957 4162df 93958 481c08 93957->93958 93959 4162e9 93957->93959 93961 4163fc 48 API calls 93958->93961 93960 430fa7 _W_store_winword 59 API calls 93959->93960 93962 4162f4 93960->93962 93963 481c1c 93961->93963 93962->93963 93964 4162fe 93962->93964 93966 4163fc 48 API calls 93963->93966 93965 430fa7 _W_store_winword 59 API calls 93964->93965 93967 416309 93965->93967 93968 481c38 93966->93968 93967->93968 93969 416313 93967->93969 93970 415374 50 API calls 93968->93970 93971 430fa7 _W_store_winword 59 API calls 93969->93971 93972 481c5d 93970->93972 93973 41631e 93971->93973 93974 4163fc 48 API calls 93972->93974 93975 41635f 93973->93975 93976 481c86 93973->93976 93980 4163fc 48 API calls 93973->93980 93978 481c69 93974->93978 93975->93976 93977 41636c 93975->93977 93981 416eed 48 API calls 93976->93981 93982 42c050 48 API calls 93977->93982 93979 416eed 48 API calls 93978->93979 93983 481c77 93979->93983 93984 416342 93980->93984 93985 481ca8 93981->93985 93986 416384 93982->93986 93987 4163fc 48 API calls 93983->93987 93988 416eed 48 API calls 93984->93988 93989 4163fc 48 API calls 93985->93989 93990 421b90 48 API calls 93986->93990 93987->93976 93991 416350 93988->93991 93992 481cb5 93989->93992 93996 416394 93990->93996 93993 4163fc 48 API calls 93991->93993 93992->93992 93993->93975 93994 421b90 48 API calls 93994->93996 93996->93994 93997 4163fc 48 API calls 93996->93997 93998 4163d6 Mailbox 93996->93998 94166 416b68 48 API calls 93996->94166 93997->93996 93998->93875 94000 4140f2 __ftell_nolock 93999->94000 94001 48370e _memset 94000->94001 94002 41410b 94000->94002 94005 48372a GetOpenFileNameW 94001->94005 94003 41660f 49 API calls 94002->94003 94004 414114 94003->94004 94644 4140a7 94004->94644 94007 483779 94005->94007 94008 416a63 48 API calls 94007->94008 94010 48378e 94008->94010 94010->94010 94012 414129 94662 414139 94012->94662 94016 41643d __ftell_nolock 94015->94016 94859 414c75 94016->94859 94018 416442 94019 413dee 94018->94019 94870 415928 86 API calls 94018->94870 94019->93885 94019->93893 94021 41644f 94021->94019 94871 415798 88 API calls Mailbox 94021->94871 94023 416458 94023->94019 94024 41645c GetFullPathNameW 94023->94024 94025 416a63 48 API calls 94024->94025 94026 416488 94025->94026 94027 416a63 48 API calls 94026->94027 94028 416495 94027->94028 94029 485dcf _wcscat 94028->94029 94030 416a63 48 API calls 94028->94030 94030->94019 94032 481cba 94031->94032 94033 413ed8 94031->94033 94908 414024 94033->94908 94037 413e05 94038 4136b8 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 94037->94038 94038->93900 94040 41e8f6 94039->94040 94099 41e906 Mailbox 94039->94099 94041 41ed52 94040->94041 94040->94099 95080 42e3cd 335 API calls 94041->95080 94043 413e2a 94043->93878 94101 413847 Shell_NotifyIconW _memset 94043->94101 94045 41ed63 94045->94043 94046 41ed70 94045->94046 95082 42e312 335 API calls Mailbox 94046->95082 94047 41e94c PeekMessageW 94047->94099 94048 48526e Sleep 94048->94099 94050 41ed77 LockWindowUpdate DestroyWindow GetMessageW 94050->94043 94053 41eda9 94050->94053 94051 41ebc7 94051->94043 95081 412ff6 16 API calls 94051->95081 94055 4859ef TranslateMessage DispatchMessageW GetMessageW 94053->94055 94055->94055 94057 485a1f 94055->94057 94056 411caa 49 API calls 94056->94099 94057->94043 94058 41ebf7 timeGetTime 94058->94099 94059 41ed21 PeekMessageW 94059->94099 94061 416eed 48 API calls 94061->94099 94062 42f4ea 48 API calls 94062->94099 94063 485557 WaitForSingleObject 94065 485574 GetExitCodeProcess CloseHandle 94063->94065 94063->94099 94064 48588f Sleep 94094 485429 Mailbox 94064->94094 94065->94099 94066 41ed3a TranslateMessage DispatchMessageW 94066->94059 94067 41d7f7 48 API calls 94067->94094 94068 41edae timeGetTime 95083 411caa 49 API calls 94068->95083 94069 485733 Sleep 94069->94094 94073 485926 GetExitCodeProcess 94077 48593c WaitForSingleObject 94073->94077 94078 485952 CloseHandle 94073->94078 94075 412aae 311 API calls 94075->94099 94076 42dc38 timeGetTime 94076->94094 94077->94078 94077->94099 94078->94094 94079 485445 Sleep 94079->94099 94081 485432 Sleep 94081->94079 94082 478c4b 108 API calls 94082->94094 94083 412c79 107 API calls 94083->94094 94084 4859ae Sleep 94084->94099 94085 41ce19 48 API calls 94085->94094 94089 41d6e9 55 API calls 94089->94094 94090 41fe30 311 API calls 94090->94099 94094->94067 94094->94073 94094->94076 94094->94079 94094->94081 94094->94082 94094->94083 94094->94084 94094->94085 94094->94089 94094->94099 95085 454cbe 49 API calls Mailbox 94094->95085 95086 411caa 49 API calls 94094->95086 95087 412aae 335 API calls 94094->95087 95088 46ccb2 50 API calls 94094->95088 95089 457a58 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 94094->95089 95090 456532 63 API calls 3 library calls 94094->95090 94095 45cc5c 86 API calls 94095->94099 94097 41ce19 48 API calls 94097->94099 94098 41d6e9 55 API calls 94098->94099 94099->94047 94099->94048 94099->94051 94099->94056 94099->94058 94099->94059 94099->94061 94099->94062 94099->94063 94099->94064 94099->94066 94099->94068 94099->94069 94099->94075 94099->94079 94099->94090 94099->94094 94099->94095 94099->94097 94099->94098 94913 41f110 94099->94913 94978 4245e0 94099->94978 94995 423200 94099->94995 95068 42e244 94099->95068 95073 42dc5f 94099->95073 95078 41eed0 335 API calls Mailbox 94099->95078 95079 41ef00 86 API calls 94099->95079 95084 478d23 48 API calls 94099->95084 94100->93902 94101->93878 94102->93885 94103->93897 94105 41d7f7 48 API calls 94104->94105 94106 4161db 94105->94106 94107 416009 94106->94107 94108 416016 __ftell_nolock 94107->94108 94109 416a63 48 API calls 94108->94109 94114 41617c Mailbox 94108->94114 94111 416048 94109->94111 94118 41607e Mailbox 94111->94118 94167 4161a6 94111->94167 94112 4161a6 48 API calls 94112->94118 94113 41614f 94113->94114 94115 41ce19 48 API calls 94113->94115 94114->93929 94117 416170 94115->94117 94116 41ce19 48 API calls 94116->94118 94119 4164cf 48 API calls 94117->94119 94118->94112 94118->94113 94118->94114 94118->94116 94120 4164cf 48 API calls 94118->94120 94119->94114 94120->94118 94170 4141a9 94121->94170 94124 413a06 94124->93935 94127 482ff0 94128 431c9d _free 47 API calls 94127->94128 94130 482ffd 94128->94130 94131 414252 84 API calls 94130->94131 94132 483006 94131->94132 94132->94132 94134 42f4ea 48 API calls 94133->94134 94135 416237 94134->94135 94135->93940 94137 41d6f4 94136->94137 94138 41d71b 94137->94138 94637 41d764 55 API calls 94137->94637 94138->93943 94141 41d654 94140->94141 94148 41d67e 94140->94148 94142 41d6c2 94141->94142 94143 41d65b 94141->94143 94149 41d6ab 94142->94149 94640 42dce0 53 API calls 94142->94640 94145 41d666 94143->94145 94143->94149 94638 41d9a0 53 API calls __cinit 94145->94638 94148->93951 94149->94148 94639 42dce0 53 API calls 94149->94639 94151 416406 94150->94151 94152 41641f 94150->94152 94154 416eed 48 API calls 94151->94154 94153 416a63 48 API calls 94152->94153 94155 4162d1 94153->94155 94154->94155 94156 430fa7 94155->94156 94157 430fb3 94156->94157 94158 431028 94156->94158 94165 430fd8 94157->94165 94641 437c0e 47 API calls __getptd_noexit 94157->94641 94643 43103a 59 API calls 3 library calls 94158->94643 94161 431035 94161->93957 94162 430fbf 94642 436e10 8 API calls ___crtsetenv 94162->94642 94164 430fca 94164->93957 94165->93957 94166->93996 94168 41bdfa 48 API calls 94167->94168 94169 4161b1 94168->94169 94169->94111 94235 414214 94170->94235 94175 4141d4 LoadLibraryExW 94245 414291 94175->94245 94176 484f73 94178 414252 84 API calls 94176->94178 94180 484f7a 94178->94180 94182 414291 3 API calls 94180->94182 94184 484f82 94182->94184 94183 4141fb 94183->94184 94185 414207 94183->94185 94271 4144ed 94184->94271 94186 414252 84 API calls 94185->94186 94189 4139fe 94186->94189 94189->94124 94194 45c396 94189->94194 94191 484fa9 94279 414950 94191->94279 94193 484fb6 94195 414517 83 API calls 94194->94195 94196 45c405 94195->94196 94457 45c56d 94196->94457 94199 4144ed 64 API calls 94200 45c432 94199->94200 94201 4144ed 64 API calls 94200->94201 94202 45c442 94201->94202 94203 4144ed 64 API calls 94202->94203 94204 45c45d 94203->94204 94205 4144ed 64 API calls 94204->94205 94206 45c478 94205->94206 94207 414517 83 API calls 94206->94207 94208 45c48f 94207->94208 94209 43395c _W_store_winword 47 API calls 94208->94209 94210 45c496 94209->94210 94211 43395c _W_store_winword 47 API calls 94210->94211 94212 45c4a0 94211->94212 94213 4144ed 64 API calls 94212->94213 94214 45c4b4 94213->94214 94215 45bf5a GetSystemTimeAsFileTime 94214->94215 94216 45c4c7 94215->94216 94217 45c4f1 94216->94217 94218 45c4dc 94216->94218 94219 45c4f7 94217->94219 94220 45c556 94217->94220 94221 431c9d _free 47 API calls 94218->94221 94463 45b965 94219->94463 94223 431c9d _free 47 API calls 94220->94223 94224 45c4e2 94221->94224 94226 45c41b 94223->94226 94227 431c9d _free 47 API calls 94224->94227 94226->94127 94229 414252 94226->94229 94227->94226 94228 431c9d _free 47 API calls 94228->94226 94230 414263 94229->94230 94231 41425c 94229->94231 94233 414283 FreeLibrary 94230->94233 94234 414272 94230->94234 94232 4335e4 __fcloseall 83 API calls 94231->94232 94232->94230 94233->94234 94234->94127 94284 414339 94235->94284 94238 41423c 94239 414244 FreeLibrary 94238->94239 94240 4141bb 94238->94240 94239->94240 94242 433499 94240->94242 94292 4334ae 94242->94292 94244 4141c8 94244->94175 94244->94176 94371 4142e4 94245->94371 94248 4142c1 FreeLibrary 94249 4141ec 94248->94249 94252 414380 94249->94252 94251 4142b8 94251->94248 94251->94249 94253 42f4ea 48 API calls 94252->94253 94254 414395 94253->94254 94255 4147b7 48 API calls 94254->94255 94256 4143a1 _memcpy_s 94255->94256 94257 4143dc 94256->94257 94258 4144d1 94256->94258 94259 414499 94256->94259 94260 414950 57 API calls 94257->94260 94390 45c750 93 API calls 94258->94390 94379 41406b CreateStreamOnHGlobal 94259->94379 94266 4143e5 94260->94266 94263 4144ed 64 API calls 94263->94266 94264 414479 94264->94183 94266->94263 94266->94264 94267 484ed7 94266->94267 94385 414517 94266->94385 94268 414517 83 API calls 94267->94268 94269 484eeb 94268->94269 94270 4144ed 64 API calls 94269->94270 94270->94264 94272 484fc0 94271->94272 94273 4144ff 94271->94273 94414 43381e 94273->94414 94276 45bf5a 94434 45bdb4 94276->94434 94278 45bf70 94278->94191 94280 485002 94279->94280 94281 41495f 94279->94281 94439 433e65 94281->94439 94283 414967 94283->94193 94288 41434b 94284->94288 94287 414321 LoadLibraryA GetProcAddress 94287->94238 94289 41422f 94288->94289 94290 414354 LoadLibraryA 94288->94290 94289->94238 94289->94287 94290->94289 94291 414365 GetProcAddress 94290->94291 94291->94289 94295 4334ba _flsall 94292->94295 94293 4334cd 94340 437c0e 47 API calls __getptd_noexit 94293->94340 94295->94293 94297 4334fe 94295->94297 94296 4334d2 94341 436e10 8 API calls ___crtsetenv 94296->94341 94311 43e4c8 94297->94311 94300 433503 94301 433519 94300->94301 94302 43350c 94300->94302 94304 433543 94301->94304 94305 433523 94301->94305 94342 437c0e 47 API calls __getptd_noexit 94302->94342 94325 43e5e0 94304->94325 94343 437c0e 47 API calls __getptd_noexit 94305->94343 94306 4334dd _flsall @_EH4_CallFilterFunc@8 94306->94244 94312 43e4d4 _flsall 94311->94312 94313 437cf4 __lock 47 API calls 94312->94313 94314 43e4e2 94313->94314 94315 43e559 94314->94315 94320 437d7c __mtinitlocknum 47 API calls 94314->94320 94323 43e552 94314->94323 94348 434e5b 48 API calls __lock 94314->94348 94349 434ec5 LeaveCriticalSection LeaveCriticalSection _doexit 94314->94349 94350 4369d0 47 API calls _W_store_winword 94315->94350 94318 43e560 94319 43e56f InitializeCriticalSectionAndSpinCount EnterCriticalSection 94318->94319 94318->94323 94319->94323 94320->94314 94322 43e5cc _flsall 94322->94300 94345 43e5d7 94323->94345 94326 43e600 __wopenfile 94325->94326 94327 43e61a 94326->94327 94339 43e7d5 94326->94339 94357 43185b 59 API calls 2 library calls 94326->94357 94355 437c0e 47 API calls __getptd_noexit 94327->94355 94329 43e61f 94356 436e10 8 API calls ___crtsetenv 94329->94356 94331 43e838 94352 4463c9 94331->94352 94332 43354e 94344 433570 LeaveCriticalSection LeaveCriticalSection _fprintf 94332->94344 94335 43e7ce 94335->94339 94358 43185b 59 API calls 2 library calls 94335->94358 94337 43e7ed 94337->94339 94359 43185b 59 API calls 2 library calls 94337->94359 94339->94327 94339->94331 94340->94296 94341->94306 94342->94306 94343->94306 94344->94306 94351 437e58 LeaveCriticalSection 94345->94351 94347 43e5de 94347->94322 94348->94314 94349->94314 94350->94318 94351->94347 94360 445bb1 94352->94360 94354 4463e2 94354->94332 94355->94329 94356->94332 94357->94335 94358->94337 94359->94339 94361 445bbd _flsall 94360->94361 94362 445bcf 94361->94362 94364 445c06 94361->94364 94363 437c0e ___crtsetenv 47 API calls 94362->94363 94365 445bd4 94363->94365 94366 445c78 __wsopen_helper 110 API calls 94364->94366 94367 436e10 ___crtsetenv 8 API calls 94365->94367 94368 445c23 94366->94368 94370 445bde _flsall 94367->94370 94369 445c4c __wsopen_helper LeaveCriticalSection 94368->94369 94369->94370 94370->94354 94375 4142f6 94371->94375 94374 4142cc LoadLibraryA GetProcAddress 94374->94251 94376 4142aa 94375->94376 94377 4142ff LoadLibraryA 94375->94377 94376->94251 94376->94374 94377->94376 94378 414310 GetProcAddress 94377->94378 94378->94376 94380 414085 FindResourceExW 94379->94380 94384 4140a2 94379->94384 94381 484f16 LoadResource 94380->94381 94380->94384 94382 484f2b SizeofResource 94381->94382 94381->94384 94383 484f3f LockResource 94382->94383 94382->94384 94383->94384 94384->94257 94386 414526 94385->94386 94387 484fe0 94385->94387 94391 433a8d 94386->94391 94389 414534 94389->94266 94390->94257 94392 433a99 _flsall 94391->94392 94393 433aa7 94392->94393 94394 433acd 94392->94394 94404 437c0e 47 API calls __getptd_noexit 94393->94404 94406 434e1c 94394->94406 94397 433aac 94405 436e10 8 API calls ___crtsetenv 94397->94405 94398 433ad3 94412 4339fe 81 API calls 4 library calls 94398->94412 94401 433ae2 94413 433b04 LeaveCriticalSection LeaveCriticalSection _fprintf 94401->94413 94403 433ab7 _flsall 94403->94389 94404->94397 94405->94403 94407 434e4e EnterCriticalSection 94406->94407 94408 434e2c 94406->94408 94410 434e44 94407->94410 94408->94407 94409 434e34 94408->94409 94411 437cf4 __lock 47 API calls 94409->94411 94410->94398 94411->94410 94412->94401 94413->94403 94417 433839 94414->94417 94416 414510 94416->94276 94418 433845 _flsall 94417->94418 94419 433888 94418->94419 94420 433880 _flsall 94418->94420 94422 43385b _memset 94418->94422 94421 434e1c __lock_file 48 API calls 94419->94421 94420->94416 94423 43388e 94421->94423 94430 437c0e 47 API calls __getptd_noexit 94422->94430 94432 43365b 62 API calls 6 library calls 94423->94432 94425 433875 94431 436e10 8 API calls ___crtsetenv 94425->94431 94428 4338a4 94433 4338c2 LeaveCriticalSection LeaveCriticalSection _fprintf 94428->94433 94430->94425 94431->94420 94432->94428 94433->94420 94437 43344a GetSystemTimeAsFileTime 94434->94437 94436 45bdc3 94436->94278 94438 433478 __aulldiv 94437->94438 94438->94436 94440 433e71 _flsall 94439->94440 94441 433e94 94440->94441 94442 433e7f 94440->94442 94444 434e1c __lock_file 48 API calls 94441->94444 94453 437c0e 47 API calls __getptd_noexit 94442->94453 94446 433e9a 94444->94446 94445 433e84 94454 436e10 8 API calls ___crtsetenv 94445->94454 94455 433b0c 55 API calls 5 library calls 94446->94455 94449 433ea5 94456 433ec5 LeaveCriticalSection LeaveCriticalSection _fprintf 94449->94456 94451 433e8f _flsall 94451->94283 94452 433eb7 94452->94451 94453->94445 94454->94451 94455->94449 94456->94452 94462 45c581 __tzset_nolock _wcscmp 94457->94462 94458 45c417 94458->94199 94458->94226 94459 4144ed 64 API calls 94459->94462 94460 45bf5a GetSystemTimeAsFileTime 94460->94462 94461 414517 83 API calls 94461->94462 94462->94458 94462->94459 94462->94460 94462->94461 94464 45b970 94463->94464 94465 45b97e 94463->94465 94466 433499 117 API calls 94464->94466 94467 45b9c3 94465->94467 94468 433499 117 API calls 94465->94468 94493 45b987 94465->94493 94466->94465 94494 45bbe8 64 API calls 3 library calls 94467->94494 94469 45b9a8 94468->94469 94469->94467 94471 45b9b1 94469->94471 94471->94493 94505 4335e4 94471->94505 94472 45ba07 94473 45ba2c 94472->94473 94474 45ba0b 94472->94474 94495 45b7e5 47 API calls _W_store_winword 94473->94495 94477 45ba18 94474->94477 94479 4335e4 __fcloseall 83 API calls 94474->94479 94480 4335e4 __fcloseall 83 API calls 94477->94480 94477->94493 94478 45ba34 94481 45ba5a 94478->94481 94482 45ba3a 94478->94482 94479->94477 94480->94493 94496 45ba8a 90 API calls 94481->94496 94484 45ba47 94482->94484 94486 4335e4 __fcloseall 83 API calls 94482->94486 94488 4335e4 __fcloseall 83 API calls 94484->94488 94484->94493 94485 45ba61 94497 45bb64 94485->94497 94486->94484 94488->94493 94490 45ba75 94492 4335e4 __fcloseall 83 API calls 94490->94492 94490->94493 94491 4335e4 __fcloseall 83 API calls 94491->94490 94492->94493 94493->94228 94494->94472 94495->94478 94496->94485 94498 45bb71 94497->94498 94499 45bb77 94497->94499 94500 431c9d _free 47 API calls 94498->94500 94501 45bb88 94499->94501 94502 431c9d _free 47 API calls 94499->94502 94500->94499 94503 431c9d _free 47 API calls 94501->94503 94504 45ba68 94501->94504 94502->94501 94503->94504 94504->94490 94504->94491 94506 4335f0 _flsall 94505->94506 94507 433604 94506->94507 94508 43361c 94506->94508 94534 437c0e 47 API calls __getptd_noexit 94507->94534 94511 434e1c __lock_file 48 API calls 94508->94511 94517 433614 _flsall 94508->94517 94510 433609 94535 436e10 8 API calls ___crtsetenv 94510->94535 94512 43362e 94511->94512 94518 433578 94512->94518 94517->94493 94519 433587 94518->94519 94520 43359b 94518->94520 94577 437c0e 47 API calls __getptd_noexit 94519->94577 94526 433597 94520->94526 94537 432c84 94520->94537 94522 43358c 94578 436e10 8 API calls ___crtsetenv 94522->94578 94536 433653 LeaveCriticalSection LeaveCriticalSection _fprintf 94526->94536 94530 4335b5 94554 43e9d2 94530->94554 94532 4335bb 94532->94526 94533 431c9d _free 47 API calls 94532->94533 94533->94526 94534->94510 94535->94517 94536->94517 94538 432c97 94537->94538 94539 432cbb 94537->94539 94538->94539 94540 432933 __flswbuf 47 API calls 94538->94540 94543 43eb36 94539->94543 94541 432cb4 94540->94541 94579 43af61 94541->94579 94544 43eb43 94543->94544 94546 4335af 94543->94546 94545 431c9d _free 47 API calls 94544->94545 94544->94546 94545->94546 94547 432933 94546->94547 94548 432952 94547->94548 94549 43293d 94547->94549 94548->94530 94604 437c0e 47 API calls __getptd_noexit 94549->94604 94551 432942 94605 436e10 8 API calls ___crtsetenv 94551->94605 94553 43294d 94553->94530 94555 43e9de _flsall 94554->94555 94556 43e9e6 94555->94556 94557 43e9fe 94555->94557 94630 437bda 47 API calls __getptd_noexit 94556->94630 94558 43ea7b 94557->94558 94564 43ea28 94557->94564 94634 437bda 47 API calls __getptd_noexit 94558->94634 94560 43e9eb 94631 437c0e 47 API calls __getptd_noexit 94560->94631 94563 43ea80 94635 437c0e 47 API calls __getptd_noexit 94563->94635 94606 43a8ed 94564->94606 94565 43e9f3 _flsall 94565->94532 94568 43ea88 94636 436e10 8 API calls ___crtsetenv 94568->94636 94569 43ea2e 94571 43ea41 94569->94571 94572 43ea4c 94569->94572 94615 43ea9c 94571->94615 94632 437c0e 47 API calls __getptd_noexit 94572->94632 94575 43ea47 94633 43ea73 LeaveCriticalSection __unlock_fhandle 94575->94633 94577->94522 94578->94526 94580 43af6d _flsall 94579->94580 94581 43af75 94580->94581 94584 43af8d 94580->94584 94582 437bda __dosmaperr 47 API calls 94581->94582 94585 43af7a 94582->94585 94583 43b022 94586 437bda __dosmaperr 47 API calls 94583->94586 94584->94583 94589 43afbf 94584->94589 94587 437c0e ___crtsetenv 47 API calls 94585->94587 94588 43b027 94586->94588 94598 43af82 _flsall 94587->94598 94590 437c0e ___crtsetenv 47 API calls 94588->94590 94591 43a8ed ___lock_fhandle 49 API calls 94589->94591 94592 43b02f 94590->94592 94593 43afc5 94591->94593 94594 436e10 ___crtsetenv 8 API calls 94592->94594 94595 43afeb 94593->94595 94596 43afd8 94593->94596 94594->94598 94599 437c0e ___crtsetenv 47 API calls 94595->94599 94597 43b043 __chsize_nolock 75 API calls 94596->94597 94600 43afe4 94597->94600 94598->94539 94601 43aff0 94599->94601 94603 43b01a __flswbuf LeaveCriticalSection 94600->94603 94602 437bda __dosmaperr 47 API calls 94601->94602 94602->94600 94603->94598 94604->94551 94605->94553 94607 43a8f9 _flsall 94606->94607 94608 43a946 EnterCriticalSection 94607->94608 94610 437cf4 __lock 47 API calls 94607->94610 94609 43a96c _flsall 94608->94609 94609->94569 94611 43a91d 94610->94611 94612 43a93a 94611->94612 94613 43a928 InitializeCriticalSectionAndSpinCount 94611->94613 94614 43a970 ___lock_fhandle LeaveCriticalSection 94612->94614 94613->94612 94614->94608 94616 43aba4 __lseek_nolock 47 API calls 94615->94616 94619 43eaaa 94616->94619 94617 43eb00 94618 43ab1e __free_osfhnd 48 API calls 94617->94618 94623 43eb08 94618->94623 94619->94617 94620 43aba4 __lseek_nolock 47 API calls 94619->94620 94629 43eade 94619->94629 94624 43ead5 94620->94624 94621 43aba4 __lseek_nolock 47 API calls 94625 43eaea CloseHandle 94621->94625 94622 43eb2a 94622->94575 94623->94622 94626 437bed __dosmaperr 47 API calls 94623->94626 94627 43aba4 __lseek_nolock 47 API calls 94624->94627 94625->94617 94628 43eaf6 GetLastError 94625->94628 94626->94622 94627->94629 94628->94617 94629->94617 94629->94621 94630->94560 94631->94565 94632->94575 94633->94565 94634->94563 94635->94568 94636->94565 94637->94138 94638->94148 94639->94148 94640->94149 94641->94162 94642->94164 94643->94161 94645 43f8a0 __ftell_nolock 94644->94645 94646 4140b4 GetLongPathNameW 94645->94646 94647 416a63 48 API calls 94646->94647 94648 4140dc 94647->94648 94649 4149a0 94648->94649 94650 41d7f7 48 API calls 94649->94650 94651 4149b2 94650->94651 94652 41660f 49 API calls 94651->94652 94653 4149bd 94652->94653 94654 4149c8 94653->94654 94655 482e35 94653->94655 94656 4164cf 48 API calls 94654->94656 94660 482e4f 94655->94660 94702 42d35e 60 API calls 94655->94702 94658 4149d4 94656->94658 94696 4128a6 94658->94696 94661 4149e7 Mailbox 94661->94012 94663 4141a9 136 API calls 94662->94663 94664 41415e 94663->94664 94665 483489 94664->94665 94666 4141a9 136 API calls 94664->94666 94667 45c396 122 API calls 94665->94667 94668 414172 94666->94668 94669 48349e 94667->94669 94668->94665 94670 41417a 94668->94670 94671 4834bf 94669->94671 94672 4834a2 94669->94672 94674 4834aa 94670->94674 94675 414186 94670->94675 94673 42f4ea 48 API calls 94671->94673 94676 414252 84 API calls 94672->94676 94695 483504 Mailbox 94673->94695 94791 456b49 87 API calls _wprintf 94674->94791 94703 41c833 94675->94703 94676->94674 94679 4834b8 94679->94671 94681 4836b4 94682 431c9d _free 47 API calls 94681->94682 94683 4836bc 94682->94683 94684 414252 84 API calls 94683->94684 94689 4836c5 94684->94689 94685 41ba85 48 API calls 94685->94695 94688 431c9d _free 47 API calls 94688->94689 94689->94688 94690 414252 84 API calls 94689->94690 94796 4525b5 86 API calls 4 library calls 94689->94796 94690->94689 94692 41ce19 48 API calls 94692->94695 94695->94681 94695->94685 94695->94689 94695->94692 94792 452551 48 API calls _memcpy_s 94695->94792 94793 452472 60 API calls 2 library calls 94695->94793 94794 459c12 48 API calls 94695->94794 94795 414dd9 48 API calls 94695->94795 94697 4128b8 94696->94697 94701 4128d7 _memcpy_s 94696->94701 94699 42f4ea 48 API calls 94697->94699 94698 42f4ea 48 API calls 94700 4128ee 94698->94700 94699->94701 94700->94661 94701->94698 94702->94655 94704 41c843 __ftell_nolock 94703->94704 94705 41c860 94704->94705 94706 483095 94704->94706 94802 4148ba 49 API calls 94705->94802 94821 4525b5 86 API calls 4 library calls 94706->94821 94709 41c882 94803 414550 56 API calls 94709->94803 94710 4830a8 94822 4525b5 86 API calls 4 library calls 94710->94822 94712 41c897 94712->94710 94714 41c89f 94712->94714 94716 41d7f7 48 API calls 94714->94716 94715 4830c4 94718 41c90c 94715->94718 94717 41c8ab 94716->94717 94804 42e968 49 API calls __ftell_nolock 94717->94804 94720 41c91a 94718->94720 94721 4830d7 94718->94721 94807 431dfc 94720->94807 94724 414907 CloseHandle 94721->94724 94722 41c8b7 94725 41d7f7 48 API calls 94722->94725 94726 4830e3 94724->94726 94727 41c8c3 94725->94727 94728 4141a9 136 API calls 94726->94728 94729 41660f 49 API calls 94727->94729 94730 48310d 94728->94730 94731 41c8d1 94729->94731 94733 483136 94730->94733 94738 45c396 122 API calls 94730->94738 94805 42eb66 SetFilePointerEx ReadFile 94731->94805 94732 41c943 _wcscat _wcscpy 94737 41c96d SetCurrentDirectoryW 94732->94737 94823 4525b5 86 API calls 4 library calls 94733->94823 94735 41c8fd 94806 4146ce SetFilePointerEx SetFilePointerEx 94735->94806 94741 42f4ea 48 API calls 94737->94741 94742 483129 94738->94742 94740 48314d 94775 41cad1 Mailbox 94740->94775 94743 41c988 94741->94743 94744 483131 94742->94744 94745 483152 94742->94745 94747 4147b7 48 API calls 94743->94747 94748 414252 84 API calls 94744->94748 94746 414252 84 API calls 94745->94746 94749 483157 94746->94749 94778 41c993 Mailbox __NMSG_WRITE 94747->94778 94748->94733 94750 42f4ea 48 API calls 94749->94750 94757 483194 94750->94757 94751 41ca9d 94817 414907 94751->94817 94755 413d98 94755->93878 94755->93887 94756 41caa9 SetCurrentDirectoryW 94756->94775 94759 41ba85 48 API calls 94757->94759 94788 4831dd Mailbox 94759->94788 94761 4833ce 94828 459b72 48 API calls 94761->94828 94762 483467 94832 4525b5 86 API calls 4 library calls 94762->94832 94766 483480 94766->94751 94767 4833f0 94829 4729e8 48 API calls _memcpy_s 94767->94829 94769 4833fd 94771 431c9d _free 47 API calls 94769->94771 94770 48345f 94831 45240b 48 API calls 3 library calls 94770->94831 94771->94775 94773 41ce19 48 API calls 94773->94778 94797 4148dd 94775->94797 94776 41ba85 48 API calls 94776->94788 94778->94751 94778->94762 94778->94770 94778->94773 94810 41b337 56 API calls _wcscpy 94778->94810 94811 42c258 GetStringTypeW 94778->94811 94812 41cb93 59 API calls __wcsnicmp 94778->94812 94813 41cb5a GetStringTypeW __NMSG_WRITE 94778->94813 94814 4316d0 GetStringTypeW __towlower_l 94778->94814 94815 41cc24 162 API calls 3 library calls 94778->94815 94816 42c682 48 API calls 94778->94816 94782 41ce19 48 API calls 94782->94788 94785 483420 94830 4525b5 86 API calls 4 library calls 94785->94830 94787 483439 94789 431c9d _free 47 API calls 94787->94789 94788->94761 94788->94776 94788->94782 94788->94785 94824 452551 48 API calls _memcpy_s 94788->94824 94825 452472 60 API calls 2 library calls 94788->94825 94826 459c12 48 API calls 94788->94826 94827 42c682 48 API calls 94788->94827 94790 48344c 94789->94790 94790->94775 94791->94679 94792->94695 94793->94695 94794->94695 94795->94695 94796->94689 94798 414907 CloseHandle 94797->94798 94799 4148e5 Mailbox 94798->94799 94800 414907 CloseHandle 94799->94800 94801 4148fc 94800->94801 94801->94755 94802->94709 94803->94712 94804->94722 94805->94735 94806->94718 94833 431e46 94807->94833 94810->94778 94811->94778 94812->94778 94813->94778 94814->94778 94815->94778 94816->94778 94818 414911 94817->94818 94819 414920 94817->94819 94818->94756 94819->94818 94820 414925 CloseHandle 94819->94820 94820->94818 94821->94710 94822->94715 94823->94740 94824->94788 94825->94788 94826->94788 94827->94788 94828->94767 94829->94769 94830->94787 94831->94762 94832->94766 94834 431e61 94833->94834 94837 431e55 94833->94837 94857 437c0e 47 API calls __getptd_noexit 94834->94857 94836 432019 94841 431e41 94836->94841 94858 436e10 8 API calls ___crtsetenv 94836->94858 94837->94834 94843 431ed4 94837->94843 94852 439d6b 47 API calls ___crtsetenv 94837->94852 94840 431fa0 94840->94834 94840->94841 94844 431fb0 94840->94844 94841->94732 94842 431f5f 94842->94834 94845 431f7b 94842->94845 94854 439d6b 47 API calls ___crtsetenv 94842->94854 94843->94834 94851 431f41 94843->94851 94853 439d6b 47 API calls ___crtsetenv 94843->94853 94856 439d6b 47 API calls ___crtsetenv 94844->94856 94845->94834 94845->94841 94847 431f91 94845->94847 94855 439d6b 47 API calls ___crtsetenv 94847->94855 94851->94840 94851->94842 94852->94843 94853->94851 94854->94845 94855->94841 94856->94841 94857->94836 94858->94841 94860 414d94 94859->94860 94861 414c8b 94859->94861 94860->94018 94861->94860 94862 42f4ea 48 API calls 94861->94862 94863 414cb2 94862->94863 94864 42f4ea 48 API calls 94863->94864 94869 414d22 94864->94869 94868 41ba85 48 API calls 94868->94869 94869->94860 94869->94868 94872 41b470 94869->94872 94900 414dd9 48 API calls 94869->94900 94901 459af1 48 API calls 94869->94901 94870->94021 94871->94023 94873 416b0f 48 API calls 94872->94873 94893 41b495 94873->94893 94874 41b69b 94875 41ba85 48 API calls 94874->94875 94876 41b6b5 Mailbox 94875->94876 94876->94869 94879 48397b 94906 4526bc 88 API calls 4 library calls 94879->94906 94880 41bcce 48 API calls 94880->94893 94883 41b9e4 94907 4526bc 88 API calls 4 library calls 94883->94907 94884 483973 94884->94876 94887 41ba85 48 API calls 94887->94893 94888 483989 94889 41ba85 48 API calls 94888->94889 94889->94884 94890 483909 94892 416b4a 48 API calls 94890->94892 94891 41bb85 48 API calls 94891->94893 94894 483914 94892->94894 94893->94874 94893->94879 94893->94880 94893->94883 94893->94887 94893->94890 94893->94891 94895 41bc74 48 API calls 94893->94895 94896 41bdfa 48 API calls 94893->94896 94899 483939 _memcpy_s 94893->94899 94902 41c413 59 API calls 94893->94902 94903 41c6a5 49 API calls 94893->94903 94904 41c799 48 API calls _memcpy_s 94893->94904 94898 42f4ea 48 API calls 94894->94898 94895->94893 94897 41b66c CharUpperBuffW 94896->94897 94897->94893 94898->94899 94905 4526bc 88 API calls 4 library calls 94899->94905 94900->94869 94901->94869 94902->94893 94903->94893 94904->94893 94905->94884 94906->94888 94907->94884 94909 48418d EnumResourceNamesW 94908->94909 94910 41403c LoadImageW 94908->94910 94911 413ee1 RegisterClassExW 94909->94911 94910->94911 94912 413f53 7 API calls 94911->94912 94912->94037 94914 41f130 94913->94914 94917 41fe30 335 API calls 94914->94917 94919 41f199 94914->94919 94915 41f3dd 94918 4887c8 94915->94918 94929 41f3f2 94915->94929 94962 41f431 Mailbox 94915->94962 94916 41f595 94923 41d7f7 48 API calls 94916->94923 94916->94962 94920 488728 94917->94920 95095 45cc5c 86 API calls 4 library calls 94918->95095 94919->94915 94919->94916 94924 41d7f7 48 API calls 94919->94924 94957 41f229 94919->94957 94920->94919 95092 45cc5c 86 API calls 4 library calls 94920->95092 94925 4887a3 94923->94925 94927 488772 94924->94927 95094 430f0a 52 API calls __cinit 94925->95094 94926 488b1b 94944 488b2c 94926->94944 94945 488bcf 94926->94945 95093 430f0a 52 API calls __cinit 94927->95093 94955 41f418 94929->94955 95096 459af1 48 API calls 94929->95096 94930 41f770 94938 488a45 94930->94938 94956 41f77a 94930->94956 94932 41d6e9 55 API calls 94932->94962 94934 488c53 95109 45cc5c 86 API calls 4 library calls 94934->95109 94935 488810 95097 46eef8 335 API calls 94935->95097 94936 41fe30 335 API calls 94958 41f6aa 94936->94958 94937 45cc5c 86 API calls 94937->94962 95101 42c1af 48 API calls 94938->95101 94939 488b7e 95104 46e40a 335 API calls Mailbox 94939->95104 95103 46f5ee 335 API calls 94944->95103 95106 45cc5c 86 API calls 4 library calls 94945->95106 94946 488beb 95107 46bdbd 335 API calls Mailbox 94946->95107 94948 41fe30 335 API calls 94948->94962 94952 421b90 48 API calls 94952->94962 94953 421b90 48 API calls 94953->94962 94954 488c00 94976 41f537 Mailbox 94954->94976 95108 45cc5c 86 API calls 4 library calls 94954->95108 94955->94926 94955->94958 94955->94962 94956->94953 94957->94915 94957->94916 94957->94955 94957->94962 94958->94930 94958->94936 94959 41fce0 94958->94959 94958->94962 94958->94976 94959->94976 95105 45cc5c 86 API calls 4 library calls 94959->95105 94961 488823 94961->94955 94965 48884b 94961->94965 94962->94932 94962->94934 94962->94937 94962->94939 94962->94946 94962->94948 94962->94952 94962->94959 94962->94976 95091 41dd47 48 API calls _memcpy_s 94962->95091 95102 4497ed InterlockedDecrement 94962->95102 95110 42c1af 48 API calls 94962->95110 95098 46ccdc 48 API calls 94965->95098 94967 488857 94969 488865 94967->94969 94970 4888aa 94967->94970 95099 459b72 48 API calls 94969->95099 94973 4888a0 Mailbox 94970->94973 95100 45a69d 48 API calls 94970->95100 94971 41fe30 335 API calls 94971->94976 94973->94971 94975 4888e7 94977 41bc74 48 API calls 94975->94977 94976->94099 94977->94973 94979 424637 94978->94979 94980 42479f 94978->94980 94981 424643 94979->94981 94982 486e05 94979->94982 94983 41ce19 48 API calls 94980->94983 95164 424300 335 API calls _memcpy_s 94981->95164 95165 46e822 335 API calls Mailbox 94982->95165 94990 4246e4 Mailbox 94983->94990 94986 486e11 94987 424739 Mailbox 94986->94987 95166 45cc5c 86 API calls 4 library calls 94986->95166 94987->94099 94989 424659 94989->94986 94989->94987 94989->94990 94992 414252 84 API calls 94990->94992 95111 466ff0 94990->95111 95120 456524 94990->95120 95123 45fa0c 94990->95123 94992->94987 95271 41bd30 94995->95271 94997 423267 94999 48907a 94997->94999 95000 4232f8 94997->95000 95060 423628 94997->95060 95289 45cc5c 86 API calls 4 library calls 94999->95289 95283 42c36b 86 API calls 95000->95283 95002 489072 95002->94099 95005 4891fa 95294 45cc5c 86 API calls 4 library calls 95005->95294 95006 42c3c3 48 API calls 95056 4234eb _memcpy_s Mailbox 95006->95056 95007 423313 95007->95056 95007->95060 95062 4894df 95007->95062 95276 412b7a 95007->95276 95011 4893c5 95015 41fe30 335 API calls 95011->95015 95012 48926d 95298 45cc5c 86 API calls 4 library calls 95012->95298 95013 48909a 95013->95005 95016 41d645 53 API calls 95013->95016 95017 489407 95015->95017 95018 48910c 95016->95018 95027 41d6e9 55 API calls 95017->95027 95017->95060 95022 489220 95018->95022 95023 489114 95018->95023 95020 4233ce 95024 48945e 95020->95024 95025 423465 95020->95025 95020->95056 95295 411caa 49 API calls 95022->95295 95034 489128 95023->95034 95039 489152 95023->95039 95304 45c942 50 API calls 95024->95304 95030 42f4ea 48 API calls 95025->95030 95031 489438 95027->95031 95046 42346c 95030->95046 95303 45cc5c 86 API calls 4 library calls 95031->95303 95032 48923d 95036 48925e 95032->95036 95037 489252 95032->95037 95033 41fe30 335 API calls 95033->95056 95290 45cc5c 86 API calls 4 library calls 95034->95290 95297 45cc5c 86 API calls 4 library calls 95036->95297 95296 45cc5c 86 API calls 4 library calls 95037->95296 95043 489177 95039->95043 95047 489195 95039->95047 95291 46f320 335 API calls 95043->95291 95050 41e8d0 335 API calls 95046->95050 95052 42351f 95046->95052 95048 48918b 95047->95048 95292 46f5ee 335 API calls 95047->95292 95048->95060 95293 42c2d6 48 API calls _memcpy_s 95048->95293 95050->95056 95051 42f4ea 48 API calls 95051->95056 95054 416eed 48 API calls 95052->95054 95055 423540 95052->95055 95054->95055 95055->95060 95061 4894b0 95055->95061 95064 423585 95055->95064 95056->95006 95056->95011 95056->95012 95056->95013 95056->95031 95056->95033 95056->95051 95056->95052 95057 489394 95056->95057 95056->95060 95285 41d9a0 53 API calls __cinit 95056->95285 95286 41d8c0 53 API calls 95056->95286 95287 42c2d6 48 API calls _memcpy_s 95056->95287 95299 46cda2 82 API calls Mailbox 95056->95299 95300 4580e3 53 API calls 95056->95300 95301 41d764 55 API calls 95056->95301 95302 41dcae 50 API calls Mailbox 95056->95302 95059 42f4ea 48 API calls 95057->95059 95059->95011 95067 423635 Mailbox 95060->95067 95288 45cc5c 86 API calls 4 library calls 95060->95288 95305 41dcae 50 API calls Mailbox 95061->95305 95062->95060 95306 45cc5c 86 API calls 4 library calls 95062->95306 95064->95060 95064->95062 95065 423615 95064->95065 95284 41dcae 50 API calls Mailbox 95065->95284 95067->94099 95069 42e253 95068->95069 95070 48df42 95068->95070 95069->94099 95071 48df77 95070->95071 95072 48df59 TranslateAcceleratorW 95070->95072 95072->95069 95074 42dc71 95073->95074 95075 42dca3 95073->95075 95074->95075 95076 42dc96 IsDialogMessageW 95074->95076 95077 48dd1d GetClassLongW 95074->95077 95075->94099 95076->95074 95076->95075 95077->95074 95077->95076 95078->94099 95079->94099 95080->94051 95081->94045 95082->94050 95083->94099 95084->94099 95085->94094 95086->94094 95087->94094 95088->94094 95089->94094 95090->94094 95091->94962 95092->94919 95093->94957 95094->94962 95095->94976 95096->94935 95097->94961 95098->94967 95099->94973 95100->94975 95101->94962 95102->94962 95103->94962 95104->94959 95105->94976 95106->94976 95107->94954 95108->94976 95109->94976 95110->94962 95112 41936c 81 API calls 95111->95112 95113 46702a 95112->95113 95114 41b470 91 API calls 95113->95114 95115 46703a 95114->95115 95116 46705f 95115->95116 95117 41fe30 335 API calls 95115->95117 95119 467063 95116->95119 95167 41cdb9 48 API calls 95116->95167 95117->95116 95119->94987 95168 456ca9 GetFileAttributesW 95120->95168 95124 45fa1c __ftell_nolock 95123->95124 95125 45fa44 95124->95125 95233 41d286 48 API calls 95124->95233 95127 41936c 81 API calls 95125->95127 95128 45fa5e 95127->95128 95129 45fa80 95128->95129 95130 45fb68 95128->95130 95140 45fb92 95128->95140 95131 41936c 81 API calls 95129->95131 95132 4141a9 136 API calls 95130->95132 95138 45fa8c _wcscpy _wcschr 95131->95138 95133 45fb79 95132->95133 95134 45fb8e 95133->95134 95136 4141a9 136 API calls 95133->95136 95135 41936c 81 API calls 95134->95135 95134->95140 95137 45fbc7 95135->95137 95136->95134 95139 431dfc __wsplitpath 47 API calls 95137->95139 95143 45fab0 _wcscat _wcscpy 95138->95143 95148 45fade _wcscat 95138->95148 95144 45fbeb _wcscat _wcscpy 95139->95144 95140->94987 95141 41936c 81 API calls 95142 45fafc _wcscpy 95141->95142 95234 4572cb GetFileAttributesW 95142->95234 95145 41936c 81 API calls 95143->95145 95152 41936c 81 API calls 95144->95152 95145->95148 95147 41936c 81 API calls 95150 45fb48 95147->95150 95148->95141 95149 45fb1c __NMSG_WRITE 95149->95140 95149->95147 95235 4560dd 77 API calls 4 library calls 95150->95235 95154 45fc82 95152->95154 95153 45fb5c 95153->95140 95172 45690b 95154->95172 95156 45fca2 95157 456524 3 API calls 95156->95157 95158 45fcb1 95157->95158 95159 41936c 81 API calls 95158->95159 95162 45fce2 95158->95162 95160 45fccb 95159->95160 95178 45bfa4 95160->95178 95163 414252 84 API calls 95162->95163 95163->95140 95164->94989 95165->94986 95166->94987 95167->95119 95169 456529 95168->95169 95170 456cc4 FindFirstFileW 95168->95170 95169->94987 95170->95169 95171 456cd9 FindClose 95170->95171 95171->95169 95173 456918 _wcschr __ftell_nolock 95172->95173 95174 45692e _wcscat _wcscpy 95173->95174 95175 431dfc __wsplitpath 47 API calls 95173->95175 95174->95156 95176 45695d 95175->95176 95177 431dfc __wsplitpath 47 API calls 95176->95177 95177->95174 95179 45bfb1 __ftell_nolock 95178->95179 95180 42f4ea 48 API calls 95179->95180 95181 45c00e 95180->95181 95182 4147b7 48 API calls 95181->95182 95183 45c018 95182->95183 95184 45bdb4 GetSystemTimeAsFileTime 95183->95184 95185 45c023 95184->95185 95186 414517 83 API calls 95185->95186 95187 45c036 _wcscmp 95186->95187 95188 45c107 95187->95188 95189 45c05a 95187->95189 95190 45c56d 94 API calls 95188->95190 95191 45c56d 94 API calls 95189->95191 95206 45c0d3 _wcscat 95190->95206 95192 45c05f 95191->95192 95193 431dfc __wsplitpath 47 API calls 95192->95193 95195 45c110 95192->95195 95198 45c088 _wcscat _wcscpy 95193->95198 95194 4144ed 64 API calls 95196 45c12c 95194->95196 95195->95162 95197 4144ed 64 API calls 95196->95197 95199 45c13c 95197->95199 95201 431dfc __wsplitpath 47 API calls 95198->95201 95200 4144ed 64 API calls 95199->95200 95202 45c157 95200->95202 95201->95206 95203 4144ed 64 API calls 95202->95203 95204 45c167 95203->95204 95205 4144ed 64 API calls 95204->95205 95207 45c182 95205->95207 95206->95194 95206->95195 95208 4144ed 64 API calls 95207->95208 95209 45c192 95208->95209 95210 4144ed 64 API calls 95209->95210 95211 45c1a2 95210->95211 95212 4144ed 64 API calls 95211->95212 95213 45c1b2 95212->95213 95236 45c71a GetTempPathW GetTempFileNameW 95213->95236 95215 45c1be 95216 433499 117 API calls 95215->95216 95217 45c1cf 95216->95217 95217->95195 95218 45c289 95217->95218 95221 4144ed 64 API calls 95217->95221 95237 432aae 95217->95237 95219 4335e4 __fcloseall 83 API calls 95218->95219 95220 45c294 95219->95220 95222 45c2ae 95220->95222 95223 45c29a DeleteFileW 95220->95223 95221->95217 95224 45c342 CopyFileW 95222->95224 95228 45c2b8 95222->95228 95223->95195 95225 45c358 DeleteFileW 95224->95225 95226 45c36a DeleteFileW 95224->95226 95225->95195 95250 45c6d9 CreateFileW 95226->95250 95230 45b965 118 API calls 95228->95230 95231 45c32d 95230->95231 95231->95226 95232 45c331 DeleteFileW 95231->95232 95232->95195 95233->95125 95234->95149 95235->95153 95236->95215 95238 432aba _flsall 95237->95238 95239 432ad4 95238->95239 95240 432aec 95238->95240 95241 432ae4 _flsall 95238->95241 95265 437c0e 47 API calls __getptd_noexit 95239->95265 95242 434e1c __lock_file 48 API calls 95240->95242 95241->95217 95244 432af2 95242->95244 95253 432957 95244->95253 95245 432ad9 95266 436e10 8 API calls ___crtsetenv 95245->95266 95251 45c715 95250->95251 95252 45c6ff SetFileTime CloseHandle 95250->95252 95251->95195 95252->95251 95254 432984 95253->95254 95256 432966 95253->95256 95267 432b24 LeaveCriticalSection LeaveCriticalSection _fprintf 95254->95267 95255 432974 95268 437c0e 47 API calls __getptd_noexit 95255->95268 95256->95254 95256->95255 95263 43299c _memcpy_s 95256->95263 95258 432979 95269 436e10 8 API calls ___crtsetenv 95258->95269 95261 432c84 __flush 78 API calls 95261->95263 95262 432933 __flswbuf 47 API calls 95262->95263 95263->95254 95263->95261 95263->95262 95264 43af61 __flswbuf 78 API calls 95263->95264 95270 438e63 78 API calls 4 library calls 95263->95270 95264->95263 95265->95245 95266->95241 95267->95241 95268->95258 95269->95254 95270->95263 95272 41bd3f 95271->95272 95275 41bd5a 95271->95275 95273 41bdfa 48 API calls 95272->95273 95274 41bd47 CharUpperBuffW 95273->95274 95274->95275 95275->94997 95277 48436a 95276->95277 95278 412b8b 95276->95278 95279 42f4ea 48 API calls 95278->95279 95280 412b92 95279->95280 95281 412bb3 95280->95281 95307 412bce 48 API calls 95280->95307 95281->95020 95283->95007 95284->95060 95285->95056 95286->95056 95287->95056 95288->95002 95289->95007 95290->95060 95291->95048 95292->95048 95293->95005 95294->95060 95295->95032 95296->95060 95297->95060 95298->95060 95299->95056 95300->95056 95301->95056 95302->95056 95303->95060 95304->95052 95305->95062 95306->95060 95307->95281

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 644 43b043-43b080 call 43f8a0 647 43b082-43b084 644->647 648 43b089-43b08b 644->648 649 43b860-43b86c call 43a70c 647->649 650 43b08d-43b0a7 call 437bda call 437c0e call 436e10 648->650 651 43b0ac-43b0d9 648->651 650->649 652 43b0e0-43b0e7 651->652 653 43b0db-43b0de 651->653 657 43b105 652->657 658 43b0e9-43b100 call 437bda call 437c0e call 436e10 652->658 653->652 656 43b10b-43b110 653->656 662 43b112-43b11c call 43f82f 656->662 663 43b11f-43b12d call 443bf2 656->663 657->656 693 43b851-43b854 658->693 662->663 674 43b133-43b145 663->674 675 43b44b-43b45d 663->675 674->675 677 43b14b-43b183 call 437a0d GetConsoleMode 674->677 678 43b463-43b473 675->678 679 43b7b8-43b7d5 WriteFile 675->679 677->675 697 43b189-43b18f 677->697 682 43b55a-43b55f 678->682 683 43b479-43b484 678->683 685 43b7e1-43b7e7 GetLastError 679->685 686 43b7d7-43b7df 679->686 688 43b663-43b66e 682->688 689 43b565-43b56e 682->689 691 43b81b-43b833 683->691 692 43b48a-43b49a 683->692 687 43b7e9 685->687 686->687 694 43b7ef-43b7f1 687->694 688->691 701 43b674 688->701 689->691 695 43b574 689->695 699 43b835-43b838 691->699 700 43b83e-43b84e call 437c0e call 437bda 691->700 698 43b4a0-43b4a3 692->698 696 43b85e-43b85f 693->696 703 43b7f3-43b7f5 694->703 704 43b856-43b85c 694->704 705 43b57e-43b595 695->705 696->649 706 43b191-43b193 697->706 707 43b199-43b1bc GetConsoleCP 697->707 708 43b4a5-43b4be 698->708 709 43b4e9-43b520 WriteFile 698->709 699->700 710 43b83a-43b83c 699->710 700->693 711 43b67e-43b693 701->711 703->691 714 43b7f7-43b7fc 703->714 704->696 715 43b59b-43b59e 705->715 706->675 706->707 716 43b1c2-43b1ca 707->716 717 43b440-43b446 707->717 718 43b4c0-43b4ca 708->718 719 43b4cb-43b4e7 708->719 709->685 720 43b526-43b538 709->720 710->696 712 43b699-43b69b 711->712 721 43b6d8-43b719 WideCharToMultiByte 712->721 722 43b69d-43b6b3 712->722 724 43b812-43b819 call 437bed 714->724 725 43b7fe-43b810 call 437c0e call 437bda 714->725 726 43b5a0-43b5b6 715->726 727 43b5de-43b627 WriteFile 715->727 728 43b1d4-43b1d6 716->728 717->703 718->719 719->698 719->709 720->694 729 43b53e-43b54f 720->729 721->685 734 43b71f-43b721 721->734 731 43b6c7-43b6d6 722->731 732 43b6b5-43b6c4 722->732 724->693 725->693 736 43b5b8-43b5ca 726->736 737 43b5cd-43b5dc 726->737 727->685 739 43b62d-43b645 727->739 740 43b36b-43b36e 728->740 741 43b1dc-43b1fe 728->741 729->692 730 43b555 729->730 730->694 731->712 731->721 732->731 744 43b727-43b75a WriteFile 734->744 736->737 737->715 737->727 739->694 747 43b64b-43b658 739->747 742 43b370-43b373 740->742 743 43b375-43b3a2 740->743 748 43b200-43b215 741->748 749 43b217-43b223 call 431688 741->749 742->743 750 43b3a8-43b3ab 742->750 743->750 751 43b77a-43b78e GetLastError 744->751 752 43b75c-43b776 744->752 747->705 754 43b65e 747->754 755 43b271-43b283 call 4440f7 748->755 764 43b225-43b239 749->764 765 43b269-43b26b 749->765 758 43b3b2-43b3c5 call 445884 750->758 759 43b3ad-43b3b0 750->759 763 43b794-43b796 751->763 752->744 760 43b778 752->760 754->694 774 43b435-43b43b 755->774 775 43b289 755->775 758->685 778 43b3cb-43b3d5 758->778 759->758 766 43b407-43b40a 759->766 760->763 763->687 769 43b798-43b7b0 763->769 771 43b412-43b42d 764->771 772 43b23f-43b254 call 4440f7 764->772 765->755 766->728 770 43b410 766->770 769->711 776 43b7b6 769->776 770->774 771->774 772->774 784 43b25a-43b267 772->784 774->687 779 43b28f-43b2c4 WideCharToMultiByte 775->779 776->694 781 43b3d7-43b3ee call 445884 778->781 782 43b3fb-43b401 778->782 779->774 783 43b2ca-43b2f0 WriteFile 779->783 781->685 789 43b3f4-43b3f5 781->789 782->766 783->685 786 43b2f6-43b30e 783->786 784->779 786->774 788 43b314-43b31b 786->788 788->782 790 43b321-43b34c WriteFile 788->790 789->782 790->685 791 43b352-43b359 790->791 791->774 792 43b35f-43b366 791->792 792->782
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6f87df080204d53ba1a69467cdc51ae77ede7cf22ab3a96b5401bbc8e0c154de
            • Instruction ID: 11298924959594bce774aacbb1c5545640a55aa3aaa891068c69b40fee9c5b18
            • Opcode Fuzzy Hash: 6f87df080204d53ba1a69467cdc51ae77ede7cf22ab3a96b5401bbc8e0c154de
            • Instruction Fuzzy Hash: 81327075B022288BDB248F14DC417EAB7B5FF4A314F1450DAE50AA7A81D7349E81CF9A

            Control-flow Graph

            APIs
            • GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,00413AA3,?), ref: 00413D45
            • IsDebuggerPresent.KERNEL32(?,?,?,?,00413AA3,?), ref: 00413D57
            • GetFullPathNameW.KERNEL32(00007FFF,?,?,004D1148,004D1130,?,?,?,?,00413AA3,?), ref: 00413DC8
              • Part of subcall function 00416430: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00413DEE,004D1148,?,?,?,?,?,00413AA3,?), ref: 00416471
            • SetCurrentDirectoryW.KERNEL32(?,?,?,00413AA3,?), ref: 00413E48
            • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,004C28F4,00000010), ref: 00481CCE
            • SetCurrentDirectoryW.KERNEL32(?,004D1148,?,?,?,?,?,00413AA3,?), ref: 00481D06
            • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,004ADAB4,004D1148,?,?,?,?,?,00413AA3,?), ref: 00481D89
            • ShellExecuteW.SHELL32(00000000,?,?,?,?,00413AA3), ref: 00481D90
              • Part of subcall function 00413E6E: GetSysColorBrush.USER32(0000000F), ref: 00413E79
              • Part of subcall function 00413E6E: LoadCursorW.USER32(00000000,00007F00), ref: 00413E88
              • Part of subcall function 00413E6E: LoadIconW.USER32(00000063), ref: 00413E9E
              • Part of subcall function 00413E6E: LoadIconW.USER32(000000A4), ref: 00413EB0
              • Part of subcall function 00413E6E: LoadIconW.USER32(000000A2), ref: 00413EC2
              • Part of subcall function 00413E6E: RegisterClassExW.USER32(?), ref: 00413F30
              • Part of subcall function 004136B8: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 004136E6
              • Part of subcall function 004136B8: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00413707
              • Part of subcall function 004136B8: ShowWindow.USER32(00000000,?,?,?,?,00413AA3,?), ref: 0041371B
              • Part of subcall function 004136B8: ShowWindow.USER32(00000000,?,?,?,?,00413AA3,?), ref: 00413724
              • Part of subcall function 00414FFC: _memset.LIBCMT ref: 00415022
              • Part of subcall function 00414FFC: Shell_NotifyIconW.SHELL32(00000000,?), ref: 004150CB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Window$IconLoad$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundMessageNotifyPresentRegisterShellShell__memset
            • String ID: ()L$This is a third-party compiled AutoIt script.$runas
            • API String ID: 438480954-3068757640
            • Opcode ID: 883d021d63231dd694850dc321495415755c017b59855c4040b1e9fbdeafbd99
            • Instruction ID: 2a3ba377083502f17bb651e6e862680c32673382cd7de2922e11c3d721ce1680
            • Opcode Fuzzy Hash: 883d021d63231dd694850dc321495415755c017b59855c4040b1e9fbdeafbd99
            • Instruction Fuzzy Hash: D751E431E04345BACF11BBF1DD41EEE7B799B59704F00407BF941A22A2DA7C4A868B2D

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1138 42ddc0-42de4f call 41d7f7 GetVersionExW call 416a63 call 42dfb4 call 416571 1147 4824c8-4824cb 1138->1147 1148 42de55-42de56 1138->1148 1151 4824cd 1147->1151 1152 4824e4-4824e8 1147->1152 1149 42de92-42dea2 call 42df77 1148->1149 1150 42de58-42de63 1148->1150 1169 42dec7-42dee1 1149->1169 1170 42dea4-42dec1 GetCurrentProcess call 42df5f 1149->1170 1155 48244e-482454 1150->1155 1156 42de69-42de6b 1150->1156 1158 4824d0 1151->1158 1153 4824ea-4824f3 1152->1153 1154 4824d3-4824dc 1152->1154 1153->1158 1161 4824f5-4824f8 1153->1161 1154->1152 1159 48245e-482464 1155->1159 1160 482456-482459 1155->1160 1162 482469-482475 1156->1162 1163 42de71-42de74 1156->1163 1158->1154 1159->1149 1160->1149 1161->1154 1165 48247f-482485 1162->1165 1166 482477-48247a 1162->1166 1167 42de7a-42de89 1163->1167 1168 482495-482498 1163->1168 1165->1149 1166->1149 1173 48248a-482490 1167->1173 1174 42de8f 1167->1174 1168->1149 1175 48249e-4824b3 1168->1175 1171 42dee3-42def7 call 42e00c 1169->1171 1172 42df31-42df3b GetSystemInfo 1169->1172 1170->1169 1188 42dec3 1170->1188 1186 42df29-42df2f GetSystemInfo 1171->1186 1187 42def9-42df01 call 42dff4 GetNativeSystemInfo 1171->1187 1177 42df0e-42df1a 1172->1177 1173->1149 1174->1149 1179 4824bd-4824c3 1175->1179 1180 4824b5-4824b8 1175->1180 1183 42df21-42df26 1177->1183 1184 42df1c-42df1f FreeLibrary 1177->1184 1179->1149 1180->1149 1184->1183 1190 42df03-42df07 1186->1190 1187->1190 1188->1169 1190->1177 1192 42df09-42df0c FreeLibrary 1190->1192 1192->1177
            APIs
            • GetVersionExW.KERNEL32(?), ref: 0042DDEC
            • GetCurrentProcess.KERNEL32(00000000,004ADC38,?,?), ref: 0042DEAC
            • GetNativeSystemInfo.KERNELBASE(?,004ADC38,?,?), ref: 0042DF01
            • FreeLibrary.KERNEL32(00000000,?,?), ref: 0042DF0C
            • FreeLibrary.KERNEL32(00000000,?,?), ref: 0042DF1F
            • GetSystemInfo.KERNEL32(?,004ADC38,?,?), ref: 0042DF29
            • GetSystemInfo.KERNEL32(?,004ADC38,?,?), ref: 0042DF35
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: InfoSystem$FreeLibrary$CurrentNativeProcessVersion
            • String ID:
            • API String ID: 3851250370-0
            • Opcode ID: 0e0d62b5ef99326c35f8ac788ecdcb53825552bad0b1ed7678d2a9af4ecdffa6
            • Instruction ID: 5dfbc7e3c1dbde1aa489463f9ea6923f1d15ec4b6b48259c3705ce04a143f052
            • Opcode Fuzzy Hash: 0e0d62b5ef99326c35f8ac788ecdcb53825552bad0b1ed7678d2a9af4ecdffa6
            • Instruction Fuzzy Hash: E261C471D0A294CBCF15DF64A5C11EE7FB46F29300B5A89DAD8459F30BC628C509CB6E

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1210 41406b-414083 CreateStreamOnHGlobal 1211 4140a3-4140a6 1210->1211 1212 414085-41409c FindResourceExW 1210->1212 1213 4140a2 1212->1213 1214 484f16-484f25 LoadResource 1212->1214 1213->1211 1214->1213 1215 484f2b-484f39 SizeofResource 1214->1215 1215->1213 1216 484f3f-484f4a LockResource 1215->1216 1216->1213 1217 484f50-484f6e 1216->1217 1217->1213
            APIs
            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,0041449E,?,?,00000000,00000001), ref: 0041407B
            • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,0041449E,?,?,00000000,00000001), ref: 00414092
            • LoadResource.KERNEL32(?,00000000,?,?,0041449E,?,?,00000000,00000001,?,?,?,?,?,?,004141FB), ref: 00484F1A
            • SizeofResource.KERNEL32(?,00000000,?,?,0041449E,?,?,00000000,00000001,?,?,?,?,?,?,004141FB), ref: 00484F2F
            • LockResource.KERNEL32(0041449E,?,?,0041449E,?,?,00000000,00000001,?,?,?,?,?,?,004141FB,00000000), ref: 00484F42
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
            • String ID: SCRIPT
            • API String ID: 3051347437-3967369404
            • Opcode ID: f84de5a46d8fa49a4c3e70daaa77744f029b83a661207549eb9a67262630f9f9
            • Instruction ID: 128b76359f42c9deecb0bb31dde5b749287032cc883753f30ab93dafa9b6831b
            • Opcode Fuzzy Hash: f84de5a46d8fa49a4c3e70daaa77744f029b83a661207549eb9a67262630f9f9
            • Instruction Fuzzy Hash: 8C117C70600701BFE7259B26EC48F677BB9EBC9B51F20457EF606862A0DB71DC408A24
            APIs
            • GetFileAttributesW.KERNELBASE(?,00482F49), ref: 00456CB9
            • FindFirstFileW.KERNELBASE(?,?), ref: 00456CCA
            • FindClose.KERNEL32(00000000), ref: 00456CDA
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: FileFind$AttributesCloseFirst
            • String ID:
            • API String ID: 48322524-0
            • Opcode ID: e5f5aef4885fcf91a5cc0507e48b8ea63d0af83c24c6cb00555f8e34355f4252
            • Instruction ID: 014fa5abca507f3380bdf97a8e5d6354c3c3f5aedc907934e6caca2d2d989d56
            • Opcode Fuzzy Hash: e5f5aef4885fcf91a5cc0507e48b8ea63d0af83c24c6cb00555f8e34355f4252
            • Instruction Fuzzy Hash: 6DE0D832C104106782156738EC0E4EA376CDA1533AF500767F872C32E0EB74DD0445DE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: BuffCharUpper
            • String ID: M
            • API String ID: 3964851224-2044235027
            • Opcode ID: 3010d60c83fafbed1bedde10c77187c90048da7bf2af4eed009601c6b5c95a2a
            • Instruction ID: b7a37661ba4d04b6ef77e028cc9988edceafdf38fcdfb6d9b889d3c357aafd8c
            • Opcode Fuzzy Hash: 3010d60c83fafbed1bedde10c77187c90048da7bf2af4eed009601c6b5c95a2a
            • Instruction Fuzzy Hash: 1E929D706083119FD724DF19C480B6ABBF1BF88308F54885EE88A8B352D779ED45CB5A
            APIs
            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0041E959
            • timeGetTime.WINMM ref: 0041EBFA
            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0041ED2E
            • TranslateMessage.USER32(?), ref: 0041ED3F
            • DispatchMessageW.USER32(?), ref: 0041ED4A
            • LockWindowUpdate.USER32(00000000), ref: 0041ED79
            • DestroyWindow.USER32 ref: 0041ED85
            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0041ED9F
            • Sleep.KERNEL32(0000000A), ref: 00485270
            • TranslateMessage.USER32(?), ref: 004859F7
            • DispatchMessageW.USER32(?), ref: 00485A05
            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00485A19
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Message$DispatchPeekTranslateWindow$DestroyLockSleepTimeUpdatetime
            • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
            • API String ID: 2641332412-570651680
            • Opcode ID: 96abd7cf41b801127e420c47232587a87f0fbe51c670d34dc0717804522c27b7
            • Instruction ID: 87acb94041a2785f0c9d76a5ee3213e9b285a0b49390c22e39c7982e2ad75d27
            • Opcode Fuzzy Hash: 96abd7cf41b801127e420c47232587a87f0fbe51c670d34dc0717804522c27b7
            • Instruction Fuzzy Hash: 02629374608340DFDB24DF25C885BAE77E4BF44304F04497FE9468B292DB799889CB5A
            APIs
            • ___createFile.LIBCMT ref: 00445EC3
            • ___createFile.LIBCMT ref: 00445F04
            • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00445F2D
            • __dosmaperr.LIBCMT ref: 00445F34
            • GetFileType.KERNELBASE(00000000,?,?,?,?,?,00000000,00000109), ref: 00445F47
            • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00445F6A
            • __dosmaperr.LIBCMT ref: 00445F73
            • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00445F7C
            • __set_osfhnd.LIBCMT ref: 00445FAC
            • __lseeki64_nolock.LIBCMT ref: 00446016
            • __close_nolock.LIBCMT ref: 0044603C
            • __chsize_nolock.LIBCMT ref: 0044606C
            • __lseeki64_nolock.LIBCMT ref: 0044607E
            • __lseeki64_nolock.LIBCMT ref: 00446176
            • __lseeki64_nolock.LIBCMT ref: 0044618B
            • __close_nolock.LIBCMT ref: 004461EB
              • Part of subcall function 0043EA9C: CloseHandle.KERNELBASE(00000000,004BEEF4,00000000,?,00446041,004BEEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 0043EAEC
              • Part of subcall function 0043EA9C: GetLastError.KERNEL32(?,00446041,004BEEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 0043EAF6
              • Part of subcall function 0043EA9C: __free_osfhnd.LIBCMT ref: 0043EB03
              • Part of subcall function 0043EA9C: __dosmaperr.LIBCMT ref: 0043EB25
              • Part of subcall function 00437C0E: __getptd_noexit.LIBCMT ref: 00437C0E
            • __lseeki64_nolock.LIBCMT ref: 0044620D
            • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00446342
            • ___createFile.LIBCMT ref: 00446361
            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000109), ref: 0044636E
            • __dosmaperr.LIBCMT ref: 00446375
            • __free_osfhnd.LIBCMT ref: 00446395
            • __invoke_watson.LIBCMT ref: 004463C3
            • __wsopen_helper.LIBCMT ref: 004463DD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: __lseeki64_nolock$ErrorFileLast__dosmaperr$CloseHandle___create$__close_nolock__free_osfhnd$Type__chsize_nolock__getptd_noexit__invoke_watson__set_osfhnd__wsopen_helper
            • String ID: @
            • API String ID: 3896587723-2766056989
            • Opcode ID: 01035a62caac20a374ed1ef278592ceeb6fc5a2bad6f4aeab3e011e741589ed1
            • Instruction ID: a9212f16414ff3bdb350967a8bd62108fa736c4084d896c571aeeca9a8500449
            • Opcode Fuzzy Hash: 01035a62caac20a374ed1ef278592ceeb6fc5a2bad6f4aeab3e011e741589ed1
            • Instruction Fuzzy Hash: C52235B1D00505ABFF299F68DC45BAE7B21EF05314F25826BE9219B3D2C63D8D40C75A

            Control-flow Graph

            APIs
            • _wcscpy.LIBCMT ref: 0045FA96
            • _wcschr.LIBCMT ref: 0045FAA4
            • _wcscpy.LIBCMT ref: 0045FABB
            • _wcscat.LIBCMT ref: 0045FACA
            • _wcscat.LIBCMT ref: 0045FAE8
            • _wcscpy.LIBCMT ref: 0045FB09
            • __wsplitpath.LIBCMT ref: 0045FBE6
            • _wcscpy.LIBCMT ref: 0045FC0B
            • _wcscpy.LIBCMT ref: 0045FC1D
            • _wcscpy.LIBCMT ref: 0045FC32
            • _wcscat.LIBCMT ref: 0045FC47
            • _wcscat.LIBCMT ref: 0045FC59
            • _wcscat.LIBCMT ref: 0045FC6E
              • Part of subcall function 0045BFA4: _wcscmp.LIBCMT ref: 0045C03E
              • Part of subcall function 0045BFA4: __wsplitpath.LIBCMT ref: 0045C083
              • Part of subcall function 0045BFA4: _wcscpy.LIBCMT ref: 0045C096
              • Part of subcall function 0045BFA4: _wcscat.LIBCMT ref: 0045C0A9
              • Part of subcall function 0045BFA4: __wsplitpath.LIBCMT ref: 0045C0CE
              • Part of subcall function 0045BFA4: _wcscat.LIBCMT ref: 0045C0E4
              • Part of subcall function 0045BFA4: _wcscat.LIBCMT ref: 0045C0F7
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: _wcscat$_wcscpy$__wsplitpath$_wcschr_wcscmp
            • String ID: >>>AUTOIT SCRIPT<<<$t2L
            • API String ID: 2955681530-4077017938
            • Opcode ID: 14c4f5a8e0271102a4edc3771d10915a1b9bfc8e6696b1b1966509e353245da2
            • Instruction ID: 9d8ff6e154a5282b73d97e6cbfc9b287cd8b02750f522a45e3582ef2358a7e7c
            • Opcode Fuzzy Hash: 14c4f5a8e0271102a4edc3771d10915a1b9bfc8e6696b1b1966509e353245da2
            • Instruction Fuzzy Hash: D6919271504205AFDB10EF55C851F9BB3E8BF88314F00496EF95997292DB38FA48CB9A

            Control-flow Graph

            APIs
            • GetSysColorBrush.USER32(0000000F), ref: 00413F86
            • RegisterClassExW.USER32(00000030), ref: 00413FB0
            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00413FC1
            • InitCommonControlsEx.COMCTL32(?), ref: 00413FDE
            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00413FEE
            • LoadIconW.USER32(000000A9), ref: 00414004
            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00414013
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
            • API String ID: 2914291525-1005189915
            • Opcode ID: 54707d5071aa839452660aacc43c2d0734698b9da7fef6ccb5eb58875b35d455
            • Instruction ID: 2b3a54863ef32167623be0ebf20c6fd3961fa34807cf2339c0243f099b746b50
            • Opcode Fuzzy Hash: 54707d5071aa839452660aacc43c2d0734698b9da7fef6ccb5eb58875b35d455
            • Instruction Fuzzy Hash: A221C0B5D01218BFDB00DFA4E889BCDBBB4FB18704F00822BFA11A62A0D7B44544CF99

            Control-flow Graph

            APIs
              • Part of subcall function 0045BDB4: __time64.LIBCMT ref: 0045BDBE
              • Part of subcall function 00414517: _fseek.LIBCMT ref: 0041452F
            • __wsplitpath.LIBCMT ref: 0045C083
              • Part of subcall function 00431DFC: __wsplitpath_helper.LIBCMT ref: 00431E3C
            • _wcscpy.LIBCMT ref: 0045C096
            • _wcscat.LIBCMT ref: 0045C0A9
            • __wsplitpath.LIBCMT ref: 0045C0CE
            • _wcscat.LIBCMT ref: 0045C0E4
            • _wcscat.LIBCMT ref: 0045C0F7
            • _wcscmp.LIBCMT ref: 0045C03E
              • Part of subcall function 0045C56D: _wcscmp.LIBCMT ref: 0045C65D
              • Part of subcall function 0045C56D: _wcscmp.LIBCMT ref: 0045C670
            • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 0045C2A1
            • DeleteFileW.KERNEL32(?,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0045C338
            • CopyFileW.KERNELBASE(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0045C34E
            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 0045C35F
            • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 0045C371
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath$Copy__time64__wsplitpath_helper_fseek_wcscpy
            • String ID:
            • API String ID: 2378138488-0
            • Opcode ID: 742451b2c1d07070d74fc89b41cad7866ff68850128563e2dd9308e025441e14
            • Instruction ID: d7ec5344b846cddb4141bf9ec764bd1f9e03d397c4566305e768396dbb4a8f77
            • Opcode Fuzzy Hash: 742451b2c1d07070d74fc89b41cad7866ff68850128563e2dd9308e025441e14
            • Instruction Fuzzy Hash: 6BC12FB1D00219AFDF11DF95CC81EDEB7B9AF49304F0040ABFA09E6152DB789A888F55

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 958 413742-413762 960 4137c2-4137c4 958->960 961 413764-413767 958->961 960->961 962 4137c6 960->962 963 413769-413770 961->963 964 4137c8 961->964 965 4137ab-4137b3 DefWindowProcW 962->965 968 413776-41377b 963->968 969 41382c-413834 PostQuitMessage 963->969 966 481e00-481e2e call 412ff6 call 42e312 964->966 967 4137ce-4137d1 964->967 976 4137b9-4137bf 965->976 1005 481e33-481e3a 966->1005 970 4137d3-4137d4 967->970 971 4137f6-41381d SetTimer RegisterWindowMessageW 967->971 973 481e88-481e9c call 454ddd 968->973 974 413781-413783 968->974 975 4137f2-4137f4 969->975 977 481da3-481da6 970->977 978 4137da-4137ed KillTimer call 413847 call 41390f 970->978 971->975 980 41381f-41382a CreatePopupMenu 971->980 973->975 999 481ea2 973->999 981 413836-413840 call 42eb83 974->981 982 413789-41378e 974->982 975->976 984 481da8-481daa 977->984 985 481ddc-481dfb MoveWindow 977->985 978->975 980->975 1000 413845 981->1000 988 481e6d-481e74 982->988 989 413794-413799 982->989 992 481dcb-481dd7 SetFocus 984->992 993 481dac-481daf 984->993 985->975 988->965 995 481e7a-481e83 call 44a5f3 988->995 997 481e58-481e68 call 4555bd 989->997 998 41379f-4137a5 989->998 992->975 993->998 1001 481db5-481dc6 call 412ff6 993->1001 995->965 997->975 998->965 998->1005 999->965 1000->975 1001->975 1005->965 1009 481e40-481e53 call 413847 call 414ffc 1005->1009 1009->965
            APIs
            • DefWindowProcW.USER32(?,?,?,?), ref: 004137B3
            • KillTimer.USER32(?,00000001), ref: 004137DD
            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00413800
            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0041380B
            • CreatePopupMenu.USER32 ref: 0041381F
            • PostQuitMessage.USER32(00000000), ref: 0041382E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
            • String ID: TaskbarCreated
            • API String ID: 129472671-2362178303
            • Opcode ID: 2d06069e446d4a8dacf3f810e0f55f6520727b3acb2e094e3bcba010c628e843
            • Instruction ID: 396c99e7af20af7d9cb92f74d66b8cd10dbb730420ce8e6b517f9f56b9b0585c
            • Opcode Fuzzy Hash: 2d06069e446d4a8dacf3f810e0f55f6520727b3acb2e094e3bcba010c628e843
            • Instruction Fuzzy Hash: 3C4104B5200145BBDB146F689D49BFA36A9F700302F04853BF922922F1CB6C9DD1972E

            Control-flow Graph

            APIs
            • GetSysColorBrush.USER32(0000000F), ref: 00413E79
            • LoadCursorW.USER32(00000000,00007F00), ref: 00413E88
            • LoadIconW.USER32(00000063), ref: 00413E9E
            • LoadIconW.USER32(000000A4), ref: 00413EB0
            • LoadIconW.USER32(000000A2), ref: 00413EC2
              • Part of subcall function 00414024: LoadImageW.USER32(00410000,00000063,00000001,00000010,00000010,00000000), ref: 00414048
            • RegisterClassExW.USER32(?), ref: 00413F30
              • Part of subcall function 00413F53: GetSysColorBrush.USER32(0000000F), ref: 00413F86
              • Part of subcall function 00413F53: RegisterClassExW.USER32(00000030), ref: 00413FB0
              • Part of subcall function 00413F53: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00413FC1
              • Part of subcall function 00413F53: InitCommonControlsEx.COMCTL32(?), ref: 00413FDE
              • Part of subcall function 00413F53: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00413FEE
              • Part of subcall function 00413F53: LoadIconW.USER32(000000A9), ref: 00414004
              • Part of subcall function 00413F53: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00414013
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
            • String ID: #$0$AutoIt v3
            • API String ID: 423443420-4155596026
            • Opcode ID: 890c6ffa30dbdea7446b95a34038b8d710e7fab6f7ce990f1863d59b890f239b
            • Instruction ID: ff870bfde1c749087cd45f7270ee05988e7849055036f2e4bcb5ad0829a811c7
            • Opcode Fuzzy Hash: 890c6ffa30dbdea7446b95a34038b8d710e7fab6f7ce990f1863d59b890f239b
            • Instruction Fuzzy Hash: A02128B0E01304BBDB01DFA9ED49A9DBBF5EB48314F00813BEA14A22B1D77546808B99

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1022 43acb3-43ace0 call 436ac0 call 437cf4 call 436986 1029 43ace2-43acf8 call 43e880 1022->1029 1030 43acfd-43ad02 1022->1030 1038 43af52-43af57 call 436b05 1029->1038 1032 43ad08-43ad0f 1030->1032 1033 43ad42-43ad51 GetStartupInfoW 1032->1033 1034 43ad11-43ad40 1032->1034 1036 43ae80-43ae86 1033->1036 1037 43ad57-43ad5c 1033->1037 1034->1032 1041 43af44-43af50 call 43af58 1036->1041 1042 43ae8c-43ae9d 1036->1042 1037->1036 1040 43ad62-43ad79 1037->1040 1044 43ad80-43ad83 1040->1044 1045 43ad7b-43ad7d 1040->1045 1041->1038 1046 43aeb2-43aeb8 1042->1046 1047 43ae9f-43aea2 1042->1047 1049 43ad86-43ad8c 1044->1049 1045->1044 1051 43aeba-43aebd 1046->1051 1052 43aebf-43aec6 1046->1052 1047->1046 1050 43aea4-43aead 1047->1050 1055 43adae-43adb6 1049->1055 1056 43ad8e-43ad9f call 436986 1049->1056 1057 43af3e-43af3f 1050->1057 1054 43aec9-43aed5 GetStdHandle 1051->1054 1052->1054 1058 43aed7-43aed9 1054->1058 1059 43af1c-43af32 1054->1059 1061 43adb9-43adbb 1055->1061 1067 43ae33-43ae3a 1056->1067 1068 43ada5-43adab 1056->1068 1057->1036 1058->1059 1062 43aedb-43aee4 GetFileType 1058->1062 1059->1057 1064 43af34-43af37 1059->1064 1061->1036 1065 43adc1-43adc6 1061->1065 1062->1059 1066 43aee6-43aef0 1062->1066 1064->1057 1069 43ae20-43ae31 1065->1069 1070 43adc8-43adcb 1065->1070 1071 43aef2-43aef8 1066->1071 1072 43aefa-43aefd 1066->1072 1073 43ae40-43ae4e 1067->1073 1068->1055 1069->1061 1070->1069 1074 43adcd-43add1 1070->1074 1076 43af05 1071->1076 1077 43af08-43af1a InitializeCriticalSectionAndSpinCount 1072->1077 1078 43aeff-43af03 1072->1078 1079 43ae50-43ae72 1073->1079 1080 43ae74-43ae7b 1073->1080 1074->1069 1075 43add3-43add5 1074->1075 1081 43add7-43ade3 GetFileType 1075->1081 1082 43ade5-43ae1a InitializeCriticalSectionAndSpinCount 1075->1082 1076->1077 1077->1057 1078->1076 1079->1073 1080->1049 1081->1082 1083 43ae1d 1081->1083 1082->1083 1083->1069
            APIs
            • __lock.LIBCMT ref: 0043ACC1
              • Part of subcall function 00437CF4: __mtinitlocknum.LIBCMT ref: 00437D06
              • Part of subcall function 00437CF4: EnterCriticalSection.KERNEL32(00000000,?,00437ADD,0000000D), ref: 00437D1F
            • __calloc_crt.LIBCMT ref: 0043ACD2
              • Part of subcall function 00436986: __calloc_impl.LIBCMT ref: 00436995
              • Part of subcall function 00436986: Sleep.KERNEL32(00000000,000003BC,0042F507,?,0000000E), ref: 004369AC
            • @_EH4_CallFilterFunc@8.LIBCMT ref: 0043ACED
            • GetStartupInfoW.KERNEL32(?,004C6E28,00000064,00435E91,004C6C70,00000014), ref: 0043AD46
            • __calloc_crt.LIBCMT ref: 0043AD91
            • GetFileType.KERNEL32(00000001), ref: 0043ADD8
            • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000D,00000FA0), ref: 0043AE11
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CriticalSection__calloc_crt$CallCountEnterFileFilterFunc@8InfoInitializeSleepSpinStartupType__calloc_impl__lock__mtinitlocknum
            • String ID:
            • API String ID: 1426640281-0
            • Opcode ID: ec1e87a27553868fcedbd39e4b8dd1114e72cf02af8664bbf8b04f502900a3f5
            • Instruction ID: bf88bf925427db3155f0bf35218ed27ed9d9c3ea0a0ed179d323ad0cc3ad3997
            • Opcode Fuzzy Hash: ec1e87a27553868fcedbd39e4b8dd1114e72cf02af8664bbf8b04f502900a3f5
            • Instruction Fuzzy Hash: FD81D2B09453458FDB24CF68C8415AEBBF0AF09325F24526FD4A6AB3D1C7389813CB5A

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1084 1658218-16582c6 call 1655c28 1087 16582cd-16582f3 call 1659128 CreateFileW 1084->1087 1090 16582f5 1087->1090 1091 16582fa-165830a 1087->1091 1092 1658445-1658449 1090->1092 1096 1658311-165832b VirtualAlloc 1091->1096 1097 165830c 1091->1097 1094 165848b-165848e 1092->1094 1095 165844b-165844f 1092->1095 1098 1658491-1658498 1094->1098 1099 1658451-1658454 1095->1099 1100 165845b-165845f 1095->1100 1101 1658332-1658349 ReadFile 1096->1101 1102 165832d 1096->1102 1097->1092 1103 16584ed-1658502 1098->1103 1104 165849a-16584a5 1098->1104 1099->1100 1105 1658461-165846b 1100->1105 1106 165846f-1658473 1100->1106 1111 1658350-1658390 VirtualAlloc 1101->1111 1112 165834b 1101->1112 1102->1092 1107 1658504-165850f VirtualFree 1103->1107 1108 1658512-165851a 1103->1108 1113 16584a7 1104->1113 1114 16584a9-16584b5 1104->1114 1105->1106 1109 1658475-165847f 1106->1109 1110 1658483 1106->1110 1107->1108 1109->1110 1110->1094 1115 1658397-16583b2 call 1659378 1111->1115 1116 1658392 1111->1116 1112->1092 1113->1103 1117 16584b7-16584c7 1114->1117 1118 16584c9-16584d5 1114->1118 1124 16583bd-16583c7 1115->1124 1116->1092 1120 16584eb 1117->1120 1121 16584d7-16584e0 1118->1121 1122 16584e2-16584e8 1118->1122 1120->1098 1121->1120 1122->1120 1125 16583c9-16583f8 call 1659378 1124->1125 1126 16583fa-165840e call 1659188 1124->1126 1125->1124 1132 1658410 1126->1132 1133 1658412-1658416 1126->1133 1132->1092 1134 1658422-1658426 1133->1134 1135 1658418-165841c CloseHandle 1133->1135 1136 1658436-165843f 1134->1136 1137 1658428-1658433 VirtualFree 1134->1137 1135->1134 1136->1087 1136->1092 1137->1136
            APIs
            • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 016582E9
            • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0165850F
            Memory Dump Source
            • Source File: 00000000.00000002.1278547801.0000000001655000.00000040.00000020.00020000.00000000.sdmp, Offset: 01655000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1655000_LOI REQUEST.jbxd
            Similarity
            • API ID: CreateFileFreeVirtual
            • String ID:
            • API String ID: 204039940-0
            • Opcode ID: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
            • Instruction ID: cff8f820b692099844012e9cafe7972b3aabc6a641c0bd2cf9316222384510ad
            • Opcode Fuzzy Hash: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
            • Instruction Fuzzy Hash: 63A12870E01209EBDF54CFA5C894BEEBBB9BF48304F208159EA01BB281D7759A41CB55

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1193 4149fb-414a25 call 41bcce RegOpenKeyExW 1196 4841cc-4841e3 RegQueryValueExW 1193->1196 1197 414a2b-414a2f 1193->1197 1198 4841e5-484222 call 42f4ea call 4147b7 RegQueryValueExW 1196->1198 1199 484246-48424f RegCloseKey 1196->1199 1204 48423d-484245 call 4147e2 1198->1204 1205 484224-48423b call 416a63 1198->1205 1204->1199 1205->1204
            APIs
            • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 00414A1D
            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 004841DB
            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0048421A
            • RegCloseKey.ADVAPI32(?), ref: 00484249
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: QueryValue$CloseOpen
            • String ID: Include$Software\AutoIt v3\AutoIt
            • API String ID: 1586453840-614718249
            • Opcode ID: eae989c5e2eb0cfbdfa79373a409b7bc74fc4f43fa17e34591348e9247e796a1
            • Instruction ID: c5b074dd39a833993450f375293512a5ef31502f8c4f9c617641cd05039e7122
            • Opcode Fuzzy Hash: eae989c5e2eb0cfbdfa79373a409b7bc74fc4f43fa17e34591348e9247e796a1
            • Instruction Fuzzy Hash: FD116071A00109BEDB00ABA4CD86DEF7BBCEF15358F10006AB502D2191EA749E41D758

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1220 4136b8-413728 CreateWindowExW * 2 ShowWindow * 2
            APIs
            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 004136E6
            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00413707
            • ShowWindow.USER32(00000000,?,?,?,?,00413AA3,?), ref: 0041371B
            • ShowWindow.USER32(00000000,?,?,?,?,00413AA3,?), ref: 00413724
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Window$CreateShow
            • String ID: AutoIt v3$edit
            • API String ID: 1584632944-3779509399
            • Opcode ID: 25b097b75fdcc953e60451a2011e800fee8d97a292d1981ed143a753a10abace
            • Instruction ID: 91d298496141f26ea3d70fe95bcb137d94f0baae47dd4db5e59e40daf1e48d5c
            • Opcode Fuzzy Hash: 25b097b75fdcc953e60451a2011e800fee8d97a292d1981ed143a753a10abace
            • Instruction Fuzzy Hash: AAF0DA71A412D07AE7326797AC48E772F7DD7D7F20B00403BBE05A25B0C6650895DAB8

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1325 1657fd8-1658113 call 1655c28 call 1657ec8 CreateFileW 1332 1658115 1325->1332 1333 165811a-165812a 1325->1333 1334 16581ca-16581cf 1332->1334 1336 1658131-165814b VirtualAlloc 1333->1336 1337 165812c 1333->1337 1338 165814d 1336->1338 1339 165814f-1658166 ReadFile 1336->1339 1337->1334 1338->1334 1340 1658168 1339->1340 1341 165816a-16581a4 call 1657f08 call 1656ec8 1339->1341 1340->1334 1346 16581a6-16581bb call 1657f58 1341->1346 1347 16581c0-16581c8 ExitProcess 1341->1347 1346->1347 1347->1334
            APIs
              • Part of subcall function 01657EC8: Sleep.KERNELBASE(000001F4), ref: 01657ED9
            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 01658109
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1278547801.0000000001655000.00000040.00000020.00020000.00000000.sdmp, Offset: 01655000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1655000_LOI REQUEST.jbxd
            Similarity
            • API ID: CreateFileSleep
            • String ID: AAVR7EVW1WM1AZWU2CSSUA1JJ9Y57
            • API String ID: 2694422964-2277590582
            • Opcode ID: f91bd6a0a4ecc975950ae6b03b55aaa99b28061923129184bf3ecfdf3f6445bd
            • Instruction ID: d140b83ce6c451a78b3950a5d99891c4dde204921183acf4763860220cd3f9ea
            • Opcode Fuzzy Hash: f91bd6a0a4ecc975950ae6b03b55aaa99b28061923129184bf3ecfdf3f6445bd
            • Instruction Fuzzy Hash: AE519330D08289DAEF12D7B8CC58BDEBBB9AF15305F044199E6497B2C1C7B90B49CB65
            APIs
              • Part of subcall function 00415374: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,004D1148,?,004161FF,?,00000000,00000001,00000000), ref: 00415392
              • Part of subcall function 004149FB: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 00414A1D
            • _wcscat.LIBCMT ref: 00482D80
            • _wcscat.LIBCMT ref: 00482DB5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: _wcscat$FileModuleNameOpen
            • String ID: 8!M$\$\Include\
            • API String ID: 3592542968-2481258703
            • Opcode ID: e4487faea40fbc3fc31c6419b905c4748f6a552fa8a5eaef570367c117a1a28c
            • Instruction ID: 3d7b5760c8c7083ff87a1732069f77f89a5281dc22313b133fa0ce8eb4601726
            • Opcode Fuzzy Hash: e4487faea40fbc3fc31c6419b905c4748f6a552fa8a5eaef570367c117a1a28c
            • Instruction Fuzzy Hash: E05183714053409BC704EF56EA9189FB7F4BFA9304B40893FF64593261EBB89648CB5E
            APIs
              • Part of subcall function 004141A9: LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,004139FE,?,00000001), ref: 004141DB
            • _free.LIBCMT ref: 004836B7
            • _free.LIBCMT ref: 004836FE
              • Part of subcall function 0041C833: __wsplitpath.LIBCMT ref: 0041C93E
              • Part of subcall function 0041C833: _wcscpy.LIBCMT ref: 0041C953
              • Part of subcall function 0041C833: _wcscat.LIBCMT ref: 0041C968
              • Part of subcall function 0041C833: SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 0041C978
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: _free$CurrentDirectoryLibraryLoad__wsplitpath_wcscat_wcscpy
            • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
            • API String ID: 805182592-1757145024
            • Opcode ID: 6f7fbdedfcf45ce03a9f7bade30a3908d40a86cdba1a2b70a3c24fdcb4852b78
            • Instruction ID: 89da841b3934eeb2f049351d59dff9965b0a06ee38f1cab57bf87f2b1af57df5
            • Opcode Fuzzy Hash: 6f7fbdedfcf45ce03a9f7bade30a3908d40a86cdba1a2b70a3c24fdcb4852b78
            • Instruction Fuzzy Hash: 85919371910218AFCF04EFA5CC919EEB7B4BF05715F50442FF816AB291EB38AA45CB58
            APIs
            • _memset.LIBCMT ref: 00483725
            • GetOpenFileNameW.COMDLG32 ref: 0048376F
              • Part of subcall function 0041660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,004153B1,?,?,004161FF,?,00000000,00000001,00000000), ref: 0041662F
              • Part of subcall function 004140A7: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 004140C6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Name$Path$FileFullLongOpen_memset
            • String ID: X$t3L
            • API String ID: 3777226403-971563897
            • Opcode ID: 392be0cf1cecf0daeaf28dd63c46164854fcbc212edc7bdd62b7edc723a97759
            • Instruction ID: f995879c9cdf501afcbeb1a8c287e51cd47cfac48791880e1e17303299b7ba5d
            • Opcode Fuzzy Hash: 392be0cf1cecf0daeaf28dd63c46164854fcbc212edc7bdd62b7edc723a97759
            • Instruction Fuzzy Hash: FD21C671A10198ABCF01EF95C805BDE7BF99F89304F00801FE405A7241DBBC9A898F69
            APIs
            • __getstream.LIBCMT ref: 004334FE
              • Part of subcall function 00437C0E: __getptd_noexit.LIBCMT ref: 00437C0E
            • @_EH4_CallFilterFunc@8.LIBCMT ref: 00433539
            • __wopenfile.LIBCMT ref: 00433549
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CallFilterFunc@8__getptd_noexit__getstream__wopenfile
            • String ID: <G
            • API String ID: 1820251861-2138716496
            • Opcode ID: a59b08f3bb7382d1ef461dcf74ad68f0a2f54a58d2b048dfb0ad7ce158f9b79a
            • Instruction ID: 6dfa57e9ec91e7cdab5d13c2816149be4e7b5caf0db9531edbc44152dbda8c08
            • Opcode Fuzzy Hash: a59b08f3bb7382d1ef461dcf74ad68f0a2f54a58d2b048dfb0ad7ce158f9b79a
            • Instruction Fuzzy Hash: EC113A70A00206BBDB21BF728C0276F36A4AF5D358F15A52FE415C72C1EB3CCA0197A9
            APIs
            • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,0042D28B,SwapMouseButtons,00000004,?), ref: 0042D2BC
            • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,0042D28B,SwapMouseButtons,00000004,?,?,?,?,0042C865), ref: 0042D2DD
            • RegCloseKey.KERNELBASE(00000000,?,?,0042D28B,SwapMouseButtons,00000004,?,?,?,?,0042C865), ref: 0042D2FF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CloseOpenQueryValue
            • String ID: Control Panel\Mouse
            • API String ID: 3677997916-824357125
            • Opcode ID: 9dff41a9aabe1bca96e4dda07ecb9701986f8c8b906762f496a3593676f6c69e
            • Instruction ID: a9621384f09a0db73fc7b7df7dec803eaa3aca73160d0201e7cacd0720d4011a
            • Opcode Fuzzy Hash: 9dff41a9aabe1bca96e4dda07ecb9701986f8c8b906762f496a3593676f6c69e
            • Instruction Fuzzy Hash: 7F117C75A11218FFDB10CF64DC84EAF7BB8EF04744F00446AE901D7210D675DE419B68
            APIs
            • CreateProcessW.KERNELBASE(?,00000000), ref: 01657683
            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01657719
            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0165773B
            Memory Dump Source
            • Source File: 00000000.00000002.1278547801.0000000001655000.00000040.00000020.00020000.00000000.sdmp, Offset: 01655000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1655000_LOI REQUEST.jbxd
            Similarity
            • API ID: Process$ContextCreateMemoryReadThreadWow64
            • String ID:
            • API String ID: 2438371351-0
            • Opcode ID: ec40cea32e34b77dc66852b254e16eb814eeb5cb53dbe13a3b9b961a1e41453f
            • Instruction ID: 835789494382bb874723313ecd6378073d36023da0ffd2ab408e9e1f4ccd0e1b
            • Opcode Fuzzy Hash: ec40cea32e34b77dc66852b254e16eb814eeb5cb53dbe13a3b9b961a1e41453f
            • Instruction Fuzzy Hash: B062F930A14258DAEB64CFA4CC40BEEB776EF58300F5091A9D50DEB390E7799E81CB59
            APIs
              • Part of subcall function 00414517: _fseek.LIBCMT ref: 0041452F
              • Part of subcall function 0045C56D: _wcscmp.LIBCMT ref: 0045C65D
              • Part of subcall function 0045C56D: _wcscmp.LIBCMT ref: 0045C670
            • _free.LIBCMT ref: 0045C4DD
            • _free.LIBCMT ref: 0045C4E4
            • _free.LIBCMT ref: 0045C54F
              • Part of subcall function 00431C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,00437A85), ref: 00431CB1
              • Part of subcall function 00431C9D: GetLastError.KERNEL32(00000000,?,00437A85), ref: 00431CC3
            • _free.LIBCMT ref: 0045C557
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
            • String ID:
            • API String ID: 1552873950-0
            • Opcode ID: 2db9d723d2f1f24614347a7e6fc8c80c315d14cd5ac174f49895e1fbecc6b5fc
            • Instruction ID: 0997e0c81230736af99e4e8c248fe41e5ed4063527e0903bc42d9d4d66d10d1d
            • Opcode Fuzzy Hash: 2db9d723d2f1f24614347a7e6fc8c80c315d14cd5ac174f49895e1fbecc6b5fc
            • Instruction Fuzzy Hash: 3F5171B1904218AFDF149F69DC81BEDBBB9EF48304F10009EF649A3251DB755A84CF59
            APIs
            • _memset.LIBCMT ref: 0042EBB2
              • Part of subcall function 004151AF: _memset.LIBCMT ref: 0041522F
              • Part of subcall function 004151AF: _wcscpy.LIBCMT ref: 00415283
              • Part of subcall function 004151AF: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00415293
            • KillTimer.USER32(?,00000001,?,?), ref: 0042EC07
            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0042EC16
            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00483C88
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
            • String ID:
            • API String ID: 1378193009-0
            • Opcode ID: be2e7fea8d232e062f6505531aa9afa5cdbf94cd0457aab91fc0def7fe81d972
            • Instruction ID: 5f12543fa9bc0a7ab9b3305be91d89905d57e7653e122df6e7de78dae0723a63
            • Opcode Fuzzy Hash: be2e7fea8d232e062f6505531aa9afa5cdbf94cd0457aab91fc0def7fe81d972
            • Instruction Fuzzy Hash: 79212C71904794AFE7339B69D855BEBBBEC9B01708F04049FE68E57241C3782A84CB59
            APIs
            • GetTempPathW.KERNEL32(00000104,?), ref: 0045C72F
            • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 0045C746
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Temp$FileNamePath
            • String ID: aut
            • API String ID: 3285503233-3010740371
            • Opcode ID: f5ae9898828cb76baa59448833a44d9d6ba05ceea45e0f7dab9bae47df509d7a
            • Instruction ID: 7a4b93e86c318086bbfe2fa2fa9c35056f800ec6580a0491d6f169b4a8467554
            • Opcode Fuzzy Hash: f5ae9898828cb76baa59448833a44d9d6ba05ceea45e0f7dab9bae47df509d7a
            • Instruction Fuzzy Hash: B1D05E7590030EABDB50AB90DC0EFCAB76C9710B04F0001B27650A50B1DAB4E6998B59
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6ec52d803bd92efa9f151d2a38ae811ee38886c7248abf07f72fcdb70a70bb07
            • Instruction ID: 04e510598d74190e050f7ec6df1826742c4399a49f969f0eb798685f9d4fc50e
            • Opcode Fuzzy Hash: 6ec52d803bd92efa9f151d2a38ae811ee38886c7248abf07f72fcdb70a70bb07
            • Instruction Fuzzy Hash: FDF17B716083019FC710DF25D481B5AB7E5FF88318F10892EF9959B392EB38E949CB86
            APIs
            • __FF_MSGBANNER.LIBCMT ref: 00433973
              • Part of subcall function 004381C2: __NMSG_WRITE.LIBCMT ref: 004381E9
              • Part of subcall function 004381C2: __NMSG_WRITE.LIBCMT ref: 004381F3
            • __NMSG_WRITE.LIBCMT ref: 0043397A
              • Part of subcall function 0043821F: GetModuleFileNameW.KERNEL32(00000000,004D0312,00000104,00000000,00000001,00000000), ref: 004382B1
              • Part of subcall function 0043821F: ___crtMessageBoxW.LIBCMT ref: 0043835F
              • Part of subcall function 00431145: ___crtCorExitProcess.LIBCMT ref: 0043114B
              • Part of subcall function 00431145: ExitProcess.KERNEL32 ref: 00431154
              • Part of subcall function 00437C0E: __getptd_noexit.LIBCMT ref: 00437C0E
            • RtlAllocateHeap.NTDLL(01610000,00000000,00000001,00000001,00000000,?,?,0042F507,?,0000000E), ref: 0043399F
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
            • String ID:
            • API String ID: 1372826849-0
            • Opcode ID: 099c43edd30f0c6cff6b2a3fdf3bf27eed43b25420e466cbbfaa94ef3df72737
            • Instruction ID: 09d9328b8d3f2207170fd2c7584a7c5361efc118e908c6f83f5365198fa0e2ef
            • Opcode Fuzzy Hash: 099c43edd30f0c6cff6b2a3fdf3bf27eed43b25420e466cbbfaa94ef3df72737
            • Instruction Fuzzy Hash: E40184B1245201DAEA213F269C52B6F63589F89769F21302FF50597292DEBCDD00466D
            APIs
            • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,0045C385,?,?,?,?,?,00000004), ref: 0045C6F2
            • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,0045C385,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 0045C708
            • CloseHandle.KERNEL32(00000000,?,0045C385,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 0045C70F
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: File$CloseCreateHandleTime
            • String ID:
            • API String ID: 3397143404-0
            • Opcode ID: a591a328245e0f0631e09d4a3042b987c529a347346adebd0b9cd288aea2d8ac
            • Instruction ID: 7b109db163c1180046dde713045c4eee9f0eddf681b40a07cf4fb42e0e13ff83
            • Opcode Fuzzy Hash: a591a328245e0f0631e09d4a3042b987c529a347346adebd0b9cd288aea2d8ac
            • Instruction Fuzzy Hash: 1AE08632540214BBD7311B64EC0EFCA7B18AB15761F104132FB14690E197B12511879C
            APIs
            • _free.LIBCMT ref: 0045BB72
              • Part of subcall function 00431C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,00437A85), ref: 00431CB1
              • Part of subcall function 00431C9D: GetLastError.KERNEL32(00000000,?,00437A85), ref: 00431CC3
            • _free.LIBCMT ref: 0045BB83
            • _free.LIBCMT ref: 0045BB95
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: _free$ErrorFreeHeapLast
            • String ID:
            • API String ID: 776569668-0
            • Opcode ID: 9be2b5beef45e3014043d3abdf219173afad32993680376f9e1db3d5b0d03a7e
            • Instruction ID: 906462d5e2e3cf9f6c211eb84c1ff725573d505b32cf07fa3f25b9b48d0eb018
            • Opcode Fuzzy Hash: 9be2b5beef45e3014043d3abdf219173afad32993680376f9e1db3d5b0d03a7e
            • Instruction Fuzzy Hash: 21E012A164174146DA24697A6E54EB313DC8F08356B14281FB859E7647CF6CF84485EC
            APIs
              • Part of subcall function 004122A4: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,004124F1), ref: 00412303
            • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 004125A1
            • CoInitialize.OLE32(00000000), ref: 00412618
            • CloseHandle.KERNEL32(00000000), ref: 0048503A
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Handle$CloseInitializeMessageRegisterWindow
            • String ID:
            • API String ID: 3815369404-0
            • Opcode ID: b8ea29231488bc901a0338e4cea086641505784bfb9269c4f39c764bfce7298f
            • Instruction ID: ac9f771899fbc28cea27becbbdd28f455d59d78118ad12d51c0d544eae32a3fc
            • Opcode Fuzzy Hash: b8ea29231488bc901a0338e4cea086641505784bfb9269c4f39c764bfce7298f
            • Instruction Fuzzy Hash: 3D71A2B4A03241BBD704EF9AB9A4599BBA4B75934478041BFDD19E73B2CB7A4440CF1C
            APIs
            • IsThemeActive.UXTHEME ref: 00413A73
              • Part of subcall function 00431405: __lock.LIBCMT ref: 0043140B
              • Part of subcall function 00413ADB: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00413AF3
              • Part of subcall function 00413ADB: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00413B08
              • Part of subcall function 00413D19: GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,00413AA3,?), ref: 00413D45
              • Part of subcall function 00413D19: IsDebuggerPresent.KERNEL32(?,?,?,?,00413AA3,?), ref: 00413D57
              • Part of subcall function 00413D19: GetFullPathNameW.KERNEL32(00007FFF,?,?,004D1148,004D1130,?,?,?,?,00413AA3,?), ref: 00413DC8
              • Part of subcall function 00413D19: SetCurrentDirectoryW.KERNEL32(?,?,?,00413AA3,?), ref: 00413E48
            • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00413AB3
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme__lock
            • String ID:
            • API String ID: 924797094-0
            • Opcode ID: b1d003eed75e26ef0677f46dc64452f4e0e79de2b611104efd3fe7a321ea8afb
            • Instruction ID: 946f6b8e848063285b2505710361e18ec7aa9b4e5f64176e9536f8a6d5e8e678
            • Opcode Fuzzy Hash: b1d003eed75e26ef0677f46dc64452f4e0e79de2b611104efd3fe7a321ea8afb
            • Instruction Fuzzy Hash: 6111C071904351ABC300EF66ED4590EFBE8EFA4350F00892FF884832B1DBB49581CB9A
            APIs
            • ___lock_fhandle.LIBCMT ref: 0043EA29
            • __close_nolock.LIBCMT ref: 0043EA42
              • Part of subcall function 00437BDA: __getptd_noexit.LIBCMT ref: 00437BDA
              • Part of subcall function 00437C0E: __getptd_noexit.LIBCMT ref: 00437C0E
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: __getptd_noexit$___lock_fhandle__close_nolock
            • String ID:
            • API String ID: 1046115767-0
            • Opcode ID: b714a15aab3651254536f44e2ea487f6e7ba883d747b4a94f30594f229fe7cd8
            • Instruction ID: 893f716fd68599c94d51164c95a525010410285e450c7dcadb2fcbfc161e3e35
            • Opcode Fuzzy Hash: b714a15aab3651254536f44e2ea487f6e7ba883d747b4a94f30594f229fe7cd8
            • Instruction Fuzzy Hash: 0C11ECB24076149ED711BFA6C84131D7A606F49339F26634BE4605F1E2C7BC9C018BAD
            APIs
              • Part of subcall function 0043395C: __FF_MSGBANNER.LIBCMT ref: 00433973
              • Part of subcall function 0043395C: __NMSG_WRITE.LIBCMT ref: 0043397A
              • Part of subcall function 0043395C: RtlAllocateHeap.NTDLL(01610000,00000000,00000001,00000001,00000000,?,?,0042F507,?,0000000E), ref: 0043399F
            • std::exception::exception.LIBCMT ref: 0042F51E
            • __CxxThrowException@8.LIBCMT ref: 0042F533
              • Part of subcall function 00436805: RaiseException.KERNEL32(?,?,0000000E,004C6A30,?,?,?,0042F538,0000000E,004C6A30,?,00000001), ref: 00436856
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
            • String ID:
            • API String ID: 3902256705-0
            • Opcode ID: ead1e8aaf52859e2f6eb5a574f3ef1dd7f906c1b06d95a7b6f896231ce8ed934
            • Instruction ID: 9360134d3bf845da15e21e057f6b06757621da30a2fd56729cc4104aabe7dc3a
            • Opcode Fuzzy Hash: ead1e8aaf52859e2f6eb5a574f3ef1dd7f906c1b06d95a7b6f896231ce8ed934
            • Instruction Fuzzy Hash: 2AF0867150411E77DB04BE99E90199E7AA85F04358FE0853FF90891141DBB8965486AD
            APIs
              • Part of subcall function 00437C0E: __getptd_noexit.LIBCMT ref: 00437C0E
            • __lock_file.LIBCMT ref: 00433629
              • Part of subcall function 00434E1C: __lock.LIBCMT ref: 00434E3F
            • __fclose_nolock.LIBCMT ref: 00433634
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
            • String ID:
            • API String ID: 2800547568-0
            • Opcode ID: b979c09d690422f3d4f59b8aedb7875cd625d121e4c7dfca082568ddf2b8bd93
            • Instruction ID: 6f192725fa138bfdbea393b5f9d3b582acbd9bc0a87fc1db216883b0362b0bae
            • Opcode Fuzzy Hash: b979c09d690422f3d4f59b8aedb7875cd625d121e4c7dfca082568ddf2b8bd93
            • Instruction Fuzzy Hash: ECF09671801215BED721BF66880375E76A05F4933AF26E10FE420EB2C1C77C9A419E5D
            APIs
            • CreateProcessW.KERNELBASE(?,00000000), ref: 01657683
            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01657719
            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0165773B
            Memory Dump Source
            • Source File: 00000000.00000002.1278547801.0000000001655000.00000040.00000020.00020000.00000000.sdmp, Offset: 01655000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1655000_LOI REQUEST.jbxd
            Similarity
            • API ID: Process$ContextCreateMemoryReadThreadWow64
            • String ID:
            • API String ID: 2438371351-0
            • Opcode ID: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
            • Instruction ID: ce00ca3773d639263d6a5594df1b763d2c364c2c08602e6d2c7053fc81c337b8
            • Opcode Fuzzy Hash: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
            • Instruction Fuzzy Hash: 7112CE24E24658C6EB24DF64D8507DEB232EF68300F1090E9910DEB7A5E77A4F85CF5A
            APIs
            • __flush.LIBCMT ref: 00432A0B
              • Part of subcall function 00437C0E: __getptd_noexit.LIBCMT ref: 00437C0E
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: __flush__getptd_noexit
            • String ID:
            • API String ID: 4101623367-0
            • Opcode ID: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
            • Instruction ID: a13c0577be56c2c28bf56ca2b247ae76aaf2e2bf2f6872684b7e10bfdb08561a
            • Opcode Fuzzy Hash: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
            • Instruction Fuzzy Hash: BF41C8707007069FDF289EA9CA8156F77A6AF4D360F24A52FE455C7240D6F8DD418B48
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ProtectVirtual
            • String ID:
            • API String ID: 544645111-0
            • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
            • Instruction ID: 72cd989cc9ea9149896f6e2ef5107a4e3a6c6240e5a4a84f28e5f6fb992b5806
            • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
            • Instruction Fuzzy Hash: FC311870B10116DBC718DF1AE48096AFBB2FF49340BA486A6E409CB356DB34EDC1CB94
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ClearVariant
            • String ID:
            • API String ID: 1473721057-0
            • Opcode ID: f8ff16ba458c7bbabb77bf0e76b55180c0810c533788288478512ac32c526c28
            • Instruction ID: faeda1bbd7427e335db1e5e54937e60c972ddc488ccff6fd97875f758c8b8ba7
            • Opcode Fuzzy Hash: f8ff16ba458c7bbabb77bf0e76b55180c0810c533788288478512ac32c526c28
            • Instruction Fuzzy Hash: 3F418F746046118FDB24DF15D084B1ABBE0BF45308F5889ADE9964B362C37AFC86CF46
            APIs
              • Part of subcall function 00414214: FreeLibrary.KERNEL32(00000000,?), ref: 00414247
            • LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,004139FE,?,00000001), ref: 004141DB
              • Part of subcall function 00414291: FreeLibrary.KERNEL32(00000000), ref: 004142C4
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Library$Free$Load
            • String ID:
            • API String ID: 2391024519-0
            • Opcode ID: f6471562e8ad24c4e1217871e5fed76ee198ad7c0c932fcd2cbf60942f187018
            • Instruction ID: 055b1323026c89b08ebf669a85626188c07a52cca1ae58d415c7d3ebaecb28a9
            • Opcode Fuzzy Hash: f6471562e8ad24c4e1217871e5fed76ee198ad7c0c932fcd2cbf60942f187018
            • Instruction Fuzzy Hash: F311E731700306AADB10BB75DC06FDE77A59FC0758F10842FB996AB1C1DB78DA819B68
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ClearVariant
            • String ID:
            • API String ID: 1473721057-0
            • Opcode ID: ab5ff66ca807d1be84b77b1d393a28fd47433e86e113e3a68315f9eb40c69fdf
            • Instruction ID: 746364fde5595b7573c42d9431969ee23a8cb24ce266aa455d7f45c67b6e8b92
            • Opcode Fuzzy Hash: ab5ff66ca807d1be84b77b1d393a28fd47433e86e113e3a68315f9eb40c69fdf
            • Instruction Fuzzy Hash: D62166706082119FDB24DF25D444A1BBBF0BF84308F94496EE99647322C339F886CF5A
            APIs
            • ___lock_fhandle.LIBCMT ref: 0043AFC0
              • Part of subcall function 00437BDA: __getptd_noexit.LIBCMT ref: 00437BDA
              • Part of subcall function 00437C0E: __getptd_noexit.LIBCMT ref: 00437C0E
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: __getptd_noexit$___lock_fhandle
            • String ID:
            • API String ID: 1144279405-0
            • Opcode ID: 46b72fdd8ea934d111e0297ad15683f6c49f32180f67929126d87f93d789c8d9
            • Instruction ID: 24b6e4170d4d31a7f37ad45907a3ac06ea82bc265c675d59417ef8c7a90323b1
            • Opcode Fuzzy Hash: 46b72fdd8ea934d111e0297ad15683f6c49f32180f67929126d87f93d789c8d9
            • Instruction Fuzzy Hash: 151193B28056009BD7157FA5C84175E76709F49339F16624BE5741F1E2C7BC99008BAE
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: LibraryLoad
            • String ID:
            • API String ID: 1029625771-0
            • Opcode ID: 6835a613e9910970744cf47f90ff2063449a5087be5f2ce099398601ed1c7b70
            • Instruction ID: c89ed7f672151b8570ce6aac02440a6dd87f6fb2db1b90821d6da8cc0f8db02a
            • Opcode Fuzzy Hash: 6835a613e9910970744cf47f90ff2063449a5087be5f2ce099398601ed1c7b70
            • Instruction Fuzzy Hash: CA01863140010DAECF04EF65C8918EEBB74AF11344F10806BB515971A5EA349A89DB68
            APIs
            • __lock_file.LIBCMT ref: 00432AED
              • Part of subcall function 00437C0E: __getptd_noexit.LIBCMT ref: 00437C0E
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: __getptd_noexit__lock_file
            • String ID:
            • API String ID: 2597487223-0
            • Opcode ID: 1adcde13e9a1d053f31815996a327d55b77affc64f6ba51e18211671b9e74acb
            • Instruction ID: 90f600a8eecc99a9a3d7d0e723889a98e84651d88e4a75fdf86a4252ea2c54a0
            • Opcode Fuzzy Hash: 1adcde13e9a1d053f31815996a327d55b77affc64f6ba51e18211671b9e74acb
            • Instruction Fuzzy Hash: 19F0C231500206ABDF61BF66CD0279F3AA1BF48318F15A41BB4109A191D7BC8A12DB49
            APIs
            • FreeLibrary.KERNEL32(?,?,?,?,?,004139FE,?,00000001), ref: 00414286
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: FreeLibrary
            • String ID:
            • API String ID: 3664257935-0
            • Opcode ID: 060d438faaf753c6dc0d6f46424046755362001f8f83dbac856c0c744d6bbd2a
            • Instruction ID: 45feacab7e9050652006a07d036089273a1e143c46d7548a28c6c76f2ff9078f
            • Opcode Fuzzy Hash: 060d438faaf753c6dc0d6f46424046755362001f8f83dbac856c0c744d6bbd2a
            • Instruction Fuzzy Hash: 49F03071505702DFCB349F64D490896B7E4BF543663248ABFF5D682610C77598C0DF54
            APIs
            • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 004140C6
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: LongNamePath
            • String ID:
            • API String ID: 82841172-0
            • Opcode ID: 0c2a50883477031ba02ba5f542ef3e5e40af56b0d284d3a60c40cf66341f0240
            • Instruction ID: b59632dfa9d61e778b46eddf08379afdba4f017cf2169e0aed12d3f118f8f68a
            • Opcode Fuzzy Hash: 0c2a50883477031ba02ba5f542ef3e5e40af56b0d284d3a60c40cf66341f0240
            • Instruction Fuzzy Hash: 64E07D339001241BC711A258CC42FEA339CDF8C6A4F050076F904D3204DA64D9C08694
            APIs
            • Sleep.KERNELBASE(000001F4), ref: 01657ED9
            Memory Dump Source
            • Source File: 00000000.00000002.1278547801.0000000001655000.00000040.00000020.00020000.00000000.sdmp, Offset: 01655000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1655000_LOI REQUEST.jbxd
            Similarity
            • API ID: Sleep
            • String ID:
            • API String ID: 3472027048-0
            • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
            • Instruction ID: eb6f0c989ba6fe1de72bbd5770dd36b1ce7c24206d74722766ce28a4f48169e6
            • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
            • Instruction Fuzzy Hash: ADE0E67494020EDFDB00DFB4D94969E7BB4EF04301F1001A1FD01D2680DA309D509A62
            APIs
            • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 0047B1CD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: %d/%02d/%02d
            • API String ID: 3850602802-328681919
            • Opcode ID: edc418f4ad669d53d2b2dd451c7e5aec85b231992f5744ba670d26a2e615a653
            • Instruction ID: 2e60821acade21f4196902fa4e73e2b22c1402ff883dab45bc434426d7608b2b
            • Opcode Fuzzy Hash: edc418f4ad669d53d2b2dd451c7e5aec85b231992f5744ba670d26a2e615a653
            • Instruction Fuzzy Hash: 4D12CE71600218ABEB259F64CC59BEF7BB8FF85310F10812BF9199B2D0DB789941CB59
            APIs
            • GetForegroundWindow.USER32(00000000,00000000), ref: 0042EB4A
            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00483AEA
            • IsIconic.USER32(000000FF), ref: 00483AF3
            • ShowWindow.USER32(000000FF,00000009), ref: 00483B00
            • SetForegroundWindow.USER32(000000FF), ref: 00483B0A
            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00483B20
            • GetCurrentThreadId.KERNEL32 ref: 00483B27
            • GetWindowThreadProcessId.USER32(000000FF,00000000), ref: 00483B33
            • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00483B44
            • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00483B4C
            • AttachThreadInput.USER32(00000000,?,00000001), ref: 00483B54
            • SetForegroundWindow.USER32(000000FF), ref: 00483B57
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00483B6C
            • keybd_event.USER32(00000012,00000000), ref: 00483B77
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00483B81
            • keybd_event.USER32(00000012,00000000), ref: 00483B86
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00483B8F
            • keybd_event.USER32(00000012,00000000), ref: 00483B94
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00483B9E
            • keybd_event.USER32(00000012,00000000), ref: 00483BA3
            • SetForegroundWindow.USER32(000000FF), ref: 00483BA6
            • AttachThreadInput.USER32(000000FF,?,00000000), ref: 00483BCD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
            • String ID: Shell_TrayWnd
            • API String ID: 4125248594-2988720461
            • Opcode ID: c4e3927ffcd3992751916e27247504b8c7b5d5aa5ffa402087358fe90d653d11
            • Instruction ID: f95104059de5b1d276ee3bada3c107d65e890df36e4505159319327a5661c4d8
            • Opcode Fuzzy Hash: c4e3927ffcd3992751916e27247504b8c7b5d5aa5ffa402087358fe90d653d11
            • Instruction Fuzzy Hash: EF3182B1E402187BEB206FA58C49F7F3E6CEB44B50F114437FA05AA1D1D6B46D019BA8
            APIs
              • Part of subcall function 0044B134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0044B180
              • Part of subcall function 0044B134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0044B1AD
              • Part of subcall function 0044B134: GetLastError.KERNEL32 ref: 0044B1BA
            • _memset.LIBCMT ref: 0044AD08
            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 0044AD5A
            • CloseHandle.KERNEL32(?), ref: 0044AD6B
            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 0044AD82
            • GetProcessWindowStation.USER32 ref: 0044AD9B
            • SetProcessWindowStation.USER32(00000000), ref: 0044ADA5
            • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 0044ADBF
              • Part of subcall function 0044AB84: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,0044ACC0), ref: 0044AB99
              • Part of subcall function 0044AB84: CloseHandle.KERNEL32(?,?,0044ACC0), ref: 0044ABAB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
            • String ID: $H*L$default$winsta0
            • API String ID: 2063423040-2610704889
            • Opcode ID: 544bddb9b95afd93e67a99f7e419b624eb183c34ff882e93ba8dc13671aac674
            • Instruction ID: e9081b3d643e11be456e698cf3e47fd7df11129b0eb14490b766add946f1759e
            • Opcode Fuzzy Hash: 544bddb9b95afd93e67a99f7e419b624eb183c34ff882e93ba8dc13671aac674
            • Instruction Fuzzy Hash: C981A071840209BFEF119FA4CC44AEF7B78EF08308F14412AF924A2261D7798E64DB69
            APIs
              • Part of subcall function 00456EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00455FA6,?), ref: 00456ED8
              • Part of subcall function 00456EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00455FA6,?), ref: 00456EF1
              • Part of subcall function 0045725E: __wsplitpath.LIBCMT ref: 0045727B
              • Part of subcall function 0045725E: __wsplitpath.LIBCMT ref: 0045728E
              • Part of subcall function 004572CB: GetFileAttributesW.KERNEL32(?,00456019), ref: 004572CC
            • _wcscat.LIBCMT ref: 00456149
            • _wcscat.LIBCMT ref: 00456167
            • __wsplitpath.LIBCMT ref: 0045618E
            • FindFirstFileW.KERNEL32(?,?), ref: 004561A4
            • _wcscpy.LIBCMT ref: 00456209
            • _wcscat.LIBCMT ref: 0045621C
            • _wcscat.LIBCMT ref: 0045622F
            • lstrcmpiW.KERNEL32(?,?), ref: 0045625D
            • DeleteFileW.KERNEL32(?), ref: 0045626E
            • MoveFileW.KERNEL32(?,?), ref: 00456289
            • MoveFileW.KERNEL32(?,?), ref: 00456298
            • CopyFileW.KERNEL32(?,?,00000000), ref: 004562AD
            • DeleteFileW.KERNEL32(?), ref: 004562BE
            • FindNextFileW.KERNEL32(00000000,00000010), ref: 004562E1
            • FindClose.KERNEL32(00000000), ref: 004562FD
            • FindClose.KERNEL32(00000000), ref: 0045630B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: File$Find_wcscat$__wsplitpath$CloseDeleteFullMoveNamePath$AttributesCopyFirstNext_wcscpylstrcmpi
            • String ID: \*.*
            • API String ID: 1917200108-1173974218
            • Opcode ID: 6fbb5a41fc2f07b1af6314db940e28db6ddd56424f5230f043a7599df83603a2
            • Instruction ID: 376f298f0b2100030e93918ab4207cdad3388eb01b3ce09e15acf54964c052c9
            • Opcode Fuzzy Hash: 6fbb5a41fc2f07b1af6314db940e28db6ddd56424f5230f043a7599df83603a2
            • Instruction Fuzzy Hash: 69512072C0811C6ACB21EBA2CC45DEB77BCAF15305F4501EBE945E3142DA3A974D8FA9
            APIs
            • OpenClipboard.USER32(004ADC00), ref: 00466B36
            • IsClipboardFormatAvailable.USER32(0000000D), ref: 00466B44
            • GetClipboardData.USER32(0000000D), ref: 00466B4C
            • CloseClipboard.USER32 ref: 00466B58
            • GlobalLock.KERNEL32(00000000), ref: 00466B74
            • CloseClipboard.USER32 ref: 00466B7E
            • GlobalUnlock.KERNEL32(00000000), ref: 00466B93
            • IsClipboardFormatAvailable.USER32(00000001), ref: 00466BA0
            • GetClipboardData.USER32(00000001), ref: 00466BA8
            • GlobalLock.KERNEL32(00000000), ref: 00466BB5
            • GlobalUnlock.KERNEL32(00000000), ref: 00466BE9
            • CloseClipboard.USER32 ref: 00466CF6
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
            • String ID:
            • API String ID: 3222323430-0
            • Opcode ID: 7bcf675cbb5916175feeaa87f7b7cccfe50d2b2911adda06fc105bdc639c2fd3
            • Instruction ID: ee2b62d61f7dae71490a07167cf6058cbba3f7255414e11e30ae0bcd9ca4799c
            • Opcode Fuzzy Hash: 7bcf675cbb5916175feeaa87f7b7cccfe50d2b2911adda06fc105bdc639c2fd3
            • Instruction Fuzzy Hash: D6518D71644201ABD300AF61DD86FAF77A8AF94B05F01003FF556D62E1EF78E8058A6B
            APIs
            • FindFirstFileW.KERNEL32(?,?), ref: 0045F62B
            • FindClose.KERNEL32(00000000), ref: 0045F67F
            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0045F6A4
            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0045F6BB
            • FileTimeToSystemTime.KERNEL32(?,?), ref: 0045F6E2
            • __swprintf.LIBCMT ref: 0045F72E
            • __swprintf.LIBCMT ref: 0045F767
            • __swprintf.LIBCMT ref: 0045F7BB
              • Part of subcall function 0043172B: __woutput_l.LIBCMT ref: 00431784
            • __swprintf.LIBCMT ref: 0045F809
            • __swprintf.LIBCMT ref: 0045F858
            • __swprintf.LIBCMT ref: 0045F8A7
            • __swprintf.LIBCMT ref: 0045F8F6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: __swprintf$FileTime$FindLocal$CloseFirstSystem__woutput_l
            • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
            • API String ID: 835046349-2428617273
            • Opcode ID: 8c05d8e5d2eb9d90f98006c35c50c25f54120fd5f9be0d48d8e4cc81a45a29f7
            • Instruction ID: c647c12b09400a4f2c1f881c09509b1e9e347a624b8769af1cb7aee2befbb2b3
            • Opcode Fuzzy Hash: 8c05d8e5d2eb9d90f98006c35c50c25f54120fd5f9be0d48d8e4cc81a45a29f7
            • Instruction Fuzzy Hash: C5A12EB2508344ABC310EB95DD85DAFB7ECAF98704F44092FF585C2152EB38DA49C766
            APIs
            • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 00461B50
            • _wcscmp.LIBCMT ref: 00461B65
            • _wcscmp.LIBCMT ref: 00461B7C
            • GetFileAttributesW.KERNEL32(?), ref: 00461B8E
            • SetFileAttributesW.KERNEL32(?,?), ref: 00461BA8
            • FindNextFileW.KERNEL32(00000000,?), ref: 00461BC0
            • FindClose.KERNEL32(00000000), ref: 00461BCB
            • FindFirstFileW.KERNEL32(*.*,?), ref: 00461BE7
            • _wcscmp.LIBCMT ref: 00461C0E
            • _wcscmp.LIBCMT ref: 00461C25
            • SetCurrentDirectoryW.KERNEL32(?), ref: 00461C37
            • SetCurrentDirectoryW.KERNEL32(004C39FC), ref: 00461C55
            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00461C5F
            • FindClose.KERNEL32(00000000), ref: 00461C6C
            • FindClose.KERNEL32(00000000), ref: 00461C7C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
            • String ID: *.*
            • API String ID: 1803514871-438819550
            • Opcode ID: 329de9b08702f84e23f32303b17f121f552c98b2bbf3e7e58c292a462cc84ee5
            • Instruction ID: bc86d4a936045afd26768c0359bb64552a38854e71f1cda05b19bfdebde9de91
            • Opcode Fuzzy Hash: 329de9b08702f84e23f32303b17f121f552c98b2bbf3e7e58c292a462cc84ee5
            • Instruction Fuzzy Hash: E131C332A402196ADB14AFA4DC49BDE77AC9F19320F1441A7F811D31A0FB78DE458A6D
            APIs
            • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 00461CAB
            • _wcscmp.LIBCMT ref: 00461CC0
            • _wcscmp.LIBCMT ref: 00461CD7
              • Part of subcall function 00456BD4: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00456BEF
            • FindNextFileW.KERNEL32(00000000,?), ref: 00461D06
            • FindClose.KERNEL32(00000000), ref: 00461D11
            • FindFirstFileW.KERNEL32(*.*,?), ref: 00461D2D
            • _wcscmp.LIBCMT ref: 00461D54
            • _wcscmp.LIBCMT ref: 00461D6B
            • SetCurrentDirectoryW.KERNEL32(?), ref: 00461D7D
            • SetCurrentDirectoryW.KERNEL32(004C39FC), ref: 00461D9B
            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00461DA5
            • FindClose.KERNEL32(00000000), ref: 00461DB2
            • FindClose.KERNEL32(00000000), ref: 00461DC2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
            • String ID: *.*
            • API String ID: 1824444939-438819550
            • Opcode ID: 6be6c3d97297ad2404067c92af6a0772d883e9bea7d7a30f149ef9179d9bcc65
            • Instruction ID: 40c0934bf5b426467b39cf1d3a28a247a9b3a2e7290fda643c71895aec49842d
            • Opcode Fuzzy Hash: 6be6c3d97297ad2404067c92af6a0772d883e9bea7d7a30f149ef9179d9bcc65
            • Instruction Fuzzy Hash: A83118329002197ACF10AFA4DC49FDE37AC9F55324F144567F801A31B0EB38DE458A6D
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: _memset
            • String ID: Q\E$[$[:<:]]$[:>:]]$\$\$\$\b(?<=\w)$\b(?=\w)$]$^
            • API String ID: 2102423945-2023335898
            • Opcode ID: 4beb76826dd420d968f56fc0d0b954f9f8c3bb557095dc0e5bc776038a15a975
            • Instruction ID: df3a2831091ea1963b9bf53197db23ed2c9de38300a9a6a251d89b8a66f2f84e
            • Opcode Fuzzy Hash: 4beb76826dd420d968f56fc0d0b954f9f8c3bb557095dc0e5bc776038a15a975
            • Instruction Fuzzy Hash: C182C071D04219DBCB24DF98C8807EEBBB1BF44314F24856BD819AB341E778AD85CB88
            APIs
            • GetLocalTime.KERNEL32(?), ref: 004609DF
            • SystemTimeToFileTime.KERNEL32(?,?), ref: 004609EF
            • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 004609FB
            • __wsplitpath.LIBCMT ref: 00460A59
            • _wcscat.LIBCMT ref: 00460A71
            • _wcscat.LIBCMT ref: 00460A83
            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00460A98
            • SetCurrentDirectoryW.KERNEL32(?), ref: 00460AAC
            • SetCurrentDirectoryW.KERNEL32(?), ref: 00460ADE
            • SetCurrentDirectoryW.KERNEL32(?), ref: 00460AFF
            • _wcscpy.LIBCMT ref: 00460B0B
            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00460B4A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
            • String ID: *.*
            • API String ID: 3566783562-438819550
            • Opcode ID: ec62cc49224eb792ec678a1ee65a512aa0dd18e229bc8ac28c53cca28620fa75
            • Instruction ID: abe2d9afb843099ab239e706b030bd70aadb5f423fc34e643a04d31bf9c6d157
            • Opcode Fuzzy Hash: ec62cc49224eb792ec678a1ee65a512aa0dd18e229bc8ac28c53cca28620fa75
            • Instruction Fuzzy Hash: 796168B25042059FC710EF61C84099FB3E9BF89314F04896EF999C7251EB39E949CB9A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID:
            • String ID: K$8d6ddv886ddv806ddv806ddv806ddv806ddv806ddv806ddv806ddv806ddv8c6ddv876ddv846ddv856ddv8f6ddv8c6ddv806ddv806ddv806ddv806ddv806ddv806d$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$KKK K
            • API String ID: 0-2203161607
            • Opcode ID: 33e39bdbf0276e4560d88589ce772847f5b8e2282ce0e68d01244180673fb090
            • Instruction ID: 1b0256123dfb6c855ee30d8e1a731214816b669aa25ea4757e7a93b71e47a3f8
            • Opcode Fuzzy Hash: 33e39bdbf0276e4560d88589ce772847f5b8e2282ce0e68d01244180673fb090
            • Instruction Fuzzy Hash: 79727F71E042199BDF14CF59C8807EEBBB5BF48310F14816BE815EB381DB789A81DB99
            APIs
              • Part of subcall function 0044ABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 0044ABD7
              • Part of subcall function 0044ABBB: GetLastError.KERNEL32(?,0044A69F,?,?,?), ref: 0044ABE1
              • Part of subcall function 0044ABBB: GetProcessHeap.KERNEL32(00000008,?,?,0044A69F,?,?,?), ref: 0044ABF0
              • Part of subcall function 0044ABBB: HeapAlloc.KERNEL32(00000000,?,0044A69F,?,?,?), ref: 0044ABF7
              • Part of subcall function 0044ABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0044AC0E
              • Part of subcall function 0044AC56: GetProcessHeap.KERNEL32(00000008,0044A6B5,00000000,00000000,?,0044A6B5,?), ref: 0044AC62
              • Part of subcall function 0044AC56: HeapAlloc.KERNEL32(00000000,?,0044A6B5,?), ref: 0044AC69
              • Part of subcall function 0044AC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,0044A6B5,?), ref: 0044AC7A
            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044A6D0
            • _memset.LIBCMT ref: 0044A6E5
            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0044A704
            • GetLengthSid.ADVAPI32(?), ref: 0044A715
            • GetAce.ADVAPI32(?,00000000,?), ref: 0044A752
            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 0044A76E
            • GetLengthSid.ADVAPI32(?), ref: 0044A78B
            • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 0044A79A
            • HeapAlloc.KERNEL32(00000000), ref: 0044A7A1
            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044A7C2
            • CopySid.ADVAPI32(00000000), ref: 0044A7C9
            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 0044A7FA
            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 0044A820
            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 0044A834
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
            • String ID:
            • API String ID: 3996160137-0
            • Opcode ID: 8c39430dc2f5a227e1c20bc984871e62e897985297d57372f004efd1e3292404
            • Instruction ID: 24dfe9f11a442f3a9875731e657f495d676da511b6f320937a77bc13cac27e9b
            • Opcode Fuzzy Hash: 8c39430dc2f5a227e1c20bc984871e62e897985297d57372f004efd1e3292404
            • Instruction Fuzzy Hash: E0514D71940209ABEF10DF95DC45AEFBBB9FF04304F04812AF911A7291D739DA15CB69
            APIs
              • Part of subcall function 00456EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00455FA6,?), ref: 00456ED8
              • Part of subcall function 004572CB: GetFileAttributesW.KERNEL32(?,00456019), ref: 004572CC
            • _wcscat.LIBCMT ref: 00456441
            • __wsplitpath.LIBCMT ref: 0045645F
            • FindFirstFileW.KERNEL32(?,?), ref: 00456474
            • _wcscpy.LIBCMT ref: 004564A3
            • _wcscat.LIBCMT ref: 004564B8
            • _wcscat.LIBCMT ref: 004564CA
            • DeleteFileW.KERNEL32(?), ref: 004564DA
            • FindNextFileW.KERNEL32(00000000,00000010), ref: 004564EB
            • FindClose.KERNEL32(00000000), ref: 00456506
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: File$Find_wcscat$AttributesCloseDeleteFirstFullNameNextPath__wsplitpath_wcscpy
            • String ID: \*.*
            • API String ID: 2643075503-1173974218
            • Opcode ID: d6de220fea4fd2fd5242240c215ca2bf3fbe61f049411f9182602109e1925513
            • Instruction ID: 09b3e59349dfa121b7ad420bd239f3c0079bc1645d55d7387207942e3b280e22
            • Opcode Fuzzy Hash: d6de220fea4fd2fd5242240c215ca2bf3fbe61f049411f9182602109e1925513
            • Instruction Fuzzy Hash: 9331A4B2408388AAC721DBA4C8859DB77DCAF56314F40492FF9D9C3142EA39D50D876F
            APIs
              • Part of subcall function 00473C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00472BB5,?,?), ref: 00473C1D
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0047328E
              • Part of subcall function 0041936C: __swprintf.LIBCMT ref: 004193AB
              • Part of subcall function 0041936C: __itow.LIBCMT ref: 004193DF
            • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0047332D
            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 004733C5
            • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00473604
            • RegCloseKey.ADVAPI32(00000000), ref: 00473611
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
            • String ID:
            • API String ID: 1240663315-0
            • Opcode ID: 0ef71319b3c255af4c08a5ff0de472dfed28315e304dff00b2d25209863c2e1c
            • Instruction ID: a27ed90daa3338673ab094673692b5156cb3f41c23e00d5d96d3e01434ad871c
            • Opcode Fuzzy Hash: 0ef71319b3c255af4c08a5ff0de472dfed28315e304dff00b2d25209863c2e1c
            • Instruction Fuzzy Hash: C1E16D71604200AFCB14DF29C991E6BBBE8EF88314F04856EF85AD72A1DB34ED05CB46
            APIs
            • GetKeyboardState.USER32(?), ref: 00452B5F
            • GetAsyncKeyState.USER32(000000A0), ref: 00452BE0
            • GetKeyState.USER32(000000A0), ref: 00452BFB
            • GetAsyncKeyState.USER32(000000A1), ref: 00452C15
            • GetKeyState.USER32(000000A1), ref: 00452C2A
            • GetAsyncKeyState.USER32(00000011), ref: 00452C42
            • GetKeyState.USER32(00000011), ref: 00452C54
            • GetAsyncKeyState.USER32(00000012), ref: 00452C6C
            • GetKeyState.USER32(00000012), ref: 00452C7E
            • GetAsyncKeyState.USER32(0000005B), ref: 00452C96
            • GetKeyState.USER32(0000005B), ref: 00452CA8
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: State$Async$Keyboard
            • String ID:
            • API String ID: 541375521-0
            • Opcode ID: 76757d14f1a6cb9b3f57fa705716527a699a7d3e72351c61773c4396f86728da
            • Instruction ID: ffdcb40a36fcb26767b7bb379c528bc339485e9204b0c8ea6c47b01c02e93056
            • Opcode Fuzzy Hash: 76757d14f1a6cb9b3f57fa705716527a699a7d3e72351c61773c4396f86728da
            • Instruction Fuzzy Hash: F141B6309047C969FB325B648A043ABBEA06B23315F44405BDDC6563C3DBD8A9CCC7AA
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Clipboard$AllocCloseEmptyGlobalOpen
            • String ID:
            • API String ID: 1737998785-0
            • Opcode ID: 18c3491121fb076c7bbd63e8d89cf03e1dcb5874c4d3340db2997e80fbb39c76
            • Instruction ID: 13c2543300c49fa9daea265e96dfa16dac12aef166c54e3affd7a7895641d21e
            • Opcode Fuzzy Hash: 18c3491121fb076c7bbd63e8d89cf03e1dcb5874c4d3340db2997e80fbb39c76
            • Instruction Fuzzy Hash: F221A131700210AFDB01AF65DD49B6E77A8EF54715F01802BF90ADB2A1DB78ED018B5D
            APIs
              • Part of subcall function 00449ABF: CLSIDFromProgID.OLE32 ref: 00449ADC
              • Part of subcall function 00449ABF: ProgIDFromCLSID.OLE32(?,00000000), ref: 00449AF7
              • Part of subcall function 00449ABF: lstrcmpiW.KERNEL32(?,00000000), ref: 00449B05
              • Part of subcall function 00449ABF: CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00449B15
            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 0046C235
            • _memset.LIBCMT ref: 0046C242
            • _memset.LIBCMT ref: 0046C360
            • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000001), ref: 0046C38C
            • CoTaskMemFree.OLE32(?), ref: 0046C397
            Strings
            • NULL Pointer assignment, xrefs: 0046C3E5
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
            • String ID: NULL Pointer assignment
            • API String ID: 1300414916-2785691316
            • Opcode ID: 046d041cc71a792f8d165dadcfb6be4016c3274ac7839733b728721ac0ef2e49
            • Instruction ID: 4c20620d5cc8ae81e61477d5fd46a1d7561564b3845d3a23279db20456fa4976
            • Opcode Fuzzy Hash: 046d041cc71a792f8d165dadcfb6be4016c3274ac7839733b728721ac0ef2e49
            • Instruction Fuzzy Hash: CA915F71D00218ABDB10DF95DC91EEEBBB8EF08314F10816BF915A7281EB74AA45CF95
            APIs
              • Part of subcall function 0044B134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0044B180
              • Part of subcall function 0044B134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0044B1AD
              • Part of subcall function 0044B134: GetLastError.KERNEL32 ref: 0044B1BA
            • ExitWindowsEx.USER32(?,00000000), ref: 00457A0F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
            • String ID: $@$SeShutdownPrivilege
            • API String ID: 2234035333-194228
            • Opcode ID: 39a48172cbfa82532bdf814027e8336e8c80d50f3c26c6ba353b0aa0e4dd6fe5
            • Instruction ID: e0cacd8a461e36b55fe79fa7c4883eba0b810d121bf6200f3803886c908a7509
            • Opcode Fuzzy Hash: 39a48172cbfa82532bdf814027e8336e8c80d50f3c26c6ba353b0aa0e4dd6fe5
            • Instruction Fuzzy Hash: 0401AC716582116BF7285764BC5AFBF72589700746F24043BFD43A21D3D66C5E0981BD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID:
            • String ID: 8d6ddv886ddv806ddv806ddv806ddv806ddv806ddv806ddv806ddv806ddv8c6ddv876ddv846ddv856ddv8f6ddv8c6ddv806ddv806ddv806ddv806ddv806ddv806d$ERCP$VUUU$VUUU$VUUU$VUUU$K
            • API String ID: 0-937363927
            • Opcode ID: 081c75342e0651a3cf5e46e10011c48f287c71caa358c2a7c5288516916ce792
            • Instruction ID: 279191411d231a84eeaf40cc484f3b812972c859dcc03423a6af9c8a2755bb39
            • Opcode Fuzzy Hash: 081c75342e0651a3cf5e46e10011c48f287c71caa358c2a7c5288516916ce792
            • Instruction Fuzzy Hash: 81926E71A01219CBDF24CF58C9907EEBBB1BB54314F1481ABD815A7380D7789DD2CB9A
            APIs
            • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00468CA8
            • WSAGetLastError.WSOCK32(00000000), ref: 00468CB7
            • bind.WSOCK32(00000000,?,00000010), ref: 00468CD3
            • listen.WSOCK32(00000000,00000005), ref: 00468CE2
            • WSAGetLastError.WSOCK32(00000000), ref: 00468CFC
            • closesocket.WSOCK32(00000000,00000000), ref: 00468D10
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ErrorLast$bindclosesocketlistensocket
            • String ID:
            • API String ID: 1279440585-0
            • Opcode ID: 4e7c6203515f9ecd6892a8cc35979417743349341ffb47690eaca1b4675deb3e
            • Instruction ID: f73a7196707e034fbd140a3066f4f1e03665b4c40ad3294a45f112f91438a26c
            • Opcode Fuzzy Hash: 4e7c6203515f9ecd6892a8cc35979417743349341ffb47690eaca1b4675deb3e
            • Instruction Fuzzy Hash: E421E631A002009FC710EF68C985B6E77A9EF48314F10426EF957A73D2DB74AD41CB6A
            APIs
            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 00456554
            • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00456564
            • Process32NextW.KERNEL32(00000000,0000022C), ref: 00456583
            • __wsplitpath.LIBCMT ref: 004565A7
            • _wcscat.LIBCMT ref: 004565BA
            • CloseHandle.KERNEL32(00000000,?,00000000), ref: 004565F9
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath_wcscat
            • String ID:
            • API String ID: 1605983538-0
            • Opcode ID: 944bc56e2ddc8449a805738d4716268c07349e9d9b769b8e606b85c008f1d230
            • Instruction ID: c4ce22b7ba9d3e656ac683b4043fd17cfaeaeac99f10ab5c5f80ff0cb870a7e6
            • Opcode Fuzzy Hash: 944bc56e2ddc8449a805738d4716268c07349e9d9b769b8e606b85c008f1d230
            • Instruction Fuzzy Hash: 002198B190021CBBDB10ABA4DC89BDEB7BCAB08301F5000BAE905D3141EB759F85CB64
            APIs
            • lstrlenW.KERNEL32(?,?,?,00000000), ref: 004513DC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: lstrlen
            • String ID: ($,2L$<2L$|
            • API String ID: 1659193697-1123929334
            • Opcode ID: a7f9f2b70950cd08526f3b3bd9399ecca113b33ba5874bfbfe08f86b5963a429
            • Instruction ID: af0664d73c83732fabc720b67611a92cc76575c80d7922aaa9271c7f92988217
            • Opcode Fuzzy Hash: a7f9f2b70950cd08526f3b3bd9399ecca113b33ba5874bfbfe08f86b5963a429
            • Instruction Fuzzy Hash: 5F322775A007059FC728DF69C480A6AB7F0FF48310B55C56EE89ADB3A2E774E941CB48
            APIs
              • Part of subcall function 0046A82C: inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 0046A84E
            • socket.WSOCK32(00000002,00000002,00000011,?,?,?,00000000), ref: 00469296
            • WSAGetLastError.WSOCK32(00000000,00000000), ref: 004692B9
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ErrorLastinet_addrsocket
            • String ID:
            • API String ID: 4170576061-0
            • Opcode ID: 6836219ee073971e2d85a86dd5d538a5c0cf94f8d4bc2c92213fea7d1dad4ba4
            • Instruction ID: e8356a55bbf7c844c441874782a5933d69e15c5c508aacb57872e07b6ee3f91d
            • Opcode Fuzzy Hash: 6836219ee073971e2d85a86dd5d538a5c0cf94f8d4bc2c92213fea7d1dad4ba4
            • Instruction Fuzzy Hash: F2410670A00210AFDB10AB69C881E7E77EDEF04328F00455EF9169B3D2DB78AD418B99
            APIs
            • FindFirstFileW.KERNEL32(?,?), ref: 0045EB8A
            • _wcscmp.LIBCMT ref: 0045EBBA
            • _wcscmp.LIBCMT ref: 0045EBCF
            • FindNextFileW.KERNEL32(00000000,?), ref: 0045EBE0
            • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045EC0E
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Find$File_wcscmp$CloseFirstNext
            • String ID:
            • API String ID: 2387731787-0
            • Opcode ID: 424c9582a925f4ae7bfc5aad29069543ab9ef0c0ce8fa97948ce90e6f10cf4ec
            • Instruction ID: b53f996dd34f33e7e38690e642772239b1cbfdb778a444296416c7200d09ea24
            • Opcode Fuzzy Hash: 424c9582a925f4ae7bfc5aad29069543ab9ef0c0ce8fa97948ce90e6f10cf4ec
            • Instruction Fuzzy Hash: 8841CF356003019FC708DF29C491A9AB3E4FF59324F10456FE95A8B3A2DB79EA44CB59
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Window$EnabledForegroundIconicVisibleZoomed
            • String ID:
            • API String ID: 292994002-0
            • Opcode ID: ea6b1fee39a09772fb18aebac2764e6e6ea0ff9e5ec34e0a6b4823b18049f589
            • Instruction ID: 38fc7fd60a425d56f60010d547251798b7eec0daa378b3e672162060caa4f417
            • Opcode Fuzzy Hash: ea6b1fee39a09772fb18aebac2764e6e6ea0ff9e5ec34e0a6b4823b18049f589
            • Instruction Fuzzy Hash: 8C1190317402116BE7215F269C48EAFBB98EF54764B44843FF849D7241CF789D0386AD
            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll,?,0042E014,771B0AE0,0042DEF1,004ADC38,?,?), ref: 0042E02C
            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 0042E03E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: GetNativeSystemInfo$kernel32.dll
            • API String ID: 2574300362-192647395
            • Opcode ID: cb3e63eca147f13460a385a7860fe0faecb5bf2a7684cc3ca0edc190ce1aea74
            • Instruction ID: f91432b24f14d5efbce785779b717603c22f3199ff78c8bd953762ddba5dfbb5
            • Opcode Fuzzy Hash: cb3e63eca147f13460a385a7860fe0faecb5bf2a7684cc3ca0edc190ce1aea74
            • Instruction Fuzzy Hash: 58D0A7759007329FC7314F61FD09B1376E4AB10300F28443FE481E2250DBFCD8818658
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Exception@8Throwstd::exception::exception
            • String ID: @$ M$ M$ M
            • API String ID: 3728558374-849382237
            • Opcode ID: 10d5dc3db51b50265ed70fd8ddbb7dfde697321c0d45a578ff30c9289e1a8313
            • Instruction ID: 11df0ae967812a7e16e82a65f8ce5faad14d46ed44c86a84d4f8434b3a35894c
            • Opcode Fuzzy Hash: 10d5dc3db51b50265ed70fd8ddbb7dfde697321c0d45a578ff30c9289e1a8313
            • Instruction Fuzzy Hash: D972CD70E042189FCB10EF94E491AAEB7B5EF48304F65805BE905AB351D73CEE46CB99
            APIs
              • Part of subcall function 0042B34E: GetWindowLongW.USER32(?,000000EB), ref: 0042B35F
            • DefDlgProcW.USER32(?,?,?,?,?), ref: 0042B22F
              • Part of subcall function 0042B55D: DefDlgProcW.USER32(?,00000020,?,00000000), ref: 0042B5A5
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Proc$LongWindow
            • String ID:
            • API String ID: 2749884682-0
            • Opcode ID: 024cf6b4e1de0e8fe6a6b6590bdfc555fb6424af6d7beae1950ef20d0b378ce9
            • Instruction ID: 06eea4e61d65abf8303d937301ce6769e4561c106d5f707172ac06a6bbe1e820
            • Opcode Fuzzy Hash: 024cf6b4e1de0e8fe6a6b6590bdfc555fb6424af6d7beae1950ef20d0b378ce9
            • Instruction Fuzzy Hash: 12A12A60314225FAD724AA6B6C4CDBF2B6CEB41754B90455FF845D2292DB1C9C0293FF
            APIs
            • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,004643BF,00000000), ref: 00464FA6
            • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00464FD2
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Internet$AvailableDataFileQueryRead
            • String ID:
            • API String ID: 599397726-0
            • Opcode ID: b5625a751cb0860d8343230a4d2e58aaed7843dfa1e986fe0782f81ae37b3944
            • Instruction ID: a9a989671193f19f25656f4b52acf15984e8e63566e6ad93d06ad751b8bcc441
            • Opcode Fuzzy Hash: b5625a751cb0860d8343230a4d2e58aaed7843dfa1e986fe0782f81ae37b3944
            • Instruction Fuzzy Hash: EB411B71604205BFEF24DE81DC81EBF77BCEB80758F10406FF20566241F6799E4196AA
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: _memmove
            • String ID: \QL
            • API String ID: 4104443479-1177382760
            • Opcode ID: 2ec96a9e8cf4fc991656724fd86f36b5d3c5caef110d38a4b294690130a7742a
            • Instruction ID: b35d7cca45330630b178c952d9e45b2ce66c8cdf1fb4846d886ed72a5a7a3e68
            • Opcode Fuzzy Hash: 2ec96a9e8cf4fc991656724fd86f36b5d3c5caef110d38a4b294690130a7742a
            • Instruction Fuzzy Hash: 81A24C70904219DFDF24CF58C4806EDBBB1FF48314F2581AAD859AB391D7789E82CB99
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045E20D
            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0045E267
            • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0045E2B4
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ErrorMode$DiskFreeSpace
            • String ID:
            • API String ID: 1682464887-0
            • Opcode ID: 1060e7934b5ab471958fac1ed08262557d206747069f9d317de18874833e0744
            • Instruction ID: 7e497a8327bdcd049cff966b90218a5c2a66df5b46a65adc633349032f55e284
            • Opcode Fuzzy Hash: 1060e7934b5ab471958fac1ed08262557d206747069f9d317de18874833e0744
            • Instruction Fuzzy Hash: AC216035A00218EFCB00DFA6D985EEDBBB8FF48314F0484AAE905E7355DB359945CB58
            APIs
              • Part of subcall function 0042F4EA: std::exception::exception.LIBCMT ref: 0042F51E
              • Part of subcall function 0042F4EA: __CxxThrowException@8.LIBCMT ref: 0042F533
            • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0044B180
            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0044B1AD
            • GetLastError.KERNEL32 ref: 0044B1BA
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
            • String ID:
            • API String ID: 1922334811-0
            • Opcode ID: eaaa01fe4e382135860480c45dcfd8e3c4332e9f630c41c9bfd732396b43e3ee
            • Instruction ID: b95dc9b1ad6bf8663d5dabdd3ef6724c1f8b38c6ddaeed6af2a86597de819786
            • Opcode Fuzzy Hash: eaaa01fe4e382135860480c45dcfd8e3c4332e9f630c41c9bfd732396b43e3ee
            • Instruction Fuzzy Hash: C611BFB1904204AFE718AF54EDC5D2BB7BCEB44354B20853FE45693241DB74FC41CA64
            APIs
            • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00456623
            • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00456664
            • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0045666F
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CloseControlCreateDeviceFileHandle
            • String ID:
            • API String ID: 33631002-0
            • Opcode ID: f369d2098931044cd303fec9637afd57eb6d40823f45bf8ef4e4870997781ff9
            • Instruction ID: b385df14b265c3c9ffb092cdf501effa93b12124a50c0f439a159f586655619f
            • Opcode Fuzzy Hash: f369d2098931044cd303fec9637afd57eb6d40823f45bf8ef4e4870997781ff9
            • Instruction Fuzzy Hash: D8111E71E01228BFDB108FA9DC45BAFBBFCEB45B11F104166F900E7290D7B45A058BA5
            APIs
            • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00457223
            • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 0045723A
            • FreeSid.ADVAPI32(?), ref: 0045724A
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: AllocateCheckFreeInitializeMembershipToken
            • String ID:
            • API String ID: 3429775523-0
            • Opcode ID: 0ef4d7ba842dbd2831ca7fb7770eaade066dfddf7a656dc0d2144e2a1fbb3d04
            • Instruction ID: 203d59911fd4e3fece5bf55f4ad3915cd52c68ed6ca6d90dee12860f7745c1c2
            • Opcode Fuzzy Hash: 0ef4d7ba842dbd2831ca7fb7770eaade066dfddf7a656dc0d2144e2a1fbb3d04
            • Instruction Fuzzy Hash: 7FF01D76E04209BFDF04DFE4DD89AEEBBB8EF08205F50457AA602E3191E2749A448B14
            APIs
            • FindFirstFileW.KERNEL32(?,?), ref: 0045F599
            • FindClose.KERNEL32(00000000), ref: 0045F5C9
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Find$CloseFileFirst
            • String ID:
            • API String ID: 2295610775-0
            • Opcode ID: c24e12c6ea62c8c4a7b8275420fc68e944f74ddaf542649f6e55fe4c22485f03
            • Instruction ID: f22f01dc09665fbde60cb05f77233df1dd3a7aa6a37ac06a7fdeb2327a568db3
            • Opcode Fuzzy Hash: c24e12c6ea62c8c4a7b8275420fc68e944f74ddaf542649f6e55fe4c22485f03
            • Instruction Fuzzy Hash: F311A1326002049FD700EF29D845A2EB3E8FF94325F00892EF8A5D7291DB74AD058B89
            APIs
            • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,0046BE6A,?,?,00000000,?), ref: 0045CEA7
            • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,0046BE6A,?,?,00000000,?), ref: 0045CEB9
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ErrorFormatLastMessage
            • String ID:
            • API String ID: 3479602957-0
            • Opcode ID: 27e520977b0380d8ef359500e8fbd63b1ad42477fd77d0535c035721ce81f68e
            • Instruction ID: dc1c83bc24eb18c313cbf34036503d53751af127da62f9fbec6dc01a6087bc8f
            • Opcode Fuzzy Hash: 27e520977b0380d8ef359500e8fbd63b1ad42477fd77d0535c035721ce81f68e
            • Instruction Fuzzy Hash: C0F08231500329BBDB20ABA4DC89FEA776DBF08365F004166F915D6191D7349A44CBA5
            APIs
            • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00454153
            • keybd_event.USER32(?,75A4C0D0,?,00000000), ref: 00454166
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: InputSendkeybd_event
            • String ID:
            • API String ID: 3536248340-0
            • Opcode ID: 19ddcf7a99e6190659966b90339b7ef765cd38c3652042a5f3cb46e9efd03dfd
            • Instruction ID: 24059f615e108cc37965801c1e3478da6c2bc09ec69c2bb11ce12a9e10a71524
            • Opcode Fuzzy Hash: 19ddcf7a99e6190659966b90339b7ef765cd38c3652042a5f3cb46e9efd03dfd
            • Instruction Fuzzy Hash: A4F06D7080024DAFDB058FA0C809BBE7BB0EF10319F00801AF9669A192D7798656DFA4
            APIs
            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,0044ACC0), ref: 0044AB99
            • CloseHandle.KERNEL32(?,?,0044ACC0), ref: 0044ABAB
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: AdjustCloseHandlePrivilegesToken
            • String ID:
            • API String ID: 81990902-0
            • Opcode ID: 7f03ca97c4d8c2460ad94c67bb30273f31e79d82e284c1dbb49d5d02f57f7f04
            • Instruction ID: 2cb3220c08e1cead0df048d15836f2be6c5780ffe722c67653e1afc367997038
            • Opcode Fuzzy Hash: 7f03ca97c4d8c2460ad94c67bb30273f31e79d82e284c1dbb49d5d02f57f7f04
            • Instruction Fuzzy Hash: 25E04632000620AFE7212F25FC09D73BBA9EB00320B60883EB89A80431CB22AC909B54
            APIs
            • SetUnhandledExceptionFilter.KERNEL32(00000000,0000000E,00436DB3,-0000031A,?,?,00000001), ref: 004381B1
            • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 004381BA
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled
            • String ID:
            • API String ID: 3192549508-0
            • Opcode ID: 1f05357a1dc9c433a95c3b03773cb1c0e6cfdd18351afc778a1dd64b2911e9d4
            • Instruction ID: 842c99a511ca23e252e6cafc61279b0cee0b4195f9ed744e6447343331bda3c0
            • Opcode Fuzzy Hash: 1f05357a1dc9c433a95c3b03773cb1c0e6cfdd18351afc778a1dd64b2911e9d4
            • Instruction Fuzzy Hash: C9B09231444608BBDB102BA1EC09B587F68EB58653F004032FA0D440618B7254108A9A
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d419407ba99cc29b7769ea32cb408056e2cb3235bfbee264044c5709109cd5f2
            • Instruction ID: 10efc64102edf7f30b6bd737f1cedcff727815e52e44019bee2bf6ce02e28d7a
            • Opcode Fuzzy Hash: d419407ba99cc29b7769ea32cb408056e2cb3235bfbee264044c5709109cd5f2
            • Instruction Fuzzy Hash: E1323761D29F014DD7239638D922336A688AFBB3D4F15E737F829B5EA5EB2CC4835104
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: __itow__swprintf
            • String ID:
            • API String ID: 674341424-0
            • Opcode ID: 737f93b1473991ba1b0df25f35d652b439d50db7f746bc285df76f59b5a52114
            • Instruction ID: f23272252ff9b28568b0dc83da91766a13908fa16e8344e3ab6eee2a53c3acaa
            • Opcode Fuzzy Hash: 737f93b1473991ba1b0df25f35d652b439d50db7f746bc285df76f59b5a52114
            • Instruction Fuzzy Hash: 0D229A716083019FD724EF15C890BAFB7E4AF84314F10491EF89A97291DB78ED85CB9A
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5ad2c631f3a6f6d8a91f92ed46807cf77029050a4700af6ef496e100def9172f
            • Instruction ID: c6243d47103201b99749dda7cb81159d49f221aa8132bd55fe46ef64147634ce
            • Opcode Fuzzy Hash: 5ad2c631f3a6f6d8a91f92ed46807cf77029050a4700af6ef496e100def9172f
            • Instruction Fuzzy Hash: BEB1F420D2AF414DD32396398931336BB5CAFBB2D5F91D72BFC1A74D62EB2185834184
            APIs
            • __time64.LIBCMT ref: 0045B6DF
              • Part of subcall function 0043344A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,0045BDC3,00000000,?,?,?,?,0045BF70,00000000,?), ref: 00433453
              • Part of subcall function 0043344A: __aulldiv.LIBCMT ref: 00433473
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Time$FileSystem__aulldiv__time64
            • String ID:
            • API String ID: 2893107130-0
            • Opcode ID: ac05afbee6cfe86d2f3b4e0c202c9f517df9c7b6b0db7060d103dffe302e23ac
            • Instruction ID: a57bfed413c2958a614085b8afdf892473336f5d5fc9e263629480ef017c46be
            • Opcode Fuzzy Hash: ac05afbee6cfe86d2f3b4e0c202c9f517df9c7b6b0db7060d103dffe302e23ac
            • Instruction Fuzzy Hash: 932175726345108BC719CF29C491A52B7E1EB95311B248E7EE4E5CB2C1CB78B909DB98
            APIs
            • BlockInput.USER32(00000001), ref: 00466ACA
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: BlockInput
            • String ID:
            • API String ID: 3456056419-0
            • Opcode ID: 59656a5165d615f62fe425a52ab85b210acf03e8b143d1f6089159cd66420769
            • Instruction ID: 576c835bb327ec2ab85fe828ae20125569f5da48db972970bc14fdae08ac4cab
            • Opcode Fuzzy Hash: 59656a5165d615f62fe425a52ab85b210acf03e8b143d1f6089159cd66420769
            • Instruction Fuzzy Hash: 37E092762002006FC700EBAAD404996B7ECAFB4351B04842BE905D7250DAB4E8048B95
            APIs
            • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 0045750A
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: mouse_event
            • String ID:
            • API String ID: 2434400541-0
            • Opcode ID: dfd10e7ed634aa73dbea0b1c0fe3bf81a4da4e4f02a8d4cdc6ff2b73a75d00e0
            • Instruction ID: a56e06ef28b9001e7126c971b8fd4ae797893ce4492b22ddca1364672c8e25b6
            • Opcode Fuzzy Hash: dfd10e7ed634aa73dbea0b1c0fe3bf81a4da4e4f02a8d4cdc6ff2b73a75d00e0
            • Instruction Fuzzy Hash: 53D067A416C60979E8190B24AC1BFB71608A301792FD4457BBA02996C2B8987D4AA039
            APIs
            • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,0044AD3E), ref: 0044B124
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: LogonUser
            • String ID:
            • API String ID: 1244722697-0
            • Opcode ID: 2e8d684111a98fbffc118d664d9c804699f6a992a48de6ed58b269be1305057c
            • Instruction ID: eab06996a5c9ab866afa23f889e372b04fa66c4c4805c79d949e9b65214d046e
            • Opcode Fuzzy Hash: 2e8d684111a98fbffc118d664d9c804699f6a992a48de6ed58b269be1305057c
            • Instruction Fuzzy Hash: 21D05E320A460EAEDF024FA4DC02EAE3F6AEB04700F408121FA11D50A0C671D531AB50
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: NameUser
            • String ID:
            • API String ID: 2645101109-0
            • Opcode ID: 2b666aa0ed288289b56360cc2e13714e81b37a13c3dffa447cd7169236bf7ffc
            • Instruction ID: edfa857661da4f495ec10edfd11a554ab01da8f13fe6e1727ff034a32e94de9d
            • Opcode Fuzzy Hash: 2b666aa0ed288289b56360cc2e13714e81b37a13c3dffa447cd7169236bf7ffc
            • Instruction Fuzzy Hash: 18C04CB1800109DFD751DFC0C984DEEB7BCAB08305F1040A39105F2110D7749B459B76
            APIs
            • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0043818F
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled
            • String ID:
            • API String ID: 3192549508-0
            • Opcode ID: 2bc0ba50808f0123016b12db4814e69fde192ad5c9e7fa926f6456421578b8f2
            • Instruction ID: 8a037f7541b32bfb135fbd1cfb587ca2f62fefa23a5879b56388e4b3d669263a
            • Opcode Fuzzy Hash: 2bc0ba50808f0123016b12db4814e69fde192ad5c9e7fa926f6456421578b8f2
            • Instruction Fuzzy Hash: 52A0223000020CFBCF002F82FC088883F2CFB002A2B000032FC0C00030CB33A8208ACA
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 78d70782bac739dc17de82844dd3bd0067ee766bb35cdb77d8136d3ecd969e9a
            • Instruction ID: 8f0910354b53c9c237b7a1fadb52fc27a6b9b00e52a87e71ab321b2390f58775
            • Opcode Fuzzy Hash: 78d70782bac739dc17de82844dd3bd0067ee766bb35cdb77d8136d3ecd969e9a
            • Instruction Fuzzy Hash: C1128C70A00209AFDF04DFA5DA91AEEB7F5FF48304F10452AE806E7250EB39AD51CB59
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 9b0dce34aee261c1482b43b0cf96ff1ac29e5e7273217b1fae04d8a7648ed954
            • Instruction ID: bfbca51a3bcf80835193818362071137a40fd10ed49b4322c97f45332e7c61fe
            • Opcode Fuzzy Hash: 9b0dce34aee261c1482b43b0cf96ff1ac29e5e7273217b1fae04d8a7648ed954
            • Instruction Fuzzy Hash: 6712CF78A002159FDB24DF56C490AAEB7B1FF14304F64806BDD869B351E339E982CB99
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Exception@8Throwstd::exception::exception
            • String ID:
            • API String ID: 3728558374-0
            • Opcode ID: 147b4c17c30cb04aff703106368a55409047f374ab5e2ea7bf36f3d0389d71e6
            • Instruction ID: 701079583333007cfd1bf0459e681d0894736abda65d3cadefae09d78ce72a3b
            • Opcode Fuzzy Hash: 147b4c17c30cb04aff703106368a55409047f374ab5e2ea7bf36f3d0389d71e6
            • Instruction Fuzzy Hash: 2402F470A00105DFCF04EF65DA81AAEBBB5FF48300F11846EE806DB255EB78DA55CB99
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
            • Instruction ID: 678b64f2cca3cb516824ea7921851523e953590bac226a93c70921015082dfed
            • Opcode Fuzzy Hash: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
            • Instruction Fuzzy Hash: DFC1F8322051A70ADF2E4639843143FBAB05AA17B175A177FD8B3CB2D5EF18C528D624
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
            • Instruction ID: bd99a22f5fe77e357a197b7406ac4e0a894fef20322a40ad7163bd451ac32483
            • Opcode Fuzzy Hash: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
            • Instruction Fuzzy Hash: 05C1F6322051A709DF2E4639D43453FBAA15EA2BB170B137FD4B2CB6D5EF18C528D624
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
            • Instruction ID: 20828ff719a82f12a89a7b34dadac209ab6451a054368d39c27e0636e1c59871
            • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
            • Instruction Fuzzy Hash: 1FC1D3323051A709DF2E4A3A943543FBAB15AA27B175B137FD4B2CB6D1EF18C528C614
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
            • Instruction ID: b167e0918ad8fcf95d71cfbe3967c23c5032607cf803d06c0f5d6219f0dc5600
            • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
            • Instruction Fuzzy Hash: 49C1B2323050A709DF1E4A3AE43143FBAB15A917B139A077ED4B3CB6D5EE28D528D624
            Memory Dump Source
            • Source File: 00000000.00000002.1278547801.0000000001655000.00000040.00000020.00020000.00000000.sdmp, Offset: 01655000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1655000_LOI REQUEST.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
            • Instruction ID: e91c1fbfe182e8a9965599bebae51843cac0c4820d8870d5722c218fe96e2bb2
            • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
            • Instruction Fuzzy Hash: EC41C271D1051CEBDF48CFADC991AAEBBF2AF88201F548299D516AB345D730AB41DB80
            Memory Dump Source
            • Source File: 00000000.00000002.1278547801.0000000001655000.00000040.00000020.00020000.00000000.sdmp, Offset: 01655000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1655000_LOI REQUEST.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
            • Instruction ID: fcbe95d87ad5bc54d2ae3fa3442a61f2bb4c83a4ea08a4dd9cf83b892105b52e
            • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
            • Instruction Fuzzy Hash: AB019278A00109EFCB94DF99C9909AEF7B6FB88314F208599DC09A7741D730AE41DB84
            Memory Dump Source
            • Source File: 00000000.00000002.1278547801.0000000001655000.00000040.00000020.00020000.00000000.sdmp, Offset: 01655000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1655000_LOI REQUEST.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
            • Instruction ID: 568d0478bd8427855d02adfc713f163a9b14e13047a15fb13ecd9a24718e4075
            • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
            • Instruction Fuzzy Hash: 01019278E01109EFCB94DF98C9909AEF7B6FB88310F208699DC09A7741D730AE51DB80
            Memory Dump Source
            • Source File: 00000000.00000002.1278547801.0000000001655000.00000040.00000020.00020000.00000000.sdmp, Offset: 01655000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1655000_LOI REQUEST.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
            • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
            • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
            • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
            APIs
            • DeleteObject.GDI32(00000000), ref: 0046A2FE
            • DeleteObject.GDI32(00000000), ref: 0046A310
            • DestroyWindow.USER32 ref: 0046A31E
            • GetDesktopWindow.USER32 ref: 0046A338
            • GetWindowRect.USER32(00000000), ref: 0046A33F
            • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0046A480
            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 0046A490
            • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0046A4D8
            • GetClientRect.USER32(00000000,?), ref: 0046A4E4
            • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 0046A51E
            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0046A540
            • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0046A553
            • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0046A55E
            • GlobalLock.KERNEL32(00000000), ref: 0046A567
            • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0046A576
            • GlobalUnlock.KERNEL32(00000000), ref: 0046A57F
            • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0046A586
            • GlobalFree.KERNEL32(00000000), ref: 0046A591
            • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0046A5A3
            • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,0049D9BC,00000000), ref: 0046A5B9
            • GlobalFree.KERNEL32(00000000), ref: 0046A5C9
            • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 0046A5EF
            • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 0046A60E
            • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0046A630
            • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0046A81D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
            • String ID: $AutoIt v3$DISPLAY$static
            • API String ID: 2211948467-2373415609
            • Opcode ID: 626a3d7110af9a97b3fe27b78b31dcec392a573b08982d56163d84e0430a94a9
            • Instruction ID: 0f04db1679428ceb1b9c31999984f21d242e1976b8b8a8d4f786252995114c42
            • Opcode Fuzzy Hash: 626a3d7110af9a97b3fe27b78b31dcec392a573b08982d56163d84e0430a94a9
            • Instruction Fuzzy Hash: BE028D71900204EFDB14DFA4CD89EAE7BB9EB48314F00816AF915AB2A1D734ED41CF69
            APIs
            • SetTextColor.GDI32(?,00000000), ref: 0047D2DB
            • GetSysColorBrush.USER32(0000000F), ref: 0047D30C
            • GetSysColor.USER32(0000000F), ref: 0047D318
            • SetBkColor.GDI32(?,000000FF), ref: 0047D332
            • SelectObject.GDI32(?,00000000), ref: 0047D341
            • InflateRect.USER32(?,000000FF,000000FF), ref: 0047D36C
            • GetSysColor.USER32(00000010), ref: 0047D374
            • CreateSolidBrush.GDI32(00000000), ref: 0047D37B
            • FrameRect.USER32(?,?,00000000), ref: 0047D38A
            • DeleteObject.GDI32(00000000), ref: 0047D391
            • InflateRect.USER32(?,000000FE,000000FE), ref: 0047D3DC
            • FillRect.USER32(?,?,00000000), ref: 0047D40E
            • GetWindowLongW.USER32(?,000000F0), ref: 0047D439
              • Part of subcall function 0047D575: GetSysColor.USER32(00000012), ref: 0047D5AE
              • Part of subcall function 0047D575: SetTextColor.GDI32(?,?), ref: 0047D5B2
              • Part of subcall function 0047D575: GetSysColorBrush.USER32(0000000F), ref: 0047D5C8
              • Part of subcall function 0047D575: GetSysColor.USER32(0000000F), ref: 0047D5D3
              • Part of subcall function 0047D575: GetSysColor.USER32(00000011), ref: 0047D5F0
              • Part of subcall function 0047D575: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0047D5FE
              • Part of subcall function 0047D575: SelectObject.GDI32(?,00000000), ref: 0047D60F
              • Part of subcall function 0047D575: SetBkColor.GDI32(?,00000000), ref: 0047D618
              • Part of subcall function 0047D575: SelectObject.GDI32(?,?), ref: 0047D625
              • Part of subcall function 0047D575: InflateRect.USER32(?,000000FF,000000FF), ref: 0047D644
              • Part of subcall function 0047D575: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0047D65B
              • Part of subcall function 0047D575: GetWindowLongW.USER32(00000000,000000F0), ref: 0047D670
              • Part of subcall function 0047D575: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0047D698
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
            • String ID:
            • API String ID: 3521893082-0
            • Opcode ID: c1fee7570edf5f6c7addfeaad5980272f32d1670ebd8a6914b306a21253d7f7a
            • Instruction ID: c3a2ba59626aa35d327f65fb0493978d4390efb70a8c5a4c559c09171cc7cad1
            • Opcode Fuzzy Hash: c1fee7570edf5f6c7addfeaad5980272f32d1670ebd8a6914b306a21253d7f7a
            • Instruction Fuzzy Hash: 8A919072808301BFCB109F64DC08E6BBBB9FF99325F104A2AF956961A0C734D945CB5A
            APIs
            • DestroyWindow.USER32 ref: 0042B98B
            • DeleteObject.GDI32(00000000), ref: 0042B9CD
            • DeleteObject.GDI32(00000000), ref: 0042B9D8
            • DestroyIcon.USER32(00000000), ref: 0042B9E3
            • DestroyWindow.USER32(00000000), ref: 0042B9EE
            • SendMessageW.USER32(?,00001308,?,00000000), ref: 0048D2AA
            • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0048D2E3
            • MoveWindow.USER32(00000000,?,?,?,?,00000000), ref: 0048D711
              • Part of subcall function 0042B9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,0042B759,?,00000000,?,?,?,?,0042B72B,00000000,?), ref: 0042BA58
            • SendMessageW.USER32 ref: 0048D758
            • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0048D76F
            • ImageList_Destroy.COMCTL32(00000000), ref: 0048D785
            • ImageList_Destroy.COMCTL32(00000000), ref: 0048D790
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
            • String ID: 0
            • API String ID: 464785882-4108050209
            • Opcode ID: 333e83a0336124884dc0f703b2fe929ea81cb5abcd5e9c12e23c55ad06201180
            • Instruction ID: 9b3ebb3e1df2c17597235fd4360f06c02d40269cb8a2014689e9a1e6c36e1373
            • Opcode Fuzzy Hash: 333e83a0336124884dc0f703b2fe929ea81cb5abcd5e9c12e23c55ad06201180
            • Instruction Fuzzy Hash: 43129E70A052119FCB15EF14D884BAAB7E1FF14304F54497BE989DB292C739EC82CB99
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045DBD6
            • GetDriveTypeW.KERNEL32(?,004ADC54,?,\\.\,004ADC00), ref: 0045DCC3
            • SetErrorMode.KERNEL32(00000000,004ADC54,?,\\.\,004ADC00), ref: 0045DE29
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ErrorMode$DriveType
            • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
            • API String ID: 2907320926-4222207086
            • Opcode ID: 3d020cbe4f8f2a97f490e58e7f24a24d7fd697b23c60c67faa77e24fd7f4d558
            • Instruction ID: 25de90f90b9e047f31b5a9d40adf7accf46ce4e2e0e129ce0fd78808f322e744
            • Opcode Fuzzy Hash: 3d020cbe4f8f2a97f490e58e7f24a24d7fd697b23c60c67faa77e24fd7f4d558
            • Instruction Fuzzy Hash: E7516434A447029BC264DF10C882E6AB7B1FE55707B20841FF81797297DA6CED4ED64E
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: __wcsnicmp
            • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
            • API String ID: 1038674560-86951937
            • Opcode ID: faa55bbebf525f4edc59c160ee02f918234e7883709d6766c70fa6b9befe627b
            • Instruction ID: 12273f60c9b733d3d344abc09f14bd49d1c07497cad8ea9c2454331f06921707
            • Opcode Fuzzy Hash: faa55bbebf525f4edc59c160ee02f918234e7883709d6766c70fa6b9befe627b
            • Instruction Fuzzy Hash: 5781F9706802157ACB14BB65DDC2FFF3768AF25304F14402BF906A6186EBACD985C79D
            APIs
            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013,?,?,?), ref: 0047C788
            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0047C83E
            • SendMessageW.USER32(?,00001102,00000002,?), ref: 0047C859
            • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0047CB15
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageSend$Window
            • String ID: 0
            • API String ID: 2326795674-4108050209
            • Opcode ID: f8f3b5f71ac7acd4b93a76c8548c97d57e2b672480c47af1466b154cbcf4b03d
            • Instruction ID: 8b74271e5fef11f9db15678141a3e3870ac2e9a9549d14810a4656dc24c03bff
            • Opcode Fuzzy Hash: f8f3b5f71ac7acd4b93a76c8548c97d57e2b672480c47af1466b154cbcf4b03d
            • Instruction Fuzzy Hash: 33F1BE71604301AFD7218F24D889BEBBBE4FB49314F08852EF58D962A1C778D845CB9A
            APIs
            • CharUpperBuffW.USER32(?,?,004ADC00), ref: 00476449
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: BuffCharUpper
            • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
            • API String ID: 3964851224-45149045
            • Opcode ID: 517cc28935b3b24383481af999906fa01dc06c43c363b28c9c59ace1d8da1118
            • Instruction ID: 0130dd22caf35076b76c69d65a5811b4dde9a55d340b8c3d39b40dfda9ab2a4b
            • Opcode Fuzzy Hash: 517cc28935b3b24383481af999906fa01dc06c43c363b28c9c59ace1d8da1118
            • Instruction Fuzzy Hash: 1BC1B2342046119BCA04EF12C551AAE77A6AF94348F41885FF8495B393DF2CED4BCB8E
            APIs
            • GetSysColor.USER32(00000012), ref: 0047D5AE
            • SetTextColor.GDI32(?,?), ref: 0047D5B2
            • GetSysColorBrush.USER32(0000000F), ref: 0047D5C8
            • GetSysColor.USER32(0000000F), ref: 0047D5D3
            • CreateSolidBrush.GDI32(?), ref: 0047D5D8
            • GetSysColor.USER32(00000011), ref: 0047D5F0
            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0047D5FE
            • SelectObject.GDI32(?,00000000), ref: 0047D60F
            • SetBkColor.GDI32(?,00000000), ref: 0047D618
            • SelectObject.GDI32(?,?), ref: 0047D625
            • InflateRect.USER32(?,000000FF,000000FF), ref: 0047D644
            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0047D65B
            • GetWindowLongW.USER32(00000000,000000F0), ref: 0047D670
            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0047D698
            • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0047D6BF
            • InflateRect.USER32(?,000000FD,000000FD), ref: 0047D6DD
            • DrawFocusRect.USER32(?,?), ref: 0047D6E8
            • GetSysColor.USER32(00000011), ref: 0047D6F6
            • SetTextColor.GDI32(?,00000000), ref: 0047D6FE
            • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0047D712
            • SelectObject.GDI32(?,0047D2A5), ref: 0047D729
            • DeleteObject.GDI32(?), ref: 0047D734
            • SelectObject.GDI32(?,?), ref: 0047D73A
            • DeleteObject.GDI32(?), ref: 0047D73F
            • SetTextColor.GDI32(?,?), ref: 0047D745
            • SetBkColor.GDI32(?,?), ref: 0047D74F
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
            • String ID:
            • API String ID: 1996641542-0
            • Opcode ID: 22996298c6f088ac44806c6a06a4cf9ca9e6e5f9765b2432f5eb97ee66526db3
            • Instruction ID: 8604950602f9dd8d456129bdc3e060b7a7543eac28fffddb4ac98700e1bb7885
            • Opcode Fuzzy Hash: 22996298c6f088ac44806c6a06a4cf9ca9e6e5f9765b2432f5eb97ee66526db3
            • Instruction Fuzzy Hash: 81515972D00218BFDF10AFA8DC49EEEBB79EF08324F114126F915AB2A1D7759A40CB54
            APIs
            • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0047B7B0
            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0047B7C1
            • CharNextW.USER32(0000014E), ref: 0047B7F0
            • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 0047B831
            • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 0047B847
            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0047B858
            • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 0047B875
            • SetWindowTextW.USER32(?,0000014E), ref: 0047B8C7
            • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 0047B8DD
            • SendMessageW.USER32(?,00001002,00000000,?), ref: 0047B90E
            • _memset.LIBCMT ref: 0047B933
            • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 0047B97C
            • _memset.LIBCMT ref: 0047B9DB
            • SendMessageW.USER32 ref: 0047BA05
            • SendMessageW.USER32(?,00001074,?,00000001), ref: 0047BA5D
            • SendMessageW.USER32(?,0000133D,?,?), ref: 0047BB0A
            • InvalidateRect.USER32(?,00000000,00000001), ref: 0047BB2C
            • GetMenuItemInfoW.USER32(?), ref: 0047BB76
            • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 0047BBA3
            • DrawMenuBar.USER32(?), ref: 0047BBB2
            • SetWindowTextW.USER32(?,0000014E), ref: 0047BBDA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
            • String ID: 0
            • API String ID: 1073566785-4108050209
            • Opcode ID: cdd3139e3fd3d8f7389c0c97195aade9bdb14bfcd60f91778a9a15a6ba96b171
            • Instruction ID: ef7c584b2fd9e8457258e017acab87eded1f3d0296388301ac44fbc774d3db40
            • Opcode Fuzzy Hash: cdd3139e3fd3d8f7389c0c97195aade9bdb14bfcd60f91778a9a15a6ba96b171
            • Instruction Fuzzy Hash: EFE17FB1900218AFDF109F65CC84FEE7B78EF05714F14816BFA19AA290D7789941CFA9
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Window$Foreground
            • String ID: ACTIVE$ALL$CLASS$H+L$HANDLE$INSTANCE$L+L$LAST$P+L$REGEXPCLASS$REGEXPTITLE$T+L$TITLE
            • API String ID: 62970417-855025020
            • Opcode ID: 3749f39ec860e90a8868aad15c360da02382fd5c80962e96fc9c1ac1f409a0b3
            • Instruction ID: 8f4b36cd809d397fd96be1ac990ad015b22cb70c9bc07d5e1023f3fd4afd49ed
            • Opcode Fuzzy Hash: 3749f39ec860e90a8868aad15c360da02382fd5c80962e96fc9c1ac1f409a0b3
            • Instruction Fuzzy Hash: 90D1E9305043429BCB04FF62C641A9EB7B0BF54304F404D1FF456936A2DBB8E99ADB99
            APIs
            • GetCursorPos.USER32(?), ref: 0047778A
            • GetDesktopWindow.USER32 ref: 0047779F
            • GetWindowRect.USER32(00000000), ref: 004777A6
            • GetWindowLongW.USER32(?,000000F0), ref: 00477808
            • DestroyWindow.USER32(?), ref: 00477834
            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 0047785D
            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0047787B
            • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 004778A1
            • SendMessageW.USER32(?,00000421,?,?), ref: 004778B6
            • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 004778C9
            • IsWindowVisible.USER32(?), ref: 004778E9
            • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00477904
            • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00477918
            • GetWindowRect.USER32(?,?), ref: 00477930
            • MonitorFromPoint.USER32(?,?,00000002), ref: 00477956
            • GetMonitorInfoW.USER32 ref: 00477970
            • CopyRect.USER32(?,?), ref: 00477987
            • SendMessageW.USER32(?,00000412,00000000), ref: 004779F2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
            • String ID: ($0$tooltips_class32
            • API String ID: 698492251-4156429822
            • Opcode ID: e7c36576108ec0292162a22f9fc8af3ebc5f1b7ca18e3afea619c26088222260
            • Instruction ID: d91dd6201514c7a87af7cba3059fb2c0242e2575dfca63429f26dd94fbd15109
            • Opcode Fuzzy Hash: e7c36576108ec0292162a22f9fc8af3ebc5f1b7ca18e3afea619c26088222260
            • Instruction Fuzzy Hash: D9B18FB1608300AFD704DF65C948B9ABBE4FF88314F40892EF5999B291D774EC45CB9A
            APIs
            • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00456CFB
            • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00456D21
            • _wcscpy.LIBCMT ref: 00456D4F
            • _wcscmp.LIBCMT ref: 00456D5A
            • _wcscat.LIBCMT ref: 00456D70
            • _wcsstr.LIBCMT ref: 00456D7B
            • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00456D97
            • _wcscat.LIBCMT ref: 00456DE0
            • _wcscat.LIBCMT ref: 00456DE7
            • _wcsncpy.LIBCMT ref: 00456E12
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
            • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
            • API String ID: 699586101-1459072770
            • Opcode ID: fa9ceb2deacc7047043e20c2a87d9961a278827900b675c8fbc0ed0695ecdd1c
            • Instruction ID: c87a49a77b719827635be00e485372f8df0df3a3adeb23ca04c615ea84a55a81
            • Opcode Fuzzy Hash: fa9ceb2deacc7047043e20c2a87d9961a278827900b675c8fbc0ed0695ecdd1c
            • Instruction Fuzzy Hash: F341D471A40200BBE700AB659C47EBF777CDF59325F54016FF901A2182EA7CAA0596AD
            APIs
            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0042A939
            • GetSystemMetrics.USER32(00000007), ref: 0042A941
            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0042A96C
            • GetSystemMetrics.USER32(00000008), ref: 0042A974
            • GetSystemMetrics.USER32(00000004), ref: 0042A999
            • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 0042A9B6
            • AdjustWindowRectEx.USER32(000000FF,00000000,00000000,00000000), ref: 0042A9C6
            • CreateWindowExW.USER32(00000000,AutoIt v3 GUI,?,00000000,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0042A9F9
            • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 0042AA0D
            • GetClientRect.USER32(00000000,000000FF), ref: 0042AA2B
            • GetStockObject.GDI32(00000011), ref: 0042AA47
            • SendMessageW.USER32(00000000,00000030,00000000), ref: 0042AA52
              • Part of subcall function 0042B63C: GetCursorPos.USER32(000000FF), ref: 0042B64F
              • Part of subcall function 0042B63C: ScreenToClient.USER32(00000000,000000FF), ref: 0042B66C
              • Part of subcall function 0042B63C: GetAsyncKeyState.USER32(00000001), ref: 0042B691
              • Part of subcall function 0042B63C: GetAsyncKeyState.USER32(00000002), ref: 0042B69F
            • SetTimer.USER32(00000000,00000000,00000028,0042AB87), ref: 0042AA79
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
            • String ID: AutoIt v3 GUI
            • API String ID: 1458621304-248962490
            • Opcode ID: a81006edccd7e4a83461b1ab75262b48f7cc8aa7de67f666f430b1e40e9bd48a
            • Instruction ID: 54cae4681ba2a09f1413f2664d7946247131d74d38a47ca8b07a78d9771255b0
            • Opcode Fuzzy Hash: a81006edccd7e4a83461b1ab75262b48f7cc8aa7de67f666f430b1e40e9bd48a
            • Instruction Fuzzy Hash: 60B18E71A0121AAFDB14DFA8DC45BAE7BB4FB08314F11422BFA05A72E0D778D851CB59
            APIs
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00473735
            • RegCreateKeyExW.ADVAPI32(?,?,00000000,004ADC00,00000000,?,00000000,?,?), ref: 004737A3
            • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 004737EB
            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00473874
            • RegCloseKey.ADVAPI32(?), ref: 00473B94
            • RegCloseKey.ADVAPI32(00000000), ref: 00473BA1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Close$ConnectCreateRegistryValue
            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
            • API String ID: 536824911-966354055
            • Opcode ID: cbe1d7a8ae6bd5f94fda39255ad39908ecfb1132ec6f358bf89633a54eb425e7
            • Instruction ID: 713690afbbcae932bc4842661910accf5535067fdc9859d90451651cfc242446
            • Opcode Fuzzy Hash: cbe1d7a8ae6bd5f94fda39255ad39908ecfb1132ec6f358bf89633a54eb425e7
            • Instruction Fuzzy Hash: 1902AE756006019FCB14EF15C851E5AB7E5FF88724F04845EF99A9B3A2CB38ED41CB89
            APIs
            • CharUpperBuffW.USER32(?,?), ref: 00476C56
            • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00476D16
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: BuffCharMessageSendUpper
            • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
            • API String ID: 3974292440-719923060
            • Opcode ID: 332479b0bc09a970fd5753fa916ea357db585b87cc477a873ee5bf16599ab3f2
            • Instruction ID: dc92519c2f4a5701f88d10cd77fa48caf46bfa4e5cca09b4cb5419308420ef9e
            • Opcode Fuzzy Hash: 332479b0bc09a970fd5753fa916ea357db585b87cc477a873ee5bf16599ab3f2
            • Instruction Fuzzy Hash: B6A194702046519FCB14EF22C951AAA73A6FF84318F11896FB85A573D2DF38EC06CB59
            APIs
            • GetClassNameW.USER32(?,?,00000100), ref: 0044CF91
            • __swprintf.LIBCMT ref: 0044D032
            • _wcscmp.LIBCMT ref: 0044D045
            • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0044D09A
            • _wcscmp.LIBCMT ref: 0044D0D6
            • GetClassNameW.USER32(?,?,00000400), ref: 0044D10D
            • GetDlgCtrlID.USER32(?), ref: 0044D15F
            • GetWindowRect.USER32(?,?), ref: 0044D195
            • GetParent.USER32(?), ref: 0044D1B3
            • ScreenToClient.USER32(00000000), ref: 0044D1BA
            • GetClassNameW.USER32(?,?,00000100), ref: 0044D234
            • _wcscmp.LIBCMT ref: 0044D248
            • GetWindowTextW.USER32(?,?,00000400), ref: 0044D26E
            • _wcscmp.LIBCMT ref: 0044D282
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf
            • String ID: %s%u
            • API String ID: 3119225716-679674701
            • Opcode ID: 9e7c35758cd339d1db4e3ca3f0852295f95a888779f43591e01a22308c875a8f
            • Instruction ID: ac405c4caa1be875481fa29ed2005c169b7db4ea11eb26b37e8adb486ca13888
            • Opcode Fuzzy Hash: 9e7c35758cd339d1db4e3ca3f0852295f95a888779f43591e01a22308c875a8f
            • Instruction Fuzzy Hash: 9AA1D131A04302AFE714DF64C884FABB7A8FF44344F00852BF95993290DB78E945CB99
            APIs
            • GetClassNameW.USER32(00000008,?,00000400), ref: 0044D8EB
            • _wcscmp.LIBCMT ref: 0044D8FC
            • GetWindowTextW.USER32(00000001,?,00000400), ref: 0044D924
            • CharUpperBuffW.USER32(?,00000000), ref: 0044D941
            • _wcscmp.LIBCMT ref: 0044D95F
            • _wcsstr.LIBCMT ref: 0044D970
            • GetClassNameW.USER32(00000018,?,00000400), ref: 0044D9A8
            • _wcscmp.LIBCMT ref: 0044D9B8
            • GetWindowTextW.USER32(00000002,?,00000400), ref: 0044D9DF
            • GetClassNameW.USER32(00000018,?,00000400), ref: 0044DA28
            • _wcscmp.LIBCMT ref: 0044DA38
            • GetClassNameW.USER32(00000010,?,00000400), ref: 0044DA60
            • GetWindowRect.USER32(00000004,?), ref: 0044DAC9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
            • String ID: @$ThumbnailClass
            • API String ID: 1788623398-1539354611
            • Opcode ID: 46401a93f4b37082fb1451bb6a532b6efe4d64a948413051e91aab476172a027
            • Instruction ID: c0e29995cc9d4bde5500588ef77f6ad55d914017e2250a92aa675bb2e7b67dbc
            • Opcode Fuzzy Hash: 46401a93f4b37082fb1451bb6a532b6efe4d64a948413051e91aab476172a027
            • Instruction Fuzzy Hash: 9C81B0714083459BEB01DF10C985BAB7BA8EF44318F04846FFD899A196DB38ED45CBA9
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: __wcsnicmp
            • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
            • API String ID: 1038674560-1810252412
            • Opcode ID: 0527437ba19c912e88eada06ab64c481eea0fd5211068455f77022d7a571d07d
            • Instruction ID: 7b11a9bd63513056f291ba9ad47b00c1d11719932e90984a9444b96329259455
            • Opcode Fuzzy Hash: 0527437ba19c912e88eada06ab64c481eea0fd5211068455f77022d7a571d07d
            • Instruction Fuzzy Hash: FA317835A44205AAEA14FA51DE93FEEB3649F20718F30012FF411B10E1EBDDAE44866E
            APIs
            • LoadIconW.USER32(00000063), ref: 0044EAB0
            • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0044EAC2
            • SetWindowTextW.USER32(?,?), ref: 0044EAD9
            • GetDlgItem.USER32(?,000003EA), ref: 0044EAEE
            • SetWindowTextW.USER32(00000000,?), ref: 0044EAF4
            • GetDlgItem.USER32(?,000003E9), ref: 0044EB04
            • SetWindowTextW.USER32(00000000,?), ref: 0044EB0A
            • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 0044EB2B
            • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 0044EB45
            • GetWindowRect.USER32(?,?), ref: 0044EB4E
            • SetWindowTextW.USER32(?,?), ref: 0044EBB9
            • GetDesktopWindow.USER32 ref: 0044EBBF
            • GetWindowRect.USER32(00000000), ref: 0044EBC6
            • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 0044EC12
            • GetClientRect.USER32(?,?), ref: 0044EC1F
            • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 0044EC44
            • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 0044EC6F
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
            • String ID:
            • API String ID: 3869813825-0
            • Opcode ID: 97229b93e0714681d82b82c9874aabe1a7e12b9fea1039c50fef7ed4fc81797d
            • Instruction ID: 205e23e01f6bff02a16847db67b6acd0ff5515ad284154ebca29f13079940cde
            • Opcode Fuzzy Hash: 97229b93e0714681d82b82c9874aabe1a7e12b9fea1039c50fef7ed4fc81797d
            • Instruction Fuzzy Hash: BC512D71900709AFEB21DFA9CD89F6FBBB5FF04705F00492AE586A26A0C774A945CB14
            APIs
            • LoadCursorW.USER32(00000000,00007F8A), ref: 004679C6
            • LoadCursorW.USER32(00000000,00007F00), ref: 004679D1
            • LoadCursorW.USER32(00000000,00007F03), ref: 004679DC
            • LoadCursorW.USER32(00000000,00007F8B), ref: 004679E7
            • LoadCursorW.USER32(00000000,00007F01), ref: 004679F2
            • LoadCursorW.USER32(00000000,00007F81), ref: 004679FD
            • LoadCursorW.USER32(00000000,00007F88), ref: 00467A08
            • LoadCursorW.USER32(00000000,00007F80), ref: 00467A13
            • LoadCursorW.USER32(00000000,00007F86), ref: 00467A1E
            • LoadCursorW.USER32(00000000,00007F83), ref: 00467A29
            • LoadCursorW.USER32(00000000,00007F85), ref: 00467A34
            • LoadCursorW.USER32(00000000,00007F82), ref: 00467A3F
            • LoadCursorW.USER32(00000000,00007F84), ref: 00467A4A
            • LoadCursorW.USER32(00000000,00007F04), ref: 00467A55
            • LoadCursorW.USER32(00000000,00007F02), ref: 00467A60
            • LoadCursorW.USER32(00000000,00007F89), ref: 00467A6B
            • GetCursorInfo.USER32(?), ref: 00467A7B
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Cursor$Load$Info
            • String ID:
            • API String ID: 2577412497-0
            • Opcode ID: ffea52e551880101203bdf419a8efbbd6fc27911ee6cfc5140ed2d22c6655700
            • Instruction ID: c55dc888848d8aeb67048ded000ce44baa4ffa9b0add295e2d0d0c3c7705d031
            • Opcode Fuzzy Hash: ffea52e551880101203bdf419a8efbbd6fc27911ee6cfc5140ed2d22c6655700
            • Instruction Fuzzy Hash: 3C3114B0D4831A6ADB109FF68C8995FBEE8FF04754F50453BA50DE7280EA7CA5008FA5
            APIs
              • Part of subcall function 0042E968: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,0041C8B7,?,00002000,?,?,00000000,?,0041419E,?,?,?,004ADC00), ref: 0042E984
              • Part of subcall function 0041660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,004153B1,?,?,004161FF,?,00000000,00000001,00000000), ref: 0041662F
            • __wsplitpath.LIBCMT ref: 0041C93E
              • Part of subcall function 00431DFC: __wsplitpath_helper.LIBCMT ref: 00431E3C
            • _wcscpy.LIBCMT ref: 0041C953
            • _wcscat.LIBCMT ref: 0041C968
            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 0041C978
            • SetCurrentDirectoryW.KERNEL32(?), ref: 0041CABE
              • Part of subcall function 0041B337: _wcscpy.LIBCMT ref: 0041B36F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CurrentDirectory$_wcscpy$FullNamePath__wsplitpath__wsplitpath_helper_wcscat
            • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
            • API String ID: 2258743419-1018226102
            • Opcode ID: d026aaf880e452bf9ce4156516ed50f16ea15ffc68ddded5dcb1a5e40690cf52
            • Instruction ID: 4bacd5e4f09a99815f3ba6801ef2cb02f20a5d45918f90e7a24cee562f1ae5d0
            • Opcode Fuzzy Hash: d026aaf880e452bf9ce4156516ed50f16ea15ffc68ddded5dcb1a5e40690cf52
            • Instruction Fuzzy Hash: 1212B1715083419FC724EF25C881AAFB7E5BF99708F40491FF48993251DB38DA89CB5A
            APIs
            • _memset.LIBCMT ref: 0047CEFB
            • DestroyWindow.USER32(?,?), ref: 0047CF73
            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0047CFF4
            • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0047D016
            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0047D025
            • DestroyWindow.USER32(?), ref: 0047D042
            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00410000,00000000), ref: 0047D075
            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0047D094
            • GetDesktopWindow.USER32 ref: 0047D0A9
            • GetWindowRect.USER32(00000000), ref: 0047D0B0
            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0047D0C2
            • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0047D0DA
              • Part of subcall function 0042B526: GetWindowLongW.USER32(?,000000EB), ref: 0042B537
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memset
            • String ID: 0$tooltips_class32
            • API String ID: 3877571568-3619404913
            • Opcode ID: 7c61e8b02304847c5177db186eeae268e19b1e782ac03bd9fa877418ec55ad6c
            • Instruction ID: 2c2f4bb89d24b03fad6a1d8f48d29c191fd5a843bc2ed4611aa8e4a9f09eb97e
            • Opcode Fuzzy Hash: 7c61e8b02304847c5177db186eeae268e19b1e782ac03bd9fa877418ec55ad6c
            • Instruction Fuzzy Hash: 8171AC70550345AFD720DF28CC85FA677F5EB89708F14852EF989872A1D738E942CB2A
            APIs
              • Part of subcall function 0042B34E: GetWindowLongW.USER32(?,000000EB), ref: 0042B35F
            • DragQueryPoint.SHELL32(?,?), ref: 0047F37A
              • Part of subcall function 0047D7DE: ClientToScreen.USER32(?,?), ref: 0047D807
              • Part of subcall function 0047D7DE: GetWindowRect.USER32(?,?), ref: 0047D87D
              • Part of subcall function 0047D7DE: PtInRect.USER32(?,?,0047ED5A), ref: 0047D88D
            • SendMessageW.USER32(?,000000B0,?,?), ref: 0047F3E3
            • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0047F3EE
            • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0047F411
            • _wcscat.LIBCMT ref: 0047F441
            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0047F458
            • SendMessageW.USER32(?,000000B0,?,?), ref: 0047F471
            • SendMessageW.USER32(?,000000B1,?,?), ref: 0047F488
            • SendMessageW.USER32(?,000000B1,?,?), ref: 0047F4AA
            • DragFinish.SHELL32(?), ref: 0047F4B1
            • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0047F59C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
            • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
            • API String ID: 169749273-3440237614
            • Opcode ID: 9ac44013b24833e6735621cb8d387fe86feed18f5d3dc928128ffa3f5bf24d71
            • Instruction ID: 79078b3bb37742537e384ca8cafef98b16d34820ee079868a764f7b4274d55db
            • Opcode Fuzzy Hash: 9ac44013b24833e6735621cb8d387fe86feed18f5d3dc928128ffa3f5bf24d71
            • Instruction Fuzzy Hash: FC616771508300AFC300EF61DC85EAFBBF8AF99714F004A2FF595921A1DB749A49CB5A
            APIs
            • VariantInit.OLEAUT32(00000000), ref: 0045AB3D
            • VariantCopy.OLEAUT32(?,?), ref: 0045AB46
            • VariantClear.OLEAUT32(?), ref: 0045AB52
            • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 0045AC40
            • __swprintf.LIBCMT ref: 0045AC70
            • VarR8FromDec.OLEAUT32(?,?), ref: 0045AC9C
            • VariantInit.OLEAUT32(?), ref: 0045AD4D
            • SysFreeString.OLEAUT32(00000016), ref: 0045ADDF
            • VariantClear.OLEAUT32(?), ref: 0045AE35
            • VariantClear.OLEAUT32(?), ref: 0045AE44
            • VariantInit.OLEAUT32(00000000), ref: 0045AE80
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
            • String ID: %4d%02d%02d%02d%02d%02d$Default
            • API String ID: 3730832054-3931177956
            • Opcode ID: 87fa0535271767f0628235276b2269308acbcfb8c6cf34136c590d20fc7ace99
            • Instruction ID: c78b5d440726600d95c070a351db1324aced582586e2d5d4b5a559408881b43b
            • Opcode Fuzzy Hash: 87fa0535271767f0628235276b2269308acbcfb8c6cf34136c590d20fc7ace99
            • Instruction Fuzzy Hash: D5D10631A00115DBCB109F55D885B6EB7B5FF04702F18826BE9059B282CB7CEC69DB9B
            APIs
            • CharUpperBuffW.USER32(?,?), ref: 004771FC
            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00477247
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: BuffCharMessageSendUpper
            • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
            • API String ID: 3974292440-4258414348
            • Opcode ID: 330198a14c0f41c4179dc43e8b22595d38a09955a8c8af669c2644ec410427e8
            • Instruction ID: 6e1ee8bbf1dc423d0ea5f895b2ab5703ab37349ac6f3b136215a9e8c3da9da5c
            • Opcode Fuzzy Hash: 330198a14c0f41c4179dc43e8b22595d38a09955a8c8af669c2644ec410427e8
            • Instruction Fuzzy Hash: E89183346047119BCB04EF12C591AAEB7A1AF94318F44885FFC5A573A3DB38ED46CB89
            APIs
            • EnumChildWindows.USER32(?,0044CF50), ref: 0044CE90
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ChildEnumWindows
            • String ID: 4+L$CLASS$CLASSNN$H+L$INSTANCE$L+L$NAME$P+L$REGEXPCLASS$T+L$TEXT
            • API String ID: 3555792229-3495546156
            • Opcode ID: 611bcd56b609d62a1c565fb4c4b4389133c52bc32865dffe2ed254a572114eb6
            • Instruction ID: e45d92a36c2e8ed145609be1670ab1c68982729d3958bef24b15c0d58d29263f
            • Opcode Fuzzy Hash: 611bcd56b609d62a1c565fb4c4b4389133c52bc32865dffe2ed254a572114eb6
            • Instruction Fuzzy Hash: 9D91B430A016069BEB48DFA2C4C1BEAFB75BF04304F58851BD449A7251DF78B95AC7D8
            APIs
            • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0047E5AB
            • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,0047BEAF), ref: 0047E607
            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0047E647
            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0047E68C
            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0047E6C3
            • FreeLibrary.KERNEL32(?,00000004,?,?,?,?,0047BEAF), ref: 0047E6CF
            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0047E6DF
            • DestroyIcon.USER32(?,?,?,?,?,0047BEAF), ref: 0047E6EE
            • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0047E70B
            • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0047E717
              • Part of subcall function 00430FA7: __wcsicmp_l.LIBCMT ref: 00431030
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
            • String ID: .dll$.exe$.icl
            • API String ID: 1212759294-1154884017
            • Opcode ID: 88bbb48de33aa5704a172fcb9dbef40bf7b8a5d7f64cd63657bd61fb8d18be9a
            • Instruction ID: 915b0b868c66103abbf50f6d81d37603ab6fc8b5c0dd01fbee52751440afa733
            • Opcode Fuzzy Hash: 88bbb48de33aa5704a172fcb9dbef40bf7b8a5d7f64cd63657bd61fb8d18be9a
            • Instruction Fuzzy Hash: FB61C171900219BAEB14DF65CC46FFE77A8BB18724F10825BF915D61D0EB78A980CB68
            APIs
              • Part of subcall function 0041936C: __swprintf.LIBCMT ref: 004193AB
              • Part of subcall function 0041936C: __itow.LIBCMT ref: 004193DF
            • CharLowerBuffW.USER32(?,?), ref: 0045D292
            • GetDriveTypeW.KERNEL32 ref: 0045D2DF
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045D327
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045D35E
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045D38C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: SendString$BuffCharDriveLowerType__itow__swprintf
            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
            • API String ID: 1148790751-4113822522
            • Opcode ID: 9bbf2e40772977e0fef7a26f75e42bf63d8386f51e135bc272ed68e07832c08c
            • Instruction ID: d89cf78273754548b3b20ccdb01013bf575a998bf9de53d31bab5753d7202b5d
            • Opcode Fuzzy Hash: 9bbf2e40772977e0fef7a26f75e42bf63d8386f51e135bc272ed68e07832c08c
            • Instruction Fuzzy Hash: 26517E71504304AFC700EF12D98199EB3E4FF98758F50886EF88567252DB35EE0ACB8A
            APIs
            • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000016,00000000,?,?,00483973,00000016,0000138C,00000016,?,00000016,004ADDB4,00000000,?), ref: 004526F1
            • LoadStringW.USER32(00000000,?,00483973,00000016), ref: 004526FA
            • GetModuleHandleW.KERNEL32(00000000,00000016,?,00000FFF,?,?,00483973,00000016,0000138C,00000016,?,00000016,004ADDB4,00000000,?,00000016), ref: 0045271C
            • LoadStringW.USER32(00000000,?,00483973,00000016), ref: 0045271F
            • __swprintf.LIBCMT ref: 0045276F
            • __swprintf.LIBCMT ref: 00452780
            • _wprintf.LIBCMT ref: 00452829
            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00452840
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: HandleLoadModuleString__swprintf$Message_wprintf
            • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
            • API String ID: 618562835-2268648507
            • Opcode ID: 1b71a61eaa4beb02f90682bf0a4442d507247f12e36e7057495e197afeb4c90c
            • Instruction ID: acab04fb85978844ea90601deeabb12f01d0da9abde9967c6f5bf0c1d425bda6
            • Opcode Fuzzy Hash: 1b71a61eaa4beb02f90682bf0a4442d507247f12e36e7057495e197afeb4c90c
            • Instruction Fuzzy Hash: B8414372840218BACF15FBD1DE86EEE7778AF55349F10006BB50172092DB686F49CB68
            APIs
            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0045D0D8
            • __swprintf.LIBCMT ref: 0045D0FA
            • CreateDirectoryW.KERNEL32(?,00000000), ref: 0045D137
            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0045D15C
            • _memset.LIBCMT ref: 0045D17B
            • _wcsncpy.LIBCMT ref: 0045D1B7
            • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0045D1EC
            • CloseHandle.KERNEL32(00000000), ref: 0045D1F7
            • RemoveDirectoryW.KERNEL32(?), ref: 0045D200
            • CloseHandle.KERNEL32(00000000), ref: 0045D20A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
            • String ID: :$\$\??\%s
            • API String ID: 2733774712-3457252023
            • Opcode ID: 3c0023a9b81213a1935a79eb2990f3ed2423103bbf5cff8d92368ae354215b46
            • Instruction ID: cd9bcb6847133aeb680de4978fc3bed64514453539c8cabbce6a16498d25f319
            • Opcode Fuzzy Hash: 3c0023a9b81213a1935a79eb2990f3ed2423103bbf5cff8d92368ae354215b46
            • Instruction Fuzzy Hash: 6F31A1B2900109ABDB21DFA1DC49FEB77BCEF89745F1040BBF909D2161E77496498B28
            APIs
            • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,0047BEF4,?,?), ref: 0047E754
            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,0047BEF4,?,?,00000000,?), ref: 0047E76B
            • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,0047BEF4,?,?,00000000,?), ref: 0047E776
            • CloseHandle.KERNEL32(00000000,?,?,?,?,0047BEF4,?,?,00000000,?), ref: 0047E783
            • GlobalLock.KERNEL32(00000000), ref: 0047E78C
            • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,0047BEF4,?,?,00000000,?), ref: 0047E79B
            • GlobalUnlock.KERNEL32(00000000), ref: 0047E7A4
            • CloseHandle.KERNEL32(00000000,?,?,?,?,0047BEF4,?,?,00000000,?), ref: 0047E7AB
            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,0047BEF4,?,?,00000000,?), ref: 0047E7BC
            • OleLoadPicture.OLEAUT32(?,00000000,00000000,0049D9BC,?), ref: 0047E7D5
            • GlobalFree.KERNEL32(00000000), ref: 0047E7E5
            • GetObjectW.GDI32(00000000,00000018,?), ref: 0047E809
            • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 0047E834
            • DeleteObject.GDI32(00000000), ref: 0047E85C
            • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0047E872
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
            • String ID:
            • API String ID: 3840717409-0
            • Opcode ID: 47b099dfe8160897d8075687affff2815efcaddc03098ca516b00af1f2d076f5
            • Instruction ID: ba0041bd742fb814451fbc5186afb561c9b3a8dc3ebb2e2d7960ec06eb8ac24d
            • Opcode Fuzzy Hash: 47b099dfe8160897d8075687affff2815efcaddc03098ca516b00af1f2d076f5
            • Instruction Fuzzy Hash: DE414A75A00204FFDB119F65CC48EAB7BB8EF99715F1081AAF90AD72A0D7349D41CB25
            APIs
            • __wsplitpath.LIBCMT ref: 0046076F
            • _wcscat.LIBCMT ref: 00460787
            • _wcscat.LIBCMT ref: 00460799
            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 004607AE
            • SetCurrentDirectoryW.KERNEL32(?), ref: 004607C2
            • GetFileAttributesW.KERNEL32(?), ref: 004607DA
            • SetFileAttributesW.KERNEL32(?,00000000), ref: 004607F4
            • SetCurrentDirectoryW.KERNEL32(?), ref: 00460806
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
            • String ID: *.*
            • API String ID: 34673085-438819550
            • Opcode ID: d158464143457fea05008a4e8e76dc58f840cc8e0f7f43e71ef2f9e14450f0e6
            • Instruction ID: 151a414fcfe8950740cfb97fcf0755a2a9aa0d55f52988ee2c3604767c657380
            • Opcode Fuzzy Hash: d158464143457fea05008a4e8e76dc58f840cc8e0f7f43e71ef2f9e14450f0e6
            • Instruction Fuzzy Hash: 0E818F715043019FCB24EF64C8459AFB7E9AB98314F14882FF885C7251FA38ED558B9B
            APIs
              • Part of subcall function 0042B34E: GetWindowLongW.USER32(?,000000EB), ref: 0042B35F
            • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0047EF3B
            • GetFocus.USER32 ref: 0047EF4B
            • GetDlgCtrlID.USER32(00000000), ref: 0047EF56
            • _memset.LIBCMT ref: 0047F081
            • GetMenuItemInfoW.USER32 ref: 0047F0AC
            • GetMenuItemCount.USER32(00000000), ref: 0047F0CC
            • GetMenuItemID.USER32(?,00000000), ref: 0047F0DF
            • GetMenuItemInfoW.USER32(00000000,-00000001,00000001,?), ref: 0047F113
            • GetMenuItemInfoW.USER32(00000000,?,00000001,?), ref: 0047F15B
            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0047F193
            • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0047F1C8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
            • String ID: 0
            • API String ID: 1296962147-4108050209
            • Opcode ID: eb89958f0d3ffbb9fae585cdcd18b3445b3fb9822d258f31529693f7c6b8c846
            • Instruction ID: 3a3df617e1c0779ef10108bb637f3907ee4e9ed90605eed22724b2e3de541450
            • Opcode Fuzzy Hash: eb89958f0d3ffbb9fae585cdcd18b3445b3fb9822d258f31529693f7c6b8c846
            • Instruction Fuzzy Hash: AC815A71604311AFD720CF15D884AABBBE9EB88314F40853FF99897291D778DD09CB9A
            APIs
              • Part of subcall function 0044ABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 0044ABD7
              • Part of subcall function 0044ABBB: GetLastError.KERNEL32(?,0044A69F,?,?,?), ref: 0044ABE1
              • Part of subcall function 0044ABBB: GetProcessHeap.KERNEL32(00000008,?,?,0044A69F,?,?,?), ref: 0044ABF0
              • Part of subcall function 0044ABBB: HeapAlloc.KERNEL32(00000000,?,0044A69F,?,?,?), ref: 0044ABF7
              • Part of subcall function 0044ABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0044AC0E
              • Part of subcall function 0044AC56: GetProcessHeap.KERNEL32(00000008,0044A6B5,00000000,00000000,?,0044A6B5,?), ref: 0044AC62
              • Part of subcall function 0044AC56: HeapAlloc.KERNEL32(00000000,?,0044A6B5,?), ref: 0044AC69
              • Part of subcall function 0044AC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,0044A6B5,?), ref: 0044AC7A
            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044A8CB
            • _memset.LIBCMT ref: 0044A8E0
            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0044A8FF
            • GetLengthSid.ADVAPI32(?), ref: 0044A910
            • GetAce.ADVAPI32(?,00000000,?), ref: 0044A94D
            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 0044A969
            • GetLengthSid.ADVAPI32(?), ref: 0044A986
            • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 0044A995
            • HeapAlloc.KERNEL32(00000000), ref: 0044A99C
            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044A9BD
            • CopySid.ADVAPI32(00000000), ref: 0044A9C4
            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 0044A9F5
            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 0044AA1B
            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 0044AA2F
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
            • String ID:
            • API String ID: 3996160137-0
            • Opcode ID: db1b056d7f38f8c40364533c9e25223c04bf579d20ccf4f69f63dbaa6b78c6df
            • Instruction ID: 791ae7950d4df54bbab7929914087e227c6e025eec3285c26091cdb5cac07895
            • Opcode Fuzzy Hash: db1b056d7f38f8c40364533c9e25223c04bf579d20ccf4f69f63dbaa6b78c6df
            • Instruction Fuzzy Hash: 75517EB1940209AFEF10DF91DD85EEEBBB9FF14304F04812AF911A7290DB399A15CB65
            APIs
            • GetDC.USER32(00000000), ref: 00469E36
            • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00469E42
            • CreateCompatibleDC.GDI32(?), ref: 00469E4E
            • SelectObject.GDI32(00000000,?), ref: 00469E5B
            • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00469EAF
            • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,?,00000000), ref: 00469EEB
            • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00469F0F
            • SelectObject.GDI32(00000006,?), ref: 00469F17
            • DeleteObject.GDI32(?), ref: 00469F20
            • DeleteDC.GDI32(00000006), ref: 00469F27
            • ReleaseDC.USER32(00000000,?), ref: 00469F32
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
            • String ID: (
            • API String ID: 2598888154-3887548279
            • Opcode ID: 298b7dd1f97248ca8edde4e568e5707ecc3e309cd5adc3388fb537d04ff2a5a5
            • Instruction ID: cee1106d588f313b0f1b9749b0a930a30af569dc045b0c8748c5774a292be99c
            • Opcode Fuzzy Hash: 298b7dd1f97248ca8edde4e568e5707ecc3e309cd5adc3388fb537d04ff2a5a5
            • Instruction Fuzzy Hash: 15513976900309AFCB14CFA8C885EAEBBB9EF48710F14842EF95997250D775AD41CB54
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: LoadString__swprintf_wprintf
            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
            • API String ID: 2889450990-2391861430
            • Opcode ID: 379c1e51762444474805ba9de8b847f2add2abf610ffd5113f815d8d6b06292d
            • Instruction ID: f265828a6df4e3767488dfaec4ff4a664fdd74e4452da93594cef6698a5f1e77
            • Opcode Fuzzy Hash: 379c1e51762444474805ba9de8b847f2add2abf610ffd5113f815d8d6b06292d
            • Instruction Fuzzy Hash: C6519431800209BACB15EBA1DD86EEEB778AF05309F10416BF80572162DB396E99DB58
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: LoadString__swprintf_wprintf
            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
            • API String ID: 2889450990-3420473620
            • Opcode ID: c955f7549129bb5ccc6e26a06eb6093aac9fc59cbc8ab110b423b849f86f5f65
            • Instruction ID: d3cbe7d2122334cef4909fd596ffea18a0b6a30023bdbdfa69e14f21a252e4f2
            • Opcode Fuzzy Hash: c955f7549129bb5ccc6e26a06eb6093aac9fc59cbc8ab110b423b849f86f5f65
            • Instruction Fuzzy Hash: 49518371900209BACF15FBE1DE86EEEB778AF04304F10406BB50572162DB786F99DB69
            APIs
            • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00472BB5,?,?), ref: 00473C1D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: BuffCharUpper
            • String ID: $EL$HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
            • API String ID: 3964851224-567733260
            • Opcode ID: ae7f21643e6feddb1ce18da4c45a72c563ef0380907ab26adcb27fe22bc84425
            • Instruction ID: 70a7c7d46183de3499cc65efb6269a8638769dda7cb953219b3a9362b6670b7d
            • Opcode Fuzzy Hash: ae7f21643e6feddb1ce18da4c45a72c563ef0380907ab26adcb27fe22bc84425
            • Instruction Fuzzy Hash: 8A4195342002499BDF10EF52E951AEB3365AF51345F50841FEC592B292EB7C9E0ADB58
            APIs
            • _memset.LIBCMT ref: 004555D7
            • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00455664
            • GetMenuItemCount.USER32(004D1708), ref: 004556ED
            • DeleteMenu.USER32(004D1708,00000005,00000000,000000F5,?,?), ref: 0045577D
            • DeleteMenu.USER32(004D1708,00000004,00000000), ref: 00455785
            • DeleteMenu.USER32(004D1708,00000006,00000000), ref: 0045578D
            • DeleteMenu.USER32(004D1708,00000003,00000000), ref: 00455795
            • GetMenuItemCount.USER32(004D1708), ref: 0045579D
            • SetMenuItemInfoW.USER32(004D1708,00000004,00000000,00000030), ref: 004557D3
            • GetCursorPos.USER32(?), ref: 004557DD
            • SetForegroundWindow.USER32(00000000), ref: 004557E6
            • TrackPopupMenuEx.USER32(004D1708,00000000,?,00000000,00000000,00000000), ref: 004557F9
            • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00455805
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
            • String ID:
            • API String ID: 3993528054-0
            • Opcode ID: e7102c491985e326694657ed10004e552f60e277f57682ca0175e0539cbe00ae
            • Instruction ID: 2701ec7b9068ea78fad43d542d407513cce414f5c9f9fd6d660ab8ed2d02b0c0
            • Opcode Fuzzy Hash: e7102c491985e326694657ed10004e552f60e277f57682ca0175e0539cbe00ae
            • Instruction Fuzzy Hash: 04714530640645BFEB209B15CC59FBABF64FF40369F240217F919AA2D2C7785C18CB98
            APIs
            • _memset.LIBCMT ref: 0044A1DC
            • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 0044A211
            • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0044A22D
            • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 0044A249
            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 0044A273
            • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 0044A29B
            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0044A2A6
            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0044A2AB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memset
            • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
            • API String ID: 1687751970-22481851
            • Opcode ID: b942370e613d7e04942b225f93de29856d4bfbf65d6108af4010becd944d1e76
            • Instruction ID: 25efce3b65fead40bce5191a6581c223658f50d9a2029c4e1ac159f78ddfb3ba
            • Opcode Fuzzy Hash: b942370e613d7e04942b225f93de29856d4bfbf65d6108af4010becd944d1e76
            • Instruction Fuzzy Hash: 2D412976C50229ABDF11EBA5DC81DEEB778FF14304F00416AE901B3260EB789E55CB94
            APIs
            • __swprintf.LIBCMT ref: 004567FD
            • __swprintf.LIBCMT ref: 0045680A
              • Part of subcall function 0043172B: __woutput_l.LIBCMT ref: 00431784
            • FindResourceW.KERNEL32(?,?,0000000E), ref: 00456834
            • LoadResource.KERNEL32(?,00000000), ref: 00456840
            • LockResource.KERNEL32(00000000), ref: 0045684D
            • FindResourceW.KERNEL32(?,?,00000003), ref: 0045686D
            • LoadResource.KERNEL32(?,00000000), ref: 0045687F
            • SizeofResource.KERNEL32(?,00000000), ref: 0045688E
            • LockResource.KERNEL32(?), ref: 0045689A
            • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 004568F9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
            • String ID: 5L
            • API String ID: 1433390588-963271569
            • Opcode ID: f355dbb5a71788a954b41b2542901f85a4dcb2cb73c86c63d9ad15316335db81
            • Instruction ID: 59b1a6204e6b13d5466d2c98a58f3392183245147a7d44340781cc6d5374ab71
            • Opcode Fuzzy Hash: f355dbb5a71788a954b41b2542901f85a4dcb2cb73c86c63d9ad15316335db81
            • Instruction Fuzzy Hash: 06319F7190121AABDB01AFA1DD44EBF7BA8EF08341F418437FD0193251E738D915DB68
            APIs
            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,004836F4,00000010,?,Bad directive syntax error,004ADC00,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 004525D6
            • LoadStringW.USER32(00000000,?,004836F4,00000010), ref: 004525DD
            • _wprintf.LIBCMT ref: 00452610
            • __swprintf.LIBCMT ref: 00452632
            • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 004526A1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: HandleLoadMessageModuleString__swprintf_wprintf
            • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
            • API String ID: 1080873982-4153970271
            • Opcode ID: abf493f1f19adeb526c9c3ed405e1c644d697a6358a39749adf2b4e8791b05be
            • Instruction ID: 035d49f43fe5474baae516bda2640ece08ccb92973d232f587a87b475d410991
            • Opcode Fuzzy Hash: abf493f1f19adeb526c9c3ed405e1c644d697a6358a39749adf2b4e8791b05be
            • Instruction Fuzzy Hash: C4215C3184021ABBCF11AF91CC4AFEE7738BF19308F04446BB505620A2DB79A659DB58
            APIs
            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00457B42
            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00457B58
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00457B69
            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00457B7B
            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00457B8C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: SendString
            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
            • API String ID: 890592661-1007645807
            • Opcode ID: 8056fd55ecdd24e098f13bb320e679c7aa442db72d4d173a6d62bd928a356b14
            • Instruction ID: b74d3f8dd522ba0f7d6e43d71e481fad5a898a448c3afa7d31f845c6fa7cce05
            • Opcode Fuzzy Hash: 8056fd55ecdd24e098f13bb320e679c7aa442db72d4d173a6d62bd928a356b14
            • Instruction Fuzzy Hash: 7C11C8F498025979D720B762DC8AFFF7A7CEBD1B19F10442F7411A20C1DA681A89C5B8
            APIs
            • timeGetTime.WINMM ref: 00457794
              • Part of subcall function 0042DC38: timeGetTime.WINMM(?,75A4B400,004858AB), ref: 0042DC3C
            • Sleep.KERNEL32(0000000A), ref: 004577C0
            • EnumThreadWindows.USER32(?,Function_00047744,00000000), ref: 004577E4
            • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00457806
            • SetActiveWindow.USER32 ref: 00457825
            • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00457833
            • SendMessageW.USER32(00000010,00000000,00000000), ref: 00457852
            • Sleep.KERNEL32(000000FA), ref: 0045785D
            • IsWindow.USER32 ref: 00457869
            • EndDialog.USER32(00000000), ref: 0045787A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
            • String ID: BUTTON
            • API String ID: 1194449130-3405671355
            • Opcode ID: 1d3eca0a5b3a97c55721717058f0e3315559f67a73c6438031a5823a4f021f5a
            • Instruction ID: a94be970ed532b3fef106282d71953041b3981e4cdf98ce973a8c33ceec44c3f
            • Opcode Fuzzy Hash: 1d3eca0a5b3a97c55721717058f0e3315559f67a73c6438031a5823a4f021f5a
            • Instruction Fuzzy Hash: 5A215E71605205AFE7006F20FD89B263F29FB5834BB00443BFD0582262DB695C09CB2E
            APIs
              • Part of subcall function 0041936C: __swprintf.LIBCMT ref: 004193AB
              • Part of subcall function 0041936C: __itow.LIBCMT ref: 004193DF
            • CoInitialize.OLE32(00000000), ref: 0046034B
            • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 004603DE
            • SHGetDesktopFolder.SHELL32(?), ref: 004603F2
            • CoCreateInstance.OLE32(0049DA8C,00000000,00000001,004C3CF8,?), ref: 0046043E
            • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 004604AD
            • CoTaskMemFree.OLE32(?,?), ref: 00460505
            • _memset.LIBCMT ref: 00460542
            • SHBrowseForFolderW.SHELL32(?), ref: 0046057E
            • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 004605A1
            • CoTaskMemFree.OLE32(00000000), ref: 004605A8
            • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 004605DF
            • CoUninitialize.OLE32(00000001,00000000), ref: 004605E1
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
            • String ID:
            • API String ID: 1246142700-0
            • Opcode ID: 4ab6968fbe8f57f7ed479d43af73b686275887f81043911093193334f9996f51
            • Instruction ID: b983eaac144e6010d404146309741b6c2a8fe279a70ef0619537868b03c70384
            • Opcode Fuzzy Hash: 4ab6968fbe8f57f7ed479d43af73b686275887f81043911093193334f9996f51
            • Instruction Fuzzy Hash: B6B1FC75A00208AFDB14DFA5C888DAEBBB9FF48305B1484AAF816EB251D734ED41CF54
            APIs
            • GetKeyboardState.USER32(?), ref: 00452ED6
            • SetKeyboardState.USER32(?), ref: 00452F41
            • GetAsyncKeyState.USER32(000000A0), ref: 00452F61
            • GetKeyState.USER32(000000A0), ref: 00452F78
            • GetAsyncKeyState.USER32(000000A1), ref: 00452FA7
            • GetKeyState.USER32(000000A1), ref: 00452FB8
            • GetAsyncKeyState.USER32(00000011), ref: 00452FE4
            • GetKeyState.USER32(00000011), ref: 00452FF2
            • GetAsyncKeyState.USER32(00000012), ref: 0045301B
            • GetKeyState.USER32(00000012), ref: 00453029
            • GetAsyncKeyState.USER32(0000005B), ref: 00453052
            • GetKeyState.USER32(0000005B), ref: 00453060
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: State$Async$Keyboard
            • String ID:
            • API String ID: 541375521-0
            • Opcode ID: d50ac9ad66c56ca6e7f595f0470f4baee17c3af87de9e4a172fae2325883c0a5
            • Instruction ID: a5be3520a5323dae04a0d3ebdf65c2f5531d552d24d34e3b10ae2b51a6d9d559
            • Opcode Fuzzy Hash: d50ac9ad66c56ca6e7f595f0470f4baee17c3af87de9e4a172fae2325883c0a5
            • Instruction Fuzzy Hash: 1551E82190478429FB35DBA489117ABBBB45F12386F08459FC9C25A2C3DB9C9F8CC769
            APIs
            • GetDlgItem.USER32(?,00000001), ref: 0044ED1E
            • GetWindowRect.USER32(00000000,?), ref: 0044ED30
            • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0044ED8E
            • GetDlgItem.USER32(?,00000002), ref: 0044ED99
            • GetWindowRect.USER32(00000000,?), ref: 0044EDAB
            • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0044EE01
            • GetDlgItem.USER32(?,000003E9), ref: 0044EE0F
            • GetWindowRect.USER32(00000000,?), ref: 0044EE20
            • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0044EE63
            • GetDlgItem.USER32(?,000003EA), ref: 0044EE71
            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0044EE8E
            • InvalidateRect.USER32(?,00000000,00000001), ref: 0044EE9B
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Window$ItemMoveRect$Invalidate
            • String ID:
            • API String ID: 3096461208-0
            • Opcode ID: f2411390be0854b910044af848d0e0e9b9ccabd5d6070a10796d756f4db5c8a7
            • Instruction ID: 0d65109a7140961aaf991d9041fee5eb90e799a603e741ef5083ebbcd8d4f0d7
            • Opcode Fuzzy Hash: f2411390be0854b910044af848d0e0e9b9ccabd5d6070a10796d756f4db5c8a7
            • Instruction Fuzzy Hash: FE510FB1F00205AFDB18CF69DD89AAEBBBAFB98700F14813AF519D7290D7749D008B14
            APIs
              • Part of subcall function 0042B9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,0042B759,?,00000000,?,?,?,?,0042B72B,00000000,?), ref: 0042BA58
            • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,?,0042B72B), ref: 0042B7F6
            • KillTimer.USER32(00000000,?,00000000,?,?,?,?,0042B72B,00000000,?,?,0042B2EF,?,?), ref: 0042B88D
            • DestroyAcceleratorTable.USER32(00000000), ref: 0048D8A6
            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,0042B72B,00000000,?,?,0042B2EF,?,?), ref: 0048D8D7
            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,0042B72B,00000000,?,?,0042B2EF,?,?), ref: 0048D8EE
            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,0042B72B,00000000,?,?,0042B2EF,?,?), ref: 0048D90A
            • DeleteObject.GDI32(00000000), ref: 0048D91C
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
            • String ID:
            • API String ID: 641708696-0
            • Opcode ID: cf0cbcac85ba903f9e1a6f4268be614dc34ded83400902192b819bfca1b54803
            • Instruction ID: 4151627ac4b8c30f54e4ed569c525cb9796275d386c1f2098a316d7e7fff3c2d
            • Opcode Fuzzy Hash: cf0cbcac85ba903f9e1a6f4268be614dc34ded83400902192b819bfca1b54803
            • Instruction Fuzzy Hash: 25618030A02610DFDB25AF15E88872A77B5FF94315F54452FE446876B0C778A881CF8D
            APIs
              • Part of subcall function 0042B526: GetWindowLongW.USER32(?,000000EB), ref: 0042B537
            • GetSysColor.USER32(0000000F), ref: 0042B438
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ColorLongWindow
            • String ID:
            • API String ID: 259745315-0
            • Opcode ID: 28b80ed8e3062c95d11c641ca89dbf72a5e99fc94357d06fc9cd5e744ffd6531
            • Instruction ID: d2a1c99221d518b784a41dfb450a37d29a58d2f0309b2590cace7be1391559e0
            • Opcode Fuzzy Hash: 28b80ed8e3062c95d11c641ca89dbf72a5e99fc94357d06fc9cd5e744ffd6531
            • Instruction Fuzzy Hash: 3D41B431601510AFDB216F28EC89BBA3765EB16730F544273FDA58E2E6C7348C42D769
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
            • String ID:
            • API String ID: 136442275-0
            • Opcode ID: dda4412fb9f94984fb513d9fca9c9714687bdcc113f1e85754ae6a89edfe522c
            • Instruction ID: b584a679850f1ad2f6042183cbf816825045dc78ec9d9aef323c03234783a6eb
            • Opcode Fuzzy Hash: dda4412fb9f94984fb513d9fca9c9714687bdcc113f1e85754ae6a89edfe522c
            • Instruction Fuzzy Hash: 82415E7684511CAECF65EB91CC51DCB73BCEB48300F4051A7BA49A2051EA34ABE88F58
            APIs
            • CharLowerBuffW.USER32(004ADC00,004ADC00,004ADC00), ref: 0045D7CE
            • GetDriveTypeW.KERNEL32(?,004C3A70,00000061), ref: 0045D898
            • _wcscpy.LIBCMT ref: 0045D8C2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: BuffCharDriveLowerType_wcscpy
            • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
            • API String ID: 2820617543-1000479233
            • Opcode ID: b8dc3e1d34e5538edbcd18905c5b06695d15f94528e9315932edb2e7d2ccbe82
            • Instruction ID: 2cb8f7e3dfda0baee7688d14d37daf7fbb5954710adc22143c7ed2fb1719ad14
            • Opcode Fuzzy Hash: b8dc3e1d34e5538edbcd18905c5b06695d15f94528e9315932edb2e7d2ccbe82
            • Instruction Fuzzy Hash: 5F519435504200AFC710EF16D881BAFB7A5EF84319F50892FF8A657293DB39DD49CA4A
            APIs
            • __swprintf.LIBCMT ref: 004193AB
            • __itow.LIBCMT ref: 004193DF
              • Part of subcall function 00431557: _xtow@16.LIBCMT ref: 00431578
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: __itow__swprintf_xtow@16
            • String ID: %.15g$0x%p$False$True
            • API String ID: 1502193981-2263619337
            • Opcode ID: 92c1a619248308034f147843a563a6d7f6ad05182e6b5216d79896642a78053e
            • Instruction ID: e42a141a33525c51adcd875eb6bbc32f4b8c5518934057d331c42fed2072918b
            • Opcode Fuzzy Hash: 92c1a619248308034f147843a563a6d7f6ad05182e6b5216d79896642a78053e
            • Instruction Fuzzy Hash: 58410B31500205ABDB24EF75D951FAA73F8EF88304F20486FE55AD7281EA39DD42CB19
            APIs
            • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0047A259
            • CreateCompatibleDC.GDI32(00000000), ref: 0047A260
            • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 0047A273
            • SelectObject.GDI32(00000000,00000000), ref: 0047A27B
            • GetPixel.GDI32(00000000,00000000,00000000), ref: 0047A286
            • DeleteDC.GDI32(00000000), ref: 0047A28F
            • GetWindowLongW.USER32(?,000000EC), ref: 0047A299
            • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 0047A2AD
            • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 0047A2B9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
            • String ID: static
            • API String ID: 2559357485-2160076837
            • Opcode ID: 815825e6b18a7d71ba371ad7ad2fc3b0d09c2187394bd71d55d4f7b1e8bd32e5
            • Instruction ID: f947658ac238a7953c673023c44af8eb090236cb3afe9b5be081216e702b650f
            • Opcode Fuzzy Hash: 815825e6b18a7d71ba371ad7ad2fc3b0d09c2187394bd71d55d4f7b1e8bd32e5
            • Instruction Fuzzy Hash: B031AD32500214ABDF115FA4DC09FEF3B68FF5D324F104226FA19A22A1C739D821DBA9
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: _wcscpy$CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
            • String ID: 0.0.0.0
            • API String ID: 2620052-3771769585
            • Opcode ID: a781f3153afd37a953855bd571858939a81265fe30f53dfdb3ccbc8d4262eacb
            • Instruction ID: d8237866b1638ff1719a6ec76a562abcb8e1c84487c7148c58071505e5a1f16c
            • Opcode Fuzzy Hash: a781f3153afd37a953855bd571858939a81265fe30f53dfdb3ccbc8d4262eacb
            • Instruction Fuzzy Hash: A8110532D04114ABDB24AB61EC09EDA77ACDB14715F4101BBF40593192EE789A898A5C
            APIs
            • _memset.LIBCMT ref: 00435047
              • Part of subcall function 00437C0E: __getptd_noexit.LIBCMT ref: 00437C0E
            • __gmtime64_s.LIBCMT ref: 004350E0
            • __gmtime64_s.LIBCMT ref: 00435116
            • __gmtime64_s.LIBCMT ref: 00435133
            • __allrem.LIBCMT ref: 00435189
            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004351A5
            • __allrem.LIBCMT ref: 004351BC
            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004351DA
            • __allrem.LIBCMT ref: 004351F1
            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043520F
            • __invoke_watson.LIBCMT ref: 00435280
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
            • String ID:
            • API String ID: 384356119-0
            • Opcode ID: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
            • Instruction ID: df2aa938e134153bde5ce6a784a1eabc0d3e65a0c3faa8231224896e8dfb4505
            • Opcode Fuzzy Hash: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
            • Instruction Fuzzy Hash: A171C7B1A00B16ABE7149E79CC81B5F73B8AF08768F14522FF914D6381E778D9408BD8
            APIs
            • _memset.LIBCMT ref: 00454DF8
            • GetMenuItemInfoW.USER32(004D1708,000000FF,00000000,00000030), ref: 00454E59
            • SetMenuItemInfoW.USER32(004D1708,00000004,00000000,00000030), ref: 00454E8F
            • Sleep.KERNEL32(000001F4), ref: 00454EA1
            • GetMenuItemCount.USER32(?), ref: 00454EE5
            • GetMenuItemID.USER32(?,00000000), ref: 00454F01
            • GetMenuItemID.USER32(?,-00000001), ref: 00454F2B
            • GetMenuItemID.USER32(?,?), ref: 00454F70
            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00454FB6
            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00454FCA
            • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00454FEB
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
            • String ID:
            • API String ID: 4176008265-0
            • Opcode ID: 31db2ddd11d9e95fcddd7c4fae6b6ecd314b27628c8e30d26acb0eed25c4ef44
            • Instruction ID: 4bc4ebb8d59d7bb5cbb206a91fe501c36359dbb0c6ed0f3a7e4015ef86e57a2e
            • Opcode Fuzzy Hash: 31db2ddd11d9e95fcddd7c4fae6b6ecd314b27628c8e30d26acb0eed25c4ef44
            • Instruction Fuzzy Hash: D8618271900249AFDB11CFA8D9849AF7BB8EB8530DF14016AFC419B252D7389D89CB29
            APIs
            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00479C98
            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00479C9B
            • GetWindowLongW.USER32(?,000000F0), ref: 00479CBF
            • _memset.LIBCMT ref: 00479CD0
            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00479CE2
            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00479D5A
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageSend$LongWindow_memset
            • String ID:
            • API String ID: 830647256-0
            • Opcode ID: b871f63d9479ee0b04fb215ab42da99b92a84d56a5485eb9f3203171751fd18c
            • Instruction ID: eba29cef5767ffc2766984d0b0d66bdf08a8a3aadabb2d38e9812ce3f7baae51
            • Opcode Fuzzy Hash: b871f63d9479ee0b04fb215ab42da99b92a84d56a5485eb9f3203171751fd18c
            • Instruction Fuzzy Hash: 58618D75900208AFDB21DFA4CC81EEE77B8EF09714F14416AFA18A73A1D774AD42DB54
            APIs
            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,?), ref: 004494FE
            • SafeArrayAllocData.OLEAUT32(?), ref: 00449549
            • VariantInit.OLEAUT32(?), ref: 0044955B
            • SafeArrayAccessData.OLEAUT32(?,?), ref: 0044957B
            • VariantCopy.OLEAUT32(?,?), ref: 004495BE
            • SafeArrayUnaccessData.OLEAUT32(?), ref: 004495D2
            • VariantClear.OLEAUT32(?), ref: 004495E7
            • SafeArrayDestroyData.OLEAUT32(?), ref: 004495F4
            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 004495FD
            • VariantClear.OLEAUT32(?), ref: 0044960F
            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0044961A
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
            • String ID:
            • API String ID: 2706829360-0
            • Opcode ID: 16e6e28f7aaf1179d27d7e0b71bab109ba73901189739ab25789d966c338fce2
            • Instruction ID: 1a57758238329b3483cbcd4cb20e4eecad12769a191c1b2427e7d9e07ba17690
            • Opcode Fuzzy Hash: 16e6e28f7aaf1179d27d7e0b71bab109ba73901189739ab25789d966c338fce2
            • Instruction Fuzzy Hash: F0416E31E00219AFDB01EFA4D884DDEBBB9FF18354F10807AE501A3251DB74AA45DBA9
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Variant$ClearInit$_memset
            • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop$h?L$|?L
            • API String ID: 2862541840-2737508579
            • Opcode ID: 199fb6859a6970f23f1a75cdf3df00e8798b507679fc7ae335b6d632ebab5844
            • Instruction ID: 6cde5f922bf3182b10cc4748e4f603768cd39255ad9839d737a6cc79ca385d15
            • Opcode Fuzzy Hash: 199fb6859a6970f23f1a75cdf3df00e8798b507679fc7ae335b6d632ebab5844
            • Instruction Fuzzy Hash: 2591A171A00219ABDF20CF95C844FAEBBB8EF44714F10855FF505EB280E7789A81CB95
            APIs
              • Part of subcall function 0041936C: __swprintf.LIBCMT ref: 004193AB
              • Part of subcall function 0041936C: __itow.LIBCMT ref: 004193DF
            • CoInitialize.OLE32 ref: 0046ADF6
            • CoUninitialize.OLE32 ref: 0046AE01
            • CoCreateInstance.OLE32(?,00000000,00000017,0049D8FC,?), ref: 0046AE61
            • IIDFromString.OLE32(?,?), ref: 0046AED4
            • VariantInit.OLEAUT32(?), ref: 0046AF6E
            • VariantClear.OLEAUT32(?), ref: 0046AFCF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
            • API String ID: 834269672-1287834457
            • Opcode ID: ed8601236f2e042af36d4798710b1fca922da27f2447805fee6b568e4ca98e7c
            • Instruction ID: 6cab4bc97770909280fbb3f3ed187baf3e47cc460f5d7ac640f496127bd92a12
            • Opcode Fuzzy Hash: ed8601236f2e042af36d4798710b1fca922da27f2447805fee6b568e4ca98e7c
            • Instruction Fuzzy Hash: F5618970608A019FD714DF54C848B6AB7E8AF48704F10441FF985AB292E778ED58CB9B
            APIs
            • WSAStartup.WSOCK32(00000101,?), ref: 00468168
            • inet_addr.WSOCK32(?,?,?), ref: 004681AD
            • gethostbyname.WSOCK32(?), ref: 004681B9
            • IcmpCreateFile.IPHLPAPI ref: 004681C7
            • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00468237
            • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 0046824D
            • IcmpCloseHandle.IPHLPAPI(00000000), ref: 004682C2
            • WSACleanup.WSOCK32 ref: 004682C8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
            • String ID: Ping
            • API String ID: 1028309954-2246546115
            • Opcode ID: fae008fa1bbda8abe490e48a95ba07f9efa633edb1a795aa42150201136970a4
            • Instruction ID: 5bba383d595c531ae058f22006e89107b36202e7f75edeeecbdd01c0dc300a5e
            • Opcode Fuzzy Hash: fae008fa1bbda8abe490e48a95ba07f9efa633edb1a795aa42150201136970a4
            • Instruction Fuzzy Hash: 2F51C0316003009FDB209F65DC95B6AB7E4AF48314F048AAFF955D73A0EB78E901CB4A
            APIs
            • _memset.LIBCMT ref: 00479E5B
            • CreateMenu.USER32 ref: 00479E76
            • SetMenu.USER32(?,00000000), ref: 00479E85
            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00479F12
            • IsMenu.USER32(?), ref: 00479F28
            • CreatePopupMenu.USER32 ref: 00479F32
            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00479F63
            • DrawMenuBar.USER32 ref: 00479F71
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
            • String ID: 0
            • API String ID: 176399719-4108050209
            • Opcode ID: b9519485da3a6f3ace0e2101af500fc172f9bbb2a6c73117e667df61eded5c21
            • Instruction ID: 15922cb76cb7485e0502f9e5f65f85ab8cc22012054e4f02011aea9dbc5b87b9
            • Opcode Fuzzy Hash: b9519485da3a6f3ace0e2101af500fc172f9bbb2a6c73117e667df61eded5c21
            • Instruction Fuzzy Hash: 4C4125B4A01209AFDB10DF64D844BEABBB5FF58314F15812AE949A7360D734AD10CF58
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045E396
            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0045E40C
            • GetLastError.KERNEL32 ref: 0045E416
            • SetErrorMode.KERNEL32(00000000,READY), ref: 0045E483
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Error$Mode$DiskFreeLastSpace
            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
            • API String ID: 4194297153-14809454
            • Opcode ID: b0a7d45b615a16898003cc59b81b1c48b43b4e5bccd58d0091ca04cc2d0d484e
            • Instruction ID: ed405bf843520cad26cd28f8ddbb05b4d57718ff503924f35a373ff0e6b30c44
            • Opcode Fuzzy Hash: b0a7d45b615a16898003cc59b81b1c48b43b4e5bccd58d0091ca04cc2d0d484e
            • Instruction Fuzzy Hash: 1031D436A002099FCB04EF65D885FBE77B4EF0A305F10802BE905E7292D7789A46CB49
            APIs
            • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 0044B98C
            • GetDlgCtrlID.USER32 ref: 0044B997
            • GetParent.USER32 ref: 0044B9B3
            • SendMessageW.USER32(00000000,?,00000111,?), ref: 0044B9B6
            • GetDlgCtrlID.USER32(?), ref: 0044B9BF
            • GetParent.USER32(?), ref: 0044B9DB
            • SendMessageW.USER32(00000000,?,?,00000111), ref: 0044B9DE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageSend$CtrlParent
            • String ID: ComboBox$ListBox
            • API String ID: 1383977212-1403004172
            • Opcode ID: 0ee187d62709e52a7be3c194351db4d3eed7921e75b5041dd348cb8d12220d99
            • Instruction ID: e9dd5fabdd90c6ef27963275fcebdc836b3c6702e281e0957bf008654b3b6f9d
            • Opcode Fuzzy Hash: 0ee187d62709e52a7be3c194351db4d3eed7921e75b5041dd348cb8d12220d99
            • Instruction Fuzzy Hash: 0621C4B4900204BFEB04ABA1CC86EFEB774EF55304B10012BF551932D1DBB99815DB68
            APIs
            • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 0044BA73
            • GetDlgCtrlID.USER32 ref: 0044BA7E
            • GetParent.USER32 ref: 0044BA9A
            • SendMessageW.USER32(00000000,?,00000111,?), ref: 0044BA9D
            • GetDlgCtrlID.USER32(?), ref: 0044BAA6
            • GetParent.USER32(?), ref: 0044BAC2
            • SendMessageW.USER32(00000000,?,?,00000111), ref: 0044BAC5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageSend$CtrlParent
            • String ID: ComboBox$ListBox
            • API String ID: 1383977212-1403004172
            • Opcode ID: 61f637d7cf2bc64286e6b8e5ca846be9ed99bd45c752e3db3ec4fe2347ae9d7f
            • Instruction ID: 4dd77c5848441ebe82e9a39b33b94ebb16fb4dcd530ddc0e0de17959c13523b6
            • Opcode Fuzzy Hash: 61f637d7cf2bc64286e6b8e5ca846be9ed99bd45c752e3db3ec4fe2347ae9d7f
            • Instruction Fuzzy Hash: D121C574940204BFDF01AB64CC85FFEB779EF55304F10002BF551A3291DBB999559B68
            APIs
            • GetParent.USER32 ref: 0044BAE3
            • GetClassNameW.USER32(00000000,?,00000100), ref: 0044BAF8
            • _wcscmp.LIBCMT ref: 0044BB0A
            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0044BB85
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ClassMessageNameParentSend_wcscmp
            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
            • API String ID: 1704125052-3381328864
            • Opcode ID: eb53f62dfa3cbef146c7d741e9c57455b3deda882c60afcbb845e8703c8ffae0
            • Instruction ID: 1a7e8e81f40775d298b94743e03b2861d5ff1ac0b30a45f9241232f1cdfc727f
            • Opcode Fuzzy Hash: eb53f62dfa3cbef146c7d741e9c57455b3deda882c60afcbb845e8703c8ffae0
            • Instruction Fuzzy Hash: 0011E37A608342F9FA2066259C16EA7379CDB25324F20002BF904E54D5EBEEB811459C
            APIs
            • VariantInit.OLEAUT32(?), ref: 0046B2D5
            • CoInitialize.OLE32(00000000), ref: 0046B302
            • CoUninitialize.OLE32 ref: 0046B30C
            • GetRunningObjectTable.OLE32(00000000,?), ref: 0046B40C
            • SetErrorMode.KERNEL32(00000001,00000029), ref: 0046B539
            • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002), ref: 0046B56D
            • CoGetObject.OLE32(?,00000000,0049D91C,?), ref: 0046B590
            • SetErrorMode.KERNEL32(00000000), ref: 0046B5A3
            • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0046B623
            • VariantClear.OLEAUT32(0049D91C), ref: 0046B633
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
            • String ID:
            • API String ID: 2395222682-0
            • Opcode ID: 12d23e32dfec738c3dcd7f761b72d784a8184e274e8b4c80f0488f11cab31f63
            • Instruction ID: eda1ac42409f91cad656c5fd9b86cc7f8d6d0700f142a9e21368c2ff612ce094
            • Opcode Fuzzy Hash: 12d23e32dfec738c3dcd7f761b72d784a8184e274e8b4c80f0488f11cab31f63
            • Instruction Fuzzy Hash: D3C10371608300AFC700DF65C88496BB7E9EF88308F00492EF98ADB251EB75ED45CB96
            APIs
            • GetCurrentThreadId.KERNEL32 ref: 00454047
            • GetForegroundWindow.USER32(00000000,?,?,?,?,?,004530A5,?,00000001), ref: 0045405B
            • GetWindowThreadProcessId.USER32(00000000), ref: 00454062
            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,004530A5,?,00000001), ref: 00454071
            • GetWindowThreadProcessId.USER32(?,00000000), ref: 00454083
            • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,004530A5,?,00000001), ref: 0045409C
            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,004530A5,?,00000001), ref: 004540AE
            • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,004530A5,?,00000001), ref: 004540F3
            • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,004530A5,?,00000001), ref: 00454108
            • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,004530A5,?,00000001), ref: 00454113
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
            • String ID:
            • API String ID: 2156557900-0
            • Opcode ID: 733dea4331a3e9352baf92716f5010d4f3b96982650617935e5792565a14efc8
            • Instruction ID: ff721e3b4578868445a94f4782295145e9ae1da958306f6bcebf5683a1a8efe2
            • Opcode Fuzzy Hash: 733dea4331a3e9352baf92716f5010d4f3b96982650617935e5792565a14efc8
            • Instruction Fuzzy Hash: 1C31D472501200ABDB10CF54DC49B6A77B9ABA0B17F108027FD05EA291C7789D848B5D
            APIs
            • GetSysColor.USER32(00000008), ref: 0042B496
            • SetTextColor.GDI32(?,000000FF), ref: 0042B4A0
            • SetBkMode.GDI32(?,00000001), ref: 0042B4B5
            • GetStockObject.GDI32(00000005), ref: 0042B4BD
            • GetClientRect.USER32(?), ref: 0048DD63
            • SendMessageW.USER32(?,00001328,00000000,?), ref: 0048DD7A
            • GetWindowDC.USER32(?), ref: 0048DD86
            • GetPixel.GDI32(00000000,?,?), ref: 0048DD95
            • ReleaseDC.USER32(?,00000000), ref: 0048DDA7
            • GetSysColor.USER32(00000005), ref: 0048DDC5
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Color$ClientMessageModeObjectPixelRectReleaseSendStockTextWindow
            • String ID:
            • API String ID: 3430376129-0
            • Opcode ID: e2ce7d2f0eb5b465ac71522bb9a22671f68454be5d038fe9701be51d2b18402b
            • Instruction ID: d3a87821295e587ee2e8af8dc72d1f5f33a06c33cd26770770253c2d867d1ecb
            • Opcode Fuzzy Hash: e2ce7d2f0eb5b465ac71522bb9a22671f68454be5d038fe9701be51d2b18402b
            • Instruction Fuzzy Hash: 84117F31900205FFDB116FA4EC49FAA7B71EB14321F104632FA66951E2CB310941DB19
            APIs
            • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 004130DC
            • CoUninitialize.OLE32(?,00000000), ref: 00413181
            • UnregisterHotKey.USER32(?), ref: 004132A9
            • DestroyWindow.USER32(?), ref: 00485079
            • FreeLibrary.KERNEL32(?), ref: 004850F8
            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00485125
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
            • String ID: close all
            • API String ID: 469580280-3243417748
            • Opcode ID: 9fdb12f68b1f8302a8506c3f6ba9596750c557b829e3666a5bf61c0afaa90e52
            • Instruction ID: 861b60e222491da4bd70faa86354835f382f504b4ba0bd0bd36b8aac320c7028
            • Opcode Fuzzy Hash: 9fdb12f68b1f8302a8506c3f6ba9596750c557b829e3666a5bf61c0afaa90e52
            • Instruction Fuzzy Hash: 7C915D34700102DFC705EF15D995BA9F3A4FF15309F5081AEE40AA7262DB38AE96CF58
            APIs
            • SetWindowLongW.USER32(?,000000EB), ref: 0042CC15
              • Part of subcall function 0042CCCD: GetClientRect.USER32(?,?), ref: 0042CCF6
              • Part of subcall function 0042CCCD: GetWindowRect.USER32(?,?), ref: 0042CD37
              • Part of subcall function 0042CCCD: ScreenToClient.USER32(?,?), ref: 0042CD5F
            • GetDC.USER32 ref: 0048D137
            • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0048D14A
            • SelectObject.GDI32(00000000,00000000), ref: 0048D158
            • SelectObject.GDI32(00000000,00000000), ref: 0048D16D
            • ReleaseDC.USER32(?,00000000), ref: 0048D175
            • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0048D200
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
            • String ID: U
            • API String ID: 4009187628-3372436214
            • Opcode ID: 80e44c18c9efd66f8e722a55842e9dbc58b2d790a3b3d7522fe8a14e53b60bdf
            • Instruction ID: 2db11eb73cfab7b63f5859f432830cf3fa5e9a8bb7c84c1fdac518c9431505eb
            • Opcode Fuzzy Hash: 80e44c18c9efd66f8e722a55842e9dbc58b2d790a3b3d7522fe8a14e53b60bdf
            • Instruction Fuzzy Hash: FA710130901204EFCF21AF64D884AAE7BB1FF49314F144A6BED559A2E6C7398C41DF59
            APIs
              • Part of subcall function 0042B34E: GetWindowLongW.USER32(?,000000EB), ref: 0042B35F
              • Part of subcall function 0042B63C: GetCursorPos.USER32(000000FF), ref: 0042B64F
              • Part of subcall function 0042B63C: ScreenToClient.USER32(00000000,000000FF), ref: 0042B66C
              • Part of subcall function 0042B63C: GetAsyncKeyState.USER32(00000001), ref: 0042B691
              • Part of subcall function 0042B63C: GetAsyncKeyState.USER32(00000002), ref: 0042B69F
            • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?), ref: 0047ED3C
            • ImageList_EndDrag.COMCTL32 ref: 0047ED42
            • ReleaseCapture.USER32 ref: 0047ED48
            • SetWindowTextW.USER32(?,00000000), ref: 0047EDF0
            • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 0047EE03
            • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?), ref: 0047EEDC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
            • String ID: @GUI_DRAGFILE$@GUI_DROPID
            • API String ID: 1924731296-2107944366
            • Opcode ID: 9140e5198355197ed70d6005580db88cdf042807023b9dfd1257ca7fb9484948
            • Instruction ID: b613a7f329a354966eefcc29c3df0b4f04b021867814c4510ac62bcdf8fb06d3
            • Opcode Fuzzy Hash: 9140e5198355197ed70d6005580db88cdf042807023b9dfd1257ca7fb9484948
            • Instruction Fuzzy Hash: B0519C70204300AFD710DF21DC96FAA77E4EB88718F404A2FF955972E1DB789948CB5A
            APIs
            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 004645FF
            • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0046462B
            • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 0046466D
            • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00464682
            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0046468F
            • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 004646BF
            • InternetCloseHandle.WININET(00000000), ref: 00464706
              • Part of subcall function 00465052: GetLastError.KERNEL32(?,?,004643CC,00000000,00000000,00000001), ref: 00465067
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorHandleInfoLastOpenSend
            • String ID:
            • API String ID: 1241431887-3916222277
            • Opcode ID: 9797b134526a447a5af96dc5dcf522167617ac257dd7d3383629973fba94c96d
            • Instruction ID: e89f762b1de149323bcab2b8b22268dfac6a1109913ac15660094e7d4fdaa26d
            • Opcode Fuzzy Hash: 9797b134526a447a5af96dc5dcf522167617ac257dd7d3383629973fba94c96d
            • Instruction Fuzzy Hash: EC417EB1901205BFEF019F90CC85FBB77ACEF49314F00402BFA059A151E7B89D458BAA
            APIs
            • GetModuleFileNameW.KERNEL32(?,?,00000104,?,004ADC00), ref: 0046B715
            • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,004ADC00), ref: 0046B749
            • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 0046B8C1
            • SysFreeString.OLEAUT32(?), ref: 0046B8EB
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Free$FileLibraryModuleNamePathQueryStringType
            • String ID:
            • API String ID: 560350794-0
            • Opcode ID: 2f99cc5920dc8b070963116965d9d9f5489a8f356c5a84c9d2fefa3f9fa61766
            • Instruction ID: d5f69b7993435ba7f238fa0345018294fc9e4af6d151611f3bd7b4f7a9d9e2c1
            • Opcode Fuzzy Hash: 2f99cc5920dc8b070963116965d9d9f5489a8f356c5a84c9d2fefa3f9fa61766
            • Instruction Fuzzy Hash: 58F13A71A00209AFCF04DF94C884EAEB7B9FF49315F10845AF915EB250EB35AD86CB95
            APIs
            • _memset.LIBCMT ref: 004724F5
            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00472688
            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 004726AC
            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 004726EC
            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0047270E
            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0047286F
            • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 004728A1
            • CloseHandle.KERNEL32(?), ref: 004728D0
            • CloseHandle.KERNEL32(?), ref: 00472947
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
            • String ID:
            • API String ID: 4090791747-0
            • Opcode ID: 0e702d756f217b0ba99888284824f8712a5d462a55f33728b9e1058386e5a363
            • Instruction ID: 49f69be0f839d7ee7500b4091c94a53ba71af42b67003122e1027e06c25bf161
            • Opcode Fuzzy Hash: 0e702d756f217b0ba99888284824f8712a5d462a55f33728b9e1058386e5a363
            • Instruction Fuzzy Hash: B6D1C131604200DFC714EF25C591AAEBBE0BF88314F14856EF8999B3A2DB79DC45CB5A
            APIs
            • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0047B3F4
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: InvalidateRect
            • String ID:
            • API String ID: 634782764-0
            • Opcode ID: ee4c3ca0a85bb4f05d70ab4a904ef0568119d9e5bc853b86b2922d2a560a28b3
            • Instruction ID: a10614bb1c6dd6bf0ce0c78835bf9a11b98177f376b4360be36fb836d74de51b
            • Opcode Fuzzy Hash: ee4c3ca0a85bb4f05d70ab4a904ef0568119d9e5bc853b86b2922d2a560a28b3
            • Instruction Fuzzy Hash: 01517370600214BBDF249B25CC85BDA3B64EF05358F54C127FA1DE62E1C779E9809BD9
            APIs
            • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0048DB1B
            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0048DB3C
            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0048DB51
            • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0048DB6E
            • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0048DB95
            • DestroyIcon.USER32(00000000,?,?,?,?,?,?,0042A67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 0048DBA0
            • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0048DBBD
            • DestroyIcon.USER32(00000000,?,?,?,?,?,?,0042A67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 0048DBC8
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Icon$DestroyExtractImageLoadMessageSend
            • String ID:
            • API String ID: 1268354404-0
            • Opcode ID: 8b4f7ef2005792b5aaf6997b1576a0d91a1d728d9993f4edf2bf0f143c1a03fb
            • Instruction ID: c1b63f6963453f52710db94a98f2de544f5dafae069676b5614dc9c818764bca
            • Opcode Fuzzy Hash: 8b4f7ef2005792b5aaf6997b1576a0d91a1d728d9993f4edf2bf0f143c1a03fb
            • Instruction Fuzzy Hash: 78518970B01208AFDB20DF65DC81FAA77B8EB58354F10052AF946972E0D7B8EC90CB59
            APIs
              • Part of subcall function 00456EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00455FA6,?), ref: 00456ED8
              • Part of subcall function 00456EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00455FA6,?), ref: 00456EF1
              • Part of subcall function 004572CB: GetFileAttributesW.KERNEL32(?,00456019), ref: 004572CC
            • lstrcmpiW.KERNEL32(?,?), ref: 004575CA
            • _wcscmp.LIBCMT ref: 004575E2
            • MoveFileW.KERNEL32(?,?), ref: 004575FB
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
            • String ID:
            • API String ID: 793581249-0
            • Opcode ID: bab711bfd7d27bf372352265db2fd1b3825bcf36b3e3359f86c6f86c811bc3a5
            • Instruction ID: ed5e52cffba7dc62bd2f629ddf26c637f529d235ff0593df7bd9898f4c4d5a7c
            • Opcode Fuzzy Hash: bab711bfd7d27bf372352265db2fd1b3825bcf36b3e3359f86c6f86c811bc3a5
            • Instruction Fuzzy Hash: A35144B29092195ADF54EB54E841DDE73BC9F0C325F0041AFFA05E3542EA7897C9CB68
            APIs
            • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,0048DAD1,00000004,00000000,00000000), ref: 0042EAEB
            • ShowWindow.USER32(00000000,00000000,00000000,00000000,00000000,?,0048DAD1,00000004,00000000,00000000), ref: 0042EB32
            • ShowWindow.USER32(00000000,00000006,00000000,00000000,00000000,?,0048DAD1,00000004,00000000,00000000), ref: 0048DC86
            • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,0048DAD1,00000004,00000000,00000000), ref: 0048DCF2
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ShowWindow
            • String ID:
            • API String ID: 1268545403-0
            • Opcode ID: 9724c259173bf2c2ca70a48fda03299fbb192e95c4712819e590e4d619829ace
            • Instruction ID: 8a8e069f2325556dfc08e13790796ac072ffd389604b59da1109fb93c6fca836
            • Opcode Fuzzy Hash: 9724c259173bf2c2ca70a48fda03299fbb192e95c4712819e590e4d619829ace
            • Instruction Fuzzy Hash: 9241F930B06250AAD735D72AED8DB3B7F95AB51304F99082FE047867A1C67CB841D31D
            APIs
            • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,0044AEF1,00000B00,?,?), ref: 0044B26C
            • HeapAlloc.KERNEL32(00000000,?,0044AEF1,00000B00,?,?), ref: 0044B273
            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,0044AEF1,00000B00,?,?), ref: 0044B288
            • GetCurrentProcess.KERNEL32(?,00000000,?,0044AEF1,00000B00,?,?), ref: 0044B290
            • DuplicateHandle.KERNEL32(00000000,?,0044AEF1,00000B00,?,?), ref: 0044B293
            • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,0044AEF1,00000B00,?,?), ref: 0044B2A3
            • GetCurrentProcess.KERNEL32(0044AEF1,00000000,?,0044AEF1,00000B00,?,?), ref: 0044B2AB
            • DuplicateHandle.KERNEL32(00000000,?,0044AEF1,00000B00,?,?), ref: 0044B2AE
            • CreateThread.KERNEL32(00000000,00000000,0044B2D4,00000000,00000000,00000000), ref: 0044B2C8
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
            • String ID:
            • API String ID: 1957940570-0
            • Opcode ID: c41831a098398ea248e2e890e11692a6c511e294a73bec77a5e7ac15f238b95b
            • Instruction ID: b1950c47437d2fe9cba9b01b4fd33cd470da411c9d02ddac28bd20d975827376
            • Opcode Fuzzy Hash: c41831a098398ea248e2e890e11692a6c511e294a73bec77a5e7ac15f238b95b
            • Instruction Fuzzy Hash: 0201BF75640304BFE710ABA5DC4DF5B7BACEB98711F414422FA05DB191C6749C00CB65
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID:
            • String ID: NULL Pointer assignment$Not an Object type
            • API String ID: 0-572801152
            • Opcode ID: c333b6fe448fb73c6320369eb2473323747491794a929ed07a9e86eb5a3a8cab
            • Instruction ID: f58da77a3faf39d4089c13330928c82eb4271084dfa91f1a746a22284febec8a
            • Opcode Fuzzy Hash: c333b6fe448fb73c6320369eb2473323747491794a929ed07a9e86eb5a3a8cab
            • Instruction Fuzzy Hash: 6BE1C571A0021AAFDF10DFA5C881ABE77B5EF48354F14402EE945A7381E778AD41CB9A
            APIs
              • Part of subcall function 0041936C: __swprintf.LIBCMT ref: 004193AB
              • Part of subcall function 0041936C: __itow.LIBCMT ref: 004193DF
              • Part of subcall function 0042C6F4: _wcscpy.LIBCMT ref: 0042C717
            • _wcstok.LIBCMT ref: 0046184E
            • _wcscpy.LIBCMT ref: 004618DD
            • _memset.LIBCMT ref: 00461910
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: _wcscpy$__itow__swprintf_memset_wcstok
            • String ID: X$p2Ll2L
            • API String ID: 774024439-180699321
            • Opcode ID: db30829e730204ed40b2eb4486ac0a1d9dca595f61df2e02f9310312bd245e09
            • Instruction ID: 77518f90cd30f1e60ec0c9ff1c2fad7f91d3f7c114e1cfd319078843d23e611b
            • Opcode Fuzzy Hash: db30829e730204ed40b2eb4486ac0a1d9dca595f61df2e02f9310312bd245e09
            • Instruction Fuzzy Hash: 43C1A3709043409FC714EF65C991A9BB7E0BF85358F04492FF899972A1EB34ED45CB8A
            APIs
            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00479B19
            • SendMessageW.USER32(?,00001036,00000000,?), ref: 00479B2D
            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00479B47
            • _wcscat.LIBCMT ref: 00479BA2
            • SendMessageW.USER32(?,00001057,00000000,?), ref: 00479BB9
            • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00479BE7
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageSend$Window_wcscat
            • String ID: SysListView32
            • API String ID: 307300125-78025650
            • Opcode ID: 966032c35aa0c384359fda0c415c2d7d81dc8551fe3d3350ca98e273361383c8
            • Instruction ID: b0a254952552b8d695de865cff7b9f5f47cecbdf9f0cf510344d9ea5966f1858
            • Opcode Fuzzy Hash: 966032c35aa0c384359fda0c415c2d7d81dc8551fe3d3350ca98e273361383c8
            • Instruction Fuzzy Hash: 2541A170900308ABDF219FA4DC85BEE77A8EF08354F10452BF549A7291C7799D85CB68
            APIs
              • Part of subcall function 00456532: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 00456554
              • Part of subcall function 00456532: Process32FirstW.KERNEL32(00000000,0000022C), ref: 00456564
              • Part of subcall function 00456532: CloseHandle.KERNEL32(00000000,?,00000000), ref: 004565F9
            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0047179A
            • GetLastError.KERNEL32 ref: 004717AD
            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 004717D9
            • TerminateProcess.KERNEL32(00000000,00000000), ref: 00471855
            • GetLastError.KERNEL32(00000000), ref: 00471860
            • CloseHandle.KERNEL32(00000000), ref: 00471895
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
            • String ID: SeDebugPrivilege
            • API String ID: 2533919879-2896544425
            • Opcode ID: 55faaf926054bed699028b67c34063aae957781d4b3e22bef27866f23730ab81
            • Instruction ID: baa6ad3c432d46013dd5746f52026d48fb6f33dbeb9e779e0cd9da9985923497
            • Opcode Fuzzy Hash: 55faaf926054bed699028b67c34063aae957781d4b3e22bef27866f23730ab81
            • Instruction Fuzzy Hash: 4641D032700200AFDB15EF59C8D5FAE77A1AF14315F05806EF9069B3D2DB7899048B5A
            APIs
            • LoadIconW.USER32(00000000,00007F03), ref: 004558B8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: IconLoad
            • String ID: blank$info$question$stop$warning
            • API String ID: 2457776203-404129466
            • Opcode ID: 708109ddafee46f641d8ed7bdab547de566dc865b169b77466d3ea03a28506d2
            • Instruction ID: 9a9bba9330903256c7bf45bbeaea17303b32e7516054a290a8c80c0eebf341ab
            • Opcode Fuzzy Hash: 708109ddafee46f641d8ed7bdab547de566dc865b169b77466d3ea03a28506d2
            • Instruction Fuzzy Hash: 5C112E35709B42BAE7106A559C62EBB239C9F25335F30003FF901E6283E7ACA915466D
            APIs
            • SafeArrayGetVartype.OLEAUT32(?,00000000), ref: 0045A806
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ArraySafeVartype
            • String ID:
            • API String ID: 1725837607-0
            • Opcode ID: 96390468c696db1dfa00d539e48c03452714305332484bec33374012cb21679d
            • Instruction ID: 80c1bb1d85bd1ace9bf977e301263e82ed247c83085a477a5f445147e7989d69
            • Opcode Fuzzy Hash: 96390468c696db1dfa00d539e48c03452714305332484bec33374012cb21679d
            • Instruction Fuzzy Hash: E5C17D71A00219DFDB00DF94D481BAEB7F4FF08316F24456BEA05E7242D738A959CB9A
            APIs
            • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00456B63
            • LoadStringW.USER32(00000000), ref: 00456B6A
            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00456B80
            • LoadStringW.USER32(00000000), ref: 00456B87
            • _wprintf.LIBCMT ref: 00456BAD
            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00456BCB
            Strings
            • %s (%d) : ==> %s: %s %s, xrefs: 00456BA8
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: HandleLoadModuleString$Message_wprintf
            • String ID: %s (%d) : ==> %s: %s %s
            • API String ID: 3648134473-3128320259
            • Opcode ID: 43c9dd000446e2f7f0722cd97966d0260989151a47e9012ff92600aa7788c497
            • Instruction ID: 790e51edb48da2bc48f162833d1ec9a3abb252ae1d107f35f13bef3a7b2fdac1
            • Opcode Fuzzy Hash: 43c9dd000446e2f7f0722cd97966d0260989151a47e9012ff92600aa7788c497
            • Instruction Fuzzy Hash: A20162F69002187FE711AB909D89EE7336CD708305F4044B7B746D2051EA749E848F78
            APIs
              • Part of subcall function 00473C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00472BB5,?,?), ref: 00473C1D
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00472BF6
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: BuffCharConnectRegistryUpper
            • String ID:
            • API String ID: 2595220575-0
            • Opcode ID: ed662b089c66550d58223eb07a43d13368ff4806ab2f1cf98912b91cc1965323
            • Instruction ID: 221b9f9e1be8308912d3711d5202182a576e61dee7cc18f7a74c8fa0850f0ba1
            • Opcode Fuzzy Hash: ed662b089c66550d58223eb07a43d13368ff4806ab2f1cf98912b91cc1965323
            • Instruction Fuzzy Hash: 0F91AF716043009FCB10EF15C981BAEB7E5FF58318F04881EF99A97292DB78E945CB4A
            APIs
            • select.WSOCK32 ref: 00469691
            • WSAGetLastError.WSOCK32(00000000), ref: 0046969E
            • __WSAFDIsSet.WSOCK32(00000000,?,00000000), ref: 004696C8
            • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 004696E9
            • WSAGetLastError.WSOCK32(00000000), ref: 004696F8
            • htons.WSOCK32(?,?,?,00000000,?), ref: 004697AA
            • inet_ntoa.WSOCK32(?,?,?,?,?,?,?,?,?,?,?,?,004ADC00), ref: 00469765
              • Part of subcall function 0044D2FF: _strlen.LIBCMT ref: 0044D309
            • _strlen.LIBCMT ref: 00469800
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ErrorLast_strlen$htonsinet_ntoaselect
            • String ID:
            • API String ID: 3480843537-0
            • Opcode ID: d0ac7dd5b4ace6b1d09340b5e2c60e91ee9395f2a84170d3ed4c5eb0f802001a
            • Instruction ID: 32ca4565a1e827adfa93fdc7dee6305004f35cabd044e395e65cf3792eb905f1
            • Opcode Fuzzy Hash: d0ac7dd5b4ace6b1d09340b5e2c60e91ee9395f2a84170d3ed4c5eb0f802001a
            • Instruction Fuzzy Hash: B4810271504200AFC310EF66DC85E6BB7E8EF85718F10462EF4559B292EB78ED04CB9A
            APIs
            • __mtinitlocknum.LIBCMT ref: 0043A991
              • Part of subcall function 00437D7C: __FF_MSGBANNER.LIBCMT ref: 00437D91
              • Part of subcall function 00437D7C: __NMSG_WRITE.LIBCMT ref: 00437D98
              • Part of subcall function 00437D7C: __malloc_crt.LIBCMT ref: 00437DB8
            • __lock.LIBCMT ref: 0043A9A4
            • __lock.LIBCMT ref: 0043A9F0
            • InitializeCriticalSectionAndSpinCount.KERNEL32(8000000C,00000FA0,004C6DE0,00000018,00445E7B,?,00000000,00000109), ref: 0043AA0C
            • EnterCriticalSection.KERNEL32(8000000C,004C6DE0,00000018,00445E7B,?,00000000,00000109), ref: 0043AA29
            • LeaveCriticalSection.KERNEL32(8000000C), ref: 0043AA39
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CriticalSection$__lock$CountEnterInitializeLeaveSpin__malloc_crt__mtinitlocknum
            • String ID:
            • API String ID: 1422805418-0
            • Opcode ID: 0a9a17514b268f6601aa73d635ec4eb39986b319167a77faa8190df951b95e3a
            • Instruction ID: e7d2657dd3a8cc7497f064d4198aadf2de3396c78a7ad4677c2793c1beb52a8f
            • Opcode Fuzzy Hash: 0a9a17514b268f6601aa73d635ec4eb39986b319167a77faa8190df951b95e3a
            • Instruction Fuzzy Hash: 3B415BB29402019BEB10EF68DA4475DB7B06F09335F11932FE4A5AB2D1D77C9821CB8E
            APIs
            • DeleteObject.GDI32(00000000), ref: 00478EE4
            • GetDC.USER32(00000000), ref: 00478EEC
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00478EF7
            • ReleaseDC.USER32(00000000,00000000), ref: 00478F03
            • CreateFontW.GDI32(?,00000000,00000000,00000000,00000000,?,?,?,00000001,00000004,00000000,?,00000000,?), ref: 00478F3F
            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00478F50
            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0047BD19,?,?,000000FF,00000000,?,000000FF,?), ref: 00478F8A
            • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00478FAA
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
            • String ID:
            • API String ID: 3864802216-0
            • Opcode ID: 5a57e37f6048cda9d736161d3342ace82b259e50b9a283cf4f9270323c34fa9a
            • Instruction ID: b317864b95923118402feea4c87f7cd2d4fc7262133214381ddb0d6383b6e5c3
            • Opcode Fuzzy Hash: 5a57e37f6048cda9d736161d3342ace82b259e50b9a283cf4f9270323c34fa9a
            • Instruction Fuzzy Hash: E1316D72540214BFEB108F60CC4AFEB3BA9EF59715F044066FE09DA291C6799C41CB78
            APIs
              • Part of subcall function 0042B34E: GetWindowLongW.USER32(?,000000EB), ref: 0042B35F
            • GetSystemMetrics.USER32(0000000F), ref: 0048016D
            • MoveWindow.USER32(00000003,?,00000000,00000001,00000000,00000000,?,?,?), ref: 0048038D
            • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 004803AB
            • InvalidateRect.USER32(?,00000000,00000001,?), ref: 004803D6
            • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 004803FF
            • ShowWindow.USER32(00000003,00000000), ref: 00480421
            • DefDlgProcW.USER32(?,00000005,?,?), ref: 00480440
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Window$MessageSend$InvalidateLongMetricsMoveProcRectShowSystem
            • String ID:
            • API String ID: 3356174886-0
            • Opcode ID: 31e1e7e949f4a61938bd3b14d212a5012d24c3e17dd3dd90459ebb00866a811b
            • Instruction ID: 9b55dea296a3abafb400fc1a5c922d6d9f1b84e4f10dd858b55effac52737587
            • Opcode Fuzzy Hash: 31e1e7e949f4a61938bd3b14d212a5012d24c3e17dd3dd90459ebb00866a811b
            • Instruction Fuzzy Hash: 9EA1E131600616EFDB18DF68C9897BEBBB1FF08700F088566EC54A7290D778AD54CB94
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: adb78efca03717f0287cd831dd49801b9d53323f839cc769de3a736457678aed
            • Instruction ID: 0170ce414bb4a444c9835ae538a25347826d679a577e6e0a699daee46634abe6
            • Opcode Fuzzy Hash: adb78efca03717f0287cd831dd49801b9d53323f839cc769de3a736457678aed
            • Instruction Fuzzy Hash: 9A719F70A00119EFCB04DF99DD49AAFBB74FF85314F14815AF915A7250C738AA12CFA9
            APIs
            • _memset.LIBCMT ref: 0047225A
            • _memset.LIBCMT ref: 00472323
            • ShellExecuteExW.SHELL32(?), ref: 00472368
              • Part of subcall function 0041936C: __swprintf.LIBCMT ref: 004193AB
              • Part of subcall function 0041936C: __itow.LIBCMT ref: 004193DF
              • Part of subcall function 0042C6F4: _wcscpy.LIBCMT ref: 0042C717
            • CloseHandle.KERNEL32(00000000), ref: 0047242F
            • FreeLibrary.KERNEL32(00000000), ref: 0047243E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: _memset$CloseExecuteFreeHandleLibraryShell__itow__swprintf_wcscpy
            • String ID: @
            • API String ID: 4082843840-2766056989
            • Opcode ID: e1703df16d93efa7f5956321a8397acdbde29453d47de0977eb9d6658d3046d2
            • Instruction ID: 81f6e3c27e9e788e8aa53d2172cdf3765b7ee041ab2356ebf0ef7d14d7d20ae7
            • Opcode Fuzzy Hash: e1703df16d93efa7f5956321a8397acdbde29453d47de0977eb9d6658d3046d2
            • Instruction Fuzzy Hash: E0718E70A006199FCF14EFA5D98199EB7F5FF48314F10846EE859AB351CB78AD40CB98
            APIs
            • GetParent.USER32(?), ref: 00453DE7
            • GetKeyboardState.USER32(?), ref: 00453DFC
            • SetKeyboardState.USER32(?), ref: 00453E5D
            • PostMessageW.USER32(?,00000101,00000010,?), ref: 00453E8B
            • PostMessageW.USER32(?,00000101,00000011,?), ref: 00453EAA
            • PostMessageW.USER32(?,00000101,00000012,?), ref: 00453EF0
            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00453F13
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessagePost$KeyboardState$Parent
            • String ID:
            • API String ID: 87235514-0
            • Opcode ID: b5900fd58af399d8d0cd6f65502a0e0c3552be57522d1ab040007326a5ee4e9e
            • Instruction ID: 7702e1d8b293b07290ff673c5b82d84fe2169ff028453979d1ab77c6cb4c13a4
            • Opcode Fuzzy Hash: b5900fd58af399d8d0cd6f65502a0e0c3552be57522d1ab040007326a5ee4e9e
            • Instruction Fuzzy Hash: E051E3A0A047D13DFB364A248C46BBBBEE55B06346F08458EF8D5469C3D29CAECCD758
            APIs
            • GetParent.USER32(00000000), ref: 00453C02
            • GetKeyboardState.USER32(?), ref: 00453C17
            • SetKeyboardState.USER32(?), ref: 00453C78
            • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00453CA4
            • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00453CC1
            • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00453D05
            • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00453D26
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessagePost$KeyboardState$Parent
            • String ID:
            • API String ID: 87235514-0
            • Opcode ID: 6c436d1743aaa0b4cc7826c2b87b6bae17c88a679c3492d08cf38d5345da583e
            • Instruction ID: 0a39f8f5a3cb197ed02e90eafa05e7a65a6740c290ef558c20c309f4cf8b17df
            • Opcode Fuzzy Hash: 6c436d1743aaa0b4cc7826c2b87b6bae17c88a679c3492d08cf38d5345da583e
            • Instruction Fuzzy Hash: C05105A15047D539FB338B248C05B77BEB85B06347F08848AE8D55A5C3D29CEE8CD768
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: _wcsncpy$LocalTime
            • String ID:
            • API String ID: 2945705084-0
            • Opcode ID: 7e541c7fd58ccd6578516f9b4f5187b27faaad52dee84515f39b3db3378ecce0
            • Instruction ID: 9e95055f502456208e642221316b412b1d38a345054a91505d9169bb52b46a6b
            • Opcode Fuzzy Hash: 7e541c7fd58ccd6578516f9b4f5187b27faaad52dee84515f39b3db3378ecce0
            • Instruction Fuzzy Hash: BC416066C1021476CB10EBF58C469CFB3AC9F09314F50A97BE904E3162F678E615C3AD
            APIs
            • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?), ref: 00473DA1
            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00473DCB
            • FreeLibrary.KERNEL32(00000000), ref: 00473E80
              • Part of subcall function 00473D72: RegCloseKey.ADVAPI32(?), ref: 00473DE8
              • Part of subcall function 00473D72: FreeLibrary.KERNEL32(?), ref: 00473E3A
              • Part of subcall function 00473D72: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00473E5D
            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00473E25
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: EnumFreeLibrary$CloseDeleteOpen
            • String ID:
            • API String ID: 395352322-0
            • Opcode ID: 7fb5bdcb26449850706c6a8657b1a8484c585892a968b4d5c930b6f3d690e894
            • Instruction ID: 063fe1cf34c1dabd53a8c7f211a889d5696b9e3dbf11b06e0eb97b4967b90752
            • Opcode Fuzzy Hash: 7fb5bdcb26449850706c6a8657b1a8484c585892a968b4d5c930b6f3d690e894
            • Instruction Fuzzy Hash: 593108B1D01109BFDB159F90DC89AFFB7BCEB18305F00417BE516A2250E6749F89ABA4
            APIs
            • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00478FE7
            • GetWindowLongW.USER32(0162D278,000000F0), ref: 0047901A
            • GetWindowLongW.USER32(0162D278,000000F0), ref: 0047904F
            • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00479081
            • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 004790AB
            • GetWindowLongW.USER32(00000000,000000F0), ref: 004790BC
            • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 004790D6
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: LongWindow$MessageSend
            • String ID:
            • API String ID: 2178440468-0
            • Opcode ID: 81306d96ee600277491daa7b261a06523e5441a6b1e86329408ccf456013d73a
            • Instruction ID: 44b045f0ef0930ba96fcbcb8e7b3b7d3ba8fefbdb91fbc9329cf7876b4d8d95a
            • Opcode Fuzzy Hash: 81306d96ee600277491daa7b261a06523e5441a6b1e86329408ccf456013d73a
            • Instruction Fuzzy Hash: 10315535650254EFDB20CF58EC84FA637A5FB5A314F18817AF9198B2B2CB75AC40CB49
            APIs
            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 004508F2
            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00450918
            • SysAllocString.OLEAUT32(00000000), ref: 0045091B
            • SysAllocString.OLEAUT32(?), ref: 00450939
            • SysFreeString.OLEAUT32(?), ref: 00450942
            • StringFromGUID2.OLE32(?,?,00000028), ref: 00450967
            • SysAllocString.OLEAUT32(?), ref: 00450975
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
            • String ID:
            • API String ID: 3761583154-0
            • Opcode ID: 22569476b5c5f9565cca9bcaa041bc3dca3a49e07179481dcd90e0aee6723d15
            • Instruction ID: 594f5dab861c02f191a105c39804021fb823052c4899a4e2a56f7d68ddca19f8
            • Opcode Fuzzy Hash: 22569476b5c5f9565cca9bcaa041bc3dca3a49e07179481dcd90e0aee6723d15
            • Instruction Fuzzy Hash: 2921B776600219BF9B109F68DC84DAB73ACEB09361B408137FD15DB256D674EC45C768
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: __wcsnicmp
            • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
            • API String ID: 1038674560-2734436370
            • Opcode ID: 45c093bf2f53bc5af7f593c35112265e5ce88033eeb6d0a5182daa07dadb4142
            • Instruction ID: 4e3c2099484cc4284c71c54b119e3f00ec224503fd407637e8ffc7293acd978c
            • Opcode Fuzzy Hash: 45c093bf2f53bc5af7f593c35112265e5ce88033eeb6d0a5182daa07dadb4142
            • Instruction Fuzzy Hash: 45216A3120422577C224E6259E12FBB7398EF67309F60402BFC46A7183E6DD998AC29D
            APIs
            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 004509CB
            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 004509F1
            • SysAllocString.OLEAUT32(00000000), ref: 004509F4
            • SysAllocString.OLEAUT32 ref: 00450A15
            • SysFreeString.OLEAUT32 ref: 00450A1E
            • StringFromGUID2.OLE32(?,?,00000028), ref: 00450A38
            • SysAllocString.OLEAUT32(?), ref: 00450A46
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
            • String ID:
            • API String ID: 3761583154-0
            • Opcode ID: 95dc17a760b10d5afec74670759ed22f130b5c63f2fcdb0e6b579f925751cfba
            • Instruction ID: 9630b70c34caec18fe3de5ed8a9cda8892f6fd31027a52306c474aa1dfd3a614
            • Opcode Fuzzy Hash: 95dc17a760b10d5afec74670759ed22f130b5c63f2fcdb0e6b579f925751cfba
            • Instruction Fuzzy Hash: D3214479600214AFDB10DFA8DC89DAB77ECEF583607448137F909CB266D674EC458768
            APIs
              • Part of subcall function 0042D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0042D1BA
              • Part of subcall function 0042D17C: GetStockObject.GDI32(00000011), ref: 0042D1CE
              • Part of subcall function 0042D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 0042D1D8
            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 0047A32D
            • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0047A33A
            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0047A345
            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 0047A354
            • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 0047A360
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageSend$CreateObjectStockWindow
            • String ID: Msctls_Progress32
            • API String ID: 1025951953-3636473452
            • Opcode ID: 471be34a0dead15add94bce347bd7b1470494fd5a4809487d2fbc4de0d2e29ff
            • Instruction ID: a6f79b76ef04b07bfff84efe33e35ca7a63fa27e44e67f043f82e2276e5356a7
            • Opcode Fuzzy Hash: 471be34a0dead15add94bce347bd7b1470494fd5a4809487d2fbc4de0d2e29ff
            • Instruction Fuzzy Hash: D311E6B1500219BEEF104F61CC85EEB7F6DFF48398F014116FA08A2060C7769C21DBA8
            APIs
            • GetClientRect.USER32(?,?), ref: 0042CCF6
            • GetWindowRect.USER32(?,?), ref: 0042CD37
            • ScreenToClient.USER32(?,?), ref: 0042CD5F
            • GetClientRect.USER32(?,?), ref: 0042CE8C
            • GetWindowRect.USER32(?,?), ref: 0042CEA5
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Rect$Client$Window$Screen
            • String ID:
            • API String ID: 1296646539-0
            • Opcode ID: f2ae933fe1f1f933a7ab06aae9c38ea5b76e480b8cfdacf2f53d5fa5caaebd9d
            • Instruction ID: d102ab9386f73f26710b6f3d18468bd30b47bc1118329047562134597c4fa23c
            • Opcode Fuzzy Hash: f2ae933fe1f1f933a7ab06aae9c38ea5b76e480b8cfdacf2f53d5fa5caaebd9d
            • Instruction Fuzzy Hash: 17B16B79A00259DBDF10CFA9C4807EEB7B1FF08300F55852AEC59EB250DB78A941DB69
            APIs
            • CreateToolhelp32Snapshot.KERNEL32 ref: 00471C18
            • Process32FirstW.KERNEL32(00000000,?), ref: 00471C26
            • __wsplitpath.LIBCMT ref: 00471C54
              • Part of subcall function 00431DFC: __wsplitpath_helper.LIBCMT ref: 00431E3C
            • _wcscat.LIBCMT ref: 00471C69
            • Process32NextW.KERNEL32(00000000,?), ref: 00471CDF
            • CloseHandle.KERNEL32(00000000,?,?,00000002,00000000), ref: 00471CF1
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath__wsplitpath_helper_wcscat
            • String ID:
            • API String ID: 1380811348-0
            • Opcode ID: 9d9f86d56eedee9610f07b0c6b88fadb75964ba0194164bd5461f5ba7075cea8
            • Instruction ID: eeee710a58f921c0b9a63956ee69544376eaffcaf98f86d12222a6219e86b146
            • Opcode Fuzzy Hash: 9d9f86d56eedee9610f07b0c6b88fadb75964ba0194164bd5461f5ba7075cea8
            • Instruction Fuzzy Hash: 53516E715083009FD720DF65D885EABB7ECEF88758F00492EF58997261EB74A904CB9A
            APIs
              • Part of subcall function 00473C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00472BB5,?,?), ref: 00473C1D
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004730AF
            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004730EF
            • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00473112
            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0047313B
            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0047317E
            • RegCloseKey.ADVAPI32(00000000), ref: 0047318B
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue
            • String ID:
            • API String ID: 3451389628-0
            • Opcode ID: 1bbd238de4bf0041223239e409781fdd60622f9bc744c1cb199e47a624dfdbbf
            • Instruction ID: 40ef9c69bc44b8ee681c93ed972ee91a519f477a549e24d5269077bb1bf06b47
            • Opcode Fuzzy Hash: 1bbd238de4bf0041223239e409781fdd60622f9bc744c1cb199e47a624dfdbbf
            • Instruction Fuzzy Hash: CD516A31508340AFC704EF65CC81EAAB7E9FF88318F04892EF55587291DB35EA09DB5A
            APIs
            • GetMenu.USER32(?), ref: 00478540
            • GetMenuItemCount.USER32(00000000), ref: 00478577
            • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 0047859F
            • GetMenuItemID.USER32(?,?), ref: 0047860E
            • GetSubMenu.USER32(?,?), ref: 0047861C
            • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047866D
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Menu$Item$CountMessagePostString
            • String ID:
            • API String ID: 650687236-0
            • Opcode ID: e07690a17bb0ab3a2a3ed3cafd49bacb1a86ab6b668321234924edc63ead3559
            • Instruction ID: 19530940fbbd6aa31235ec4acab9867ada89aa89d000f73d391ee39b18a92dfe
            • Opcode Fuzzy Hash: e07690a17bb0ab3a2a3ed3cafd49bacb1a86ab6b668321234924edc63ead3559
            • Instruction Fuzzy Hash: E051AE31E00218AFCB01EF55C945AEEB7F4EF48314F10846EE919B7351CB78AE418B99
            APIs
            • _memset.LIBCMT ref: 00454B10
            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00454B5B
            • IsMenu.USER32(00000000), ref: 00454B7B
            • CreatePopupMenu.USER32 ref: 00454BAF
            • GetMenuItemCount.USER32(000000FF), ref: 00454C0D
            • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00454C3E
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
            • String ID:
            • API String ID: 3311875123-0
            • Opcode ID: 2b63dfc6f49954188bfa89a1b6f0e94699265d4c72afc2e2158b66af1662d10f
            • Instruction ID: 8cccc56b0a5ba8a79b73ba7fb5720267e866f451b53197ab08ad7aa8a87a8215
            • Opcode Fuzzy Hash: 2b63dfc6f49954188bfa89a1b6f0e94699265d4c72afc2e2158b66af1662d10f
            • Instruction Fuzzy Hash: D951C370601209EFCF25CF64C888BAE7BF4AFC531DF14416AE8159F292D3789989CB59
            APIs
            • select.WSOCK32(00000000,00000001,00000000,00000000,?,000003E8,004ADC00), ref: 00468E7C
            • WSAGetLastError.WSOCK32(00000000), ref: 00468E89
            • __WSAFDIsSet.WSOCK32(00000000,00000001,00000000), ref: 00468EAD
            • #16.WSOCK32(?,?,00000000,00000000), ref: 00468EC5
            • _strlen.LIBCMT ref: 00468EF7
            • WSAGetLastError.WSOCK32(00000000), ref: 00468F6A
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ErrorLast$_strlenselect
            • String ID:
            • API String ID: 2217125717-0
            • Opcode ID: 5b94042169e2cd0fe72681a906b7fbeaa64f2cf2fb05560a765f2f689bfde054
            • Instruction ID: e98a3c2293501dcc16dd877c04e1be54db419d402539c973ba26ddb41fc8cf50
            • Opcode Fuzzy Hash: 5b94042169e2cd0fe72681a906b7fbeaa64f2cf2fb05560a765f2f689bfde054
            • Instruction Fuzzy Hash: 9141C471900204AFC718EBA5CD85EEEB7B9AF58314F10426FF41697291EF38AE40CB59
            APIs
              • Part of subcall function 0042B34E: GetWindowLongW.USER32(?,000000EB), ref: 0042B35F
            • BeginPaint.USER32(?,?,?), ref: 0042AC2A
            • GetWindowRect.USER32(?,?), ref: 0042AC8E
            • ScreenToClient.USER32(?,?), ref: 0042ACAB
            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0042ACBC
            • EndPaint.USER32(?,?,?,?,?), ref: 0042AD06
            • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 0048E673
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: PaintWindow$BeginClientLongRectRectangleScreenViewport
            • String ID:
            • API String ID: 2592858361-0
            • Opcode ID: 181a13cbdeb6ffccdd7f3a54740a8da3979ea52c190c2a359c5a8cb3842bb5fd
            • Instruction ID: 16b1f799ab01326a61263641e354708f97efd90707c0a3daf644d93714222162
            • Opcode Fuzzy Hash: 181a13cbdeb6ffccdd7f3a54740a8da3979ea52c190c2a359c5a8cb3842bb5fd
            • Instruction Fuzzy Hash: 1C41C171604210AFC710DF25EC84F7B7BA8EB59324F04066BFDA4872B1D7389845DB6A
            APIs
            • ShowWindow.USER32(004D1628,00000000,004D1628,00000000,00000000,004D1628,?,0048DC5D,00000000,?,00000000,00000000,00000000,?,0048DAD1,00000004), ref: 0047E40B
            • EnableWindow.USER32(00000000,00000000), ref: 0047E42F
            • ShowWindow.USER32(004D1628,00000000), ref: 0047E48F
            • ShowWindow.USER32(00000000,00000004), ref: 0047E4A1
            • EnableWindow.USER32(00000000,00000001), ref: 0047E4C5
            • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0047E4E8
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Window$Show$Enable$MessageSend
            • String ID:
            • API String ID: 642888154-0
            • Opcode ID: 8a49cfc5e58bf9c0af508c46b2caa7d73e8dc743b6badc790a86dde7919416cd
            • Instruction ID: 60c473f1dae2412b81d5cb13b117225b4c8205eefcca727e4d5a3c319cc33e57
            • Opcode Fuzzy Hash: 8a49cfc5e58bf9c0af508c46b2caa7d73e8dc743b6badc790a86dde7919416cd
            • Instruction Fuzzy Hash: C9415030601140EFDB22CF66C499BD57BE1BF09304F1882FAEA5C9F2A2C735A846CB55
            APIs
            • InterlockedExchange.KERNEL32(?,000001F5), ref: 004598D1
              • Part of subcall function 0042F4EA: std::exception::exception.LIBCMT ref: 0042F51E
              • Part of subcall function 0042F4EA: __CxxThrowException@8.LIBCMT ref: 0042F533
            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00459908
            • EnterCriticalSection.KERNEL32(?), ref: 00459924
            • LeaveCriticalSection.KERNEL32(?), ref: 0045999E
            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 004599B3
            • InterlockedExchange.KERNEL32(?,000001F6), ref: 004599D2
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CriticalExchangeFileInterlockedReadSection$EnterException@8LeaveThrowstd::exception::exception
            • String ID:
            • API String ID: 2537439066-0
            • Opcode ID: ee54717a45b8fb203d103027f74af0bb9010569880f370ba00fba522d1cb6d0d
            • Instruction ID: bd7907beb48af568d1814e86037ffe0377636d98c4181a52f27f309642341ee8
            • Opcode Fuzzy Hash: ee54717a45b8fb203d103027f74af0bb9010569880f370ba00fba522d1cb6d0d
            • Instruction Fuzzy Hash: 4C319E71A00105EBDB00EFA5DD85EAFB778FF45310B1480BAE904AB246D774DE14CBA8
            APIs
            • GetForegroundWindow.USER32(?,?,?,?,?,?,004677F4,?,?,00000000,00000001), ref: 00469B53
              • Part of subcall function 00466544: GetWindowRect.USER32(?,?), ref: 00466557
            • GetDesktopWindow.USER32 ref: 00469B7D
            • GetWindowRect.USER32(00000000), ref: 00469B84
            • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00469BB6
              • Part of subcall function 00457A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00457AD0
            • GetCursorPos.USER32(?), ref: 00469BE2
            • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00469C44
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
            • String ID:
            • API String ID: 4137160315-0
            • Opcode ID: eb4a9ac9355f861299333d312c766a7f708d58b2715876fd17d3ed5f277f3a9c
            • Instruction ID: 9b14e006236711f556fc2e69f31f918ac39a34fa935f8aec69d334e2ddb835b3
            • Opcode Fuzzy Hash: eb4a9ac9355f861299333d312c766a7f708d58b2715876fd17d3ed5f277f3a9c
            • Instruction Fuzzy Hash: 1131BC72504315ABC710DF549849A9BB7EDFF88314F00092BF995D7282EA75EE088B96
            APIs
            • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 0044AFAE
            • OpenProcessToken.ADVAPI32(00000000), ref: 0044AFB5
            • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 0044AFC4
            • CloseHandle.KERNEL32(00000004), ref: 0044AFCF
            • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0044AFFE
            • DestroyEnvironmentBlock.USERENV(00000000), ref: 0044B012
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
            • String ID:
            • API String ID: 1413079979-0
            • Opcode ID: f048e7757aa7f2966121d914fb99b27bef2a97c8dc4e30231f8459326e23c76c
            • Instruction ID: 0e5b8cbf56253c6dc5e9ddc14b08cd5549672edfb62db7fd229d3ee7c2667599
            • Opcode Fuzzy Hash: f048e7757aa7f2966121d914fb99b27bef2a97c8dc4e30231f8459326e23c76c
            • Instruction Fuzzy Hash: C3215072540209AFEF118F94DD49FAF7BA9EF44309F044066FE01A2161C37ADD25DB65
            APIs
              • Part of subcall function 0042AF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 0042AFE3
              • Part of subcall function 0042AF83: SelectObject.GDI32(?,00000000), ref: 0042AFF2
              • Part of subcall function 0042AF83: BeginPath.GDI32(?), ref: 0042B009
              • Part of subcall function 0042AF83: SelectObject.GDI32(?,00000000), ref: 0042B033
            • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 0047EC20
            • LineTo.GDI32(00000000,00000003,?), ref: 0047EC34
            • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0047EC42
            • LineTo.GDI32(00000000,00000000,?), ref: 0047EC52
            • EndPath.GDI32(00000000), ref: 0047EC62
            • StrokePath.GDI32(00000000), ref: 0047EC72
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
            • String ID:
            • API String ID: 43455801-0
            • Opcode ID: fefcb5e1aaad5f01872865216f0045cef4df3c377b27879f16a9ff8284b6ad34
            • Instruction ID: 5bb9fd6c92001b3d92cc7171d14594b3c86774f480cb19bd5268fd5f32608b54
            • Opcode Fuzzy Hash: fefcb5e1aaad5f01872865216f0045cef4df3c377b27879f16a9ff8284b6ad34
            • Instruction Fuzzy Hash: 2A113572400148BFEB029F90DD88EEA7F6DEB08354F048122BE088A160C7719D55DBA4
            APIs
            • GetDC.USER32(00000000), ref: 0044E1C0
            • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044E1D1
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044E1D8
            • ReleaseDC.USER32(00000000,00000000), ref: 0044E1E0
            • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0044E1F7
            • MulDiv.KERNEL32(000009EC,?,?), ref: 0044E209
              • Part of subcall function 00449AA3: RaiseException.KERNEL32(-C0000018,00000001,00000000,00000000,00449A05,00000000,00000000,?,00449DDB), ref: 0044A53A
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CapsDevice$ExceptionRaiseRelease
            • String ID:
            • API String ID: 603618608-0
            • Opcode ID: fc51bdcd124abd5b448d23094d9d8916722677f4bdfafa9699922e2857f6d9bb
            • Instruction ID: f7c22d356b85a6d8d89bd4551227041ecab2d391f29f01325b44250d0d17e875
            • Opcode Fuzzy Hash: fc51bdcd124abd5b448d23094d9d8916722677f4bdfafa9699922e2857f6d9bb
            • Instruction Fuzzy Hash: 18018FB5E40314BFEB109BA68C45F5EBFB8EB58351F004077EA04A7390D6709C00CBA4
            APIs
            • __init_pointers.LIBCMT ref: 00437B47
              • Part of subcall function 0043123A: __initp_misc_winsig.LIBCMT ref: 0043125E
              • Part of subcall function 0043123A: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00437F51
              • Part of subcall function 0043123A: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00437F65
              • Part of subcall function 0043123A: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00437F78
              • Part of subcall function 0043123A: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00437F8B
              • Part of subcall function 0043123A: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00437F9E
              • Part of subcall function 0043123A: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00437FB1
              • Part of subcall function 0043123A: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00437FC4
              • Part of subcall function 0043123A: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00437FD7
              • Part of subcall function 0043123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00437FEA
              • Part of subcall function 0043123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00437FFD
              • Part of subcall function 0043123A: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00438010
              • Part of subcall function 0043123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00438023
              • Part of subcall function 0043123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00438036
              • Part of subcall function 0043123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00438049
              • Part of subcall function 0043123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 0043805C
              • Part of subcall function 0043123A: GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 0043806F
            • __mtinitlocks.LIBCMT ref: 00437B4C
              • Part of subcall function 00437E23: InitializeCriticalSectionAndSpinCount.KERNEL32(004CAC68,00000FA0,?,?,00437B51,00435E77,004C6C70,00000014), ref: 00437E41
            • __mtterm.LIBCMT ref: 00437B55
              • Part of subcall function 00437BBD: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00437B5A,00435E77,004C6C70,00000014), ref: 00437D3F
              • Part of subcall function 00437BBD: _free.LIBCMT ref: 00437D46
              • Part of subcall function 00437BBD: DeleteCriticalSection.KERNEL32(004CAC68,?,?,00437B5A,00435E77,004C6C70,00000014), ref: 00437D68
            • __calloc_crt.LIBCMT ref: 00437B7A
            • GetCurrentThreadId.KERNEL32 ref: 00437BA3
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: AddressProc$CriticalSection$Delete$CountCurrentHandleInitializeModuleSpinThread__calloc_crt__init_pointers__initp_misc_winsig__mtinitlocks__mtterm_free
            • String ID:
            • API String ID: 2942034483-0
            • Opcode ID: 67e6c5dfb2da6558798e7718db0c7c99d6f1a0292634c551d28df6d55387eb99
            • Instruction ID: 548754dfd7c851cd1a2cf7c37750f3d5e3eec4a3a8fbb2e7386ae0be92b1b257
            • Opcode Fuzzy Hash: 67e6c5dfb2da6558798e7718db0c7c99d6f1a0292634c551d28df6d55387eb99
            • Instruction Fuzzy Hash: 08F0F6B210C3121AE63477757C07A4B66A09F0933CF2026AFF8E0E51D2FF2C9801846C
            APIs
            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 0041281D
            • MapVirtualKeyW.USER32(00000010,00000000), ref: 00412825
            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00412830
            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 0041283B
            • MapVirtualKeyW.USER32(00000011,00000000), ref: 00412843
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0041284B
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Virtual
            • String ID:
            • API String ID: 4278518827-0
            • Opcode ID: 5c166744af79c174bebaf424790f6b5fab5d70a3745e2548d394e23d8f553ec3
            • Instruction ID: 990e023599759efa2dff2b4c09627cb25c256f2aaac6b5a0f23f82501a04f3e5
            • Opcode Fuzzy Hash: 5c166744af79c174bebaf424790f6b5fab5d70a3745e2548d394e23d8f553ec3
            • Instruction Fuzzy Hash: AF0167B1902B5ABDE3008F6A8C85B56FFA8FF59354F00411BA15C47A42C7F5A864CBE5
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CriticalExchangeInterlockedSection$EnterLeaveObjectSingleTerminateThreadWait
            • String ID:
            • API String ID: 1423608774-0
            • Opcode ID: 9fb2e55531b3c44e2f55b0e5dad874ff2e382aa3ba42ffb74d5a796c196d481c
            • Instruction ID: 6adea6fe9b8a62a6e78e1b98b767a51795249ac439d6aa139e7ba477795de600
            • Opcode Fuzzy Hash: 9fb2e55531b3c44e2f55b0e5dad874ff2e382aa3ba42ffb74d5a796c196d481c
            • Instruction Fuzzy Hash: 4101A432602212EBDB291B64ED48DEF7769FF98703B44047BF903921A1DB789C05DB68
            APIs
            • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00457C07
            • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00457C1D
            • GetWindowThreadProcessId.USER32(?,?), ref: 00457C2C
            • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00457C3B
            • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00457C45
            • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00457C4C
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
            • String ID:
            • API String ID: 839392675-0
            • Opcode ID: f6ad88b1a3ad5c49eeb95902f1715f1629045e5f9dc0143e057d609260a0354e
            • Instruction ID: b68922bbca4e27251270d201775925268a3074792631bf44d15757968fe88865
            • Opcode Fuzzy Hash: f6ad88b1a3ad5c49eeb95902f1715f1629045e5f9dc0143e057d609260a0354e
            • Instruction Fuzzy Hash: 93F03A72A41158BBE7215B629C0EEEF7B7CEFD6B11F00003AFA0291051D7A45E41C6B9
            APIs
            • InterlockedExchange.KERNEL32(?,?), ref: 00459A33
            • EnterCriticalSection.KERNEL32(?,?,?,?,00485DEE,?,?,?,?,?,0041ED63), ref: 00459A44
            • TerminateThread.KERNEL32(?,000001F6,?,?,?,00485DEE,?,?,?,?,?,0041ED63), ref: 00459A51
            • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00485DEE,?,?,?,?,?,0041ED63), ref: 00459A5E
              • Part of subcall function 004593D1: CloseHandle.KERNEL32(?,?,00459A6B,?,?,?,00485DEE,?,?,?,?,?,0041ED63), ref: 004593DB
            • InterlockedExchange.KERNEL32(?,000001F6), ref: 00459A71
            • LeaveCriticalSection.KERNEL32(?,?,?,?,00485DEE,?,?,?,?,?,0041ED63), ref: 00459A78
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
            • String ID:
            • API String ID: 3495660284-0
            • Opcode ID: 80446005868f2929a97ead8cd739233718d4be508c3f0d0019ac45ac171b1e09
            • Instruction ID: 2151a8c4ce89b76bc4952af1c1a9d542f5f111c3d5eac9028e67219dd5e2f6be
            • Opcode Fuzzy Hash: 80446005868f2929a97ead8cd739233718d4be508c3f0d0019ac45ac171b1e09
            • Instruction Fuzzy Hash: 8AF05832941211EBD7112BA4ED89EAB7729FF99302F140477FA03A10A5DBB99C05DB68
            APIs
              • Part of subcall function 0042F4EA: std::exception::exception.LIBCMT ref: 0042F51E
              • Part of subcall function 0042F4EA: __CxxThrowException@8.LIBCMT ref: 0042F533
            • __swprintf.LIBCMT ref: 00411EA6
            Strings
            • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00411D49
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Exception@8Throw__swprintfstd::exception::exception
            • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
            • API String ID: 2125237772-557222456
            • Opcode ID: aabbb842e347173a2d0ce560739b51f76ab1660ce423522a8b6b9a14e79d35b8
            • Instruction ID: ec2db4e6ef85697718ac53a897e2636c93cf350fc970fa8692e7d3e6e470568e
            • Opcode Fuzzy Hash: aabbb842e347173a2d0ce560739b51f76ab1660ce423522a8b6b9a14e79d35b8
            • Instruction Fuzzy Hash: 2C91CC71504301AFCB24EF25C885CAFB7A4AF85704F00491FF985972A1DB78ED85CBAA
            APIs
            • VariantInit.OLEAUT32(?), ref: 0046B006
            • CharUpperBuffW.USER32(?,?), ref: 0046B115
            • VariantClear.OLEAUT32(?), ref: 0046B298
              • Part of subcall function 00459DC5: VariantInit.OLEAUT32(00000000), ref: 00459E05
              • Part of subcall function 00459DC5: VariantCopy.OLEAUT32(?,?), ref: 00459E0E
              • Part of subcall function 00459DC5: VariantClear.OLEAUT32(?), ref: 00459E1A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Variant$ClearInit$BuffCharCopyUpper
            • String ID: AUTOIT.ERROR$Incorrect Parameter format
            • API String ID: 4237274167-1221869570
            • Opcode ID: e4baae0354ef2aafc1341785997d7e2af73d7d94d286ba1645c18fb32aa12ff3
            • Instruction ID: c6a415b3259b8fb9da5ea4b88d6e6932c92aed77063e7236d752eeeb76e80d55
            • Opcode Fuzzy Hash: e4baae0354ef2aafc1341785997d7e2af73d7d94d286ba1645c18fb32aa12ff3
            • Instruction Fuzzy Hash: 7F917C706083019FC710DF25D49499BBBE4EF89704F04486EF89ACB352EB35E985CB96
            APIs
              • Part of subcall function 0042C6F4: _wcscpy.LIBCMT ref: 0042C717
            • _memset.LIBCMT ref: 00455438
            • GetMenuItemInfoW.USER32(?), ref: 00455467
            • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00455513
            • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0045553D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ItemMenu$Info$Default_memset_wcscpy
            • String ID: 0
            • API String ID: 4152858687-4108050209
            • Opcode ID: 707295b15cb05d2f8d195b57d525c611bd3d8ee11848401c4ff97befadc94945
            • Instruction ID: 7071df060fee197f5b9f9c6a0ff18dbecd001ab1fb3d2ffc961bf0295a7af8ec
            • Opcode Fuzzy Hash: 707295b15cb05d2f8d195b57d525c611bd3d8ee11848401c4ff97befadc94945
            • Instruction Fuzzy Hash: E7512531604701ABD7149B28C8607BBB7E4AF85366F04062FFC95D32E2E768DD48874A
            APIs
            • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0045027B
            • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 004502B1
            • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 004502C2
            • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00450344
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ErrorMode$AddressCreateInstanceProc
            • String ID: DllGetClassObject
            • API String ID: 753597075-1075368562
            • Opcode ID: ceaa89672503ea7794a179777f271867eceb38e3785dddb962b57decbeb20a9c
            • Instruction ID: 26bbc360f214d97315334a572fc61f64827ff65cb58fc8c607f05a5c25fa89d2
            • Opcode Fuzzy Hash: ceaa89672503ea7794a179777f271867eceb38e3785dddb962b57decbeb20a9c
            • Instruction Fuzzy Hash: 62418F75A00204EFDB15CF54C885B9A7BB9EF44315B1480AEED099F206D7B8D948CBA8
            APIs
            • _memset.LIBCMT ref: 00455075
            • GetMenuItemInfoW.USER32 ref: 00455091
            • DeleteMenu.USER32(00000004,00000007,00000000), ref: 004550D7
            • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,004D1708,00000000), ref: 00455120
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Menu$Delete$InfoItem_memset
            • String ID: 0
            • API String ID: 1173514356-4108050209
            • Opcode ID: 4c3acf4bcfc11ed1ccc0d67feffed67a2fbe6eb298ab361fb575bb0a0f19cb51
            • Instruction ID: d470c8b975c184d108498aa61d7873ba2f566148544dcd45d25e99fe461074ee
            • Opcode Fuzzy Hash: 4c3acf4bcfc11ed1ccc0d67feffed67a2fbe6eb298ab361fb575bb0a0f19cb51
            • Instruction Fuzzy Hash: A2419E30604B01AFD7109F25D894B6BBBE4AF85329F04462FFC5597392D734A808CB6A
            APIs
            • CharLowerBuffW.USER32(?,?,?,?), ref: 00470587
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: BuffCharLower
            • String ID: cdecl$none$stdcall$winapi
            • API String ID: 2358735015-567219261
            • Opcode ID: a8a99dfe1a7164a31941fed2ae71327287d8672afde2d6231cf31d2859089f01
            • Instruction ID: be02c713cb2e09a604c918e7837c6d2637c843dd3e5b66da9e9574242ef09d0b
            • Opcode Fuzzy Hash: a8a99dfe1a7164a31941fed2ae71327287d8672afde2d6231cf31d2859089f01
            • Instruction Fuzzy Hash: F531A370600216ABCF00DF56DD51AEEB3B4FF54314B10862FE426A72D1DB79A915CB88
            APIs
            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 0044B88E
            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 0044B8A1
            • SendMessageW.USER32(?,00000189,?,00000000), ref: 0044B8D1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: ComboBox$ListBox
            • API String ID: 3850602802-1403004172
            • Opcode ID: f16aabdc9980421c20ac7038df8287ca394ced33ebfc7878f5874b81001e1835
            • Instruction ID: cf04bb12f4fa3bbc42d04eaf4cf7b62a3fed861ea4aab09a759ac43952ce3e21
            • Opcode Fuzzy Hash: f16aabdc9980421c20ac7038df8287ca394ced33ebfc7878f5874b81001e1835
            • Instruction Fuzzy Hash: 1C21E175A00208BFEB04AB65DC86EFF7778DF55358B10412FF021A21E1DB7C9D4A96A8
            APIs
            • _memset.LIBCMT ref: 0041522F
            • _wcscpy.LIBCMT ref: 00415283
            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00415293
            • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00483CB0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: IconLoadNotifyShell_String_memset_wcscpy
            • String ID: Line:
            • API String ID: 1053898822-1585850449
            • Opcode ID: 15d8ea5e04f90963806108202341e39d57648780aa1e24a714f1ab396edb61e6
            • Instruction ID: 6b2717bb7cee4c69ba3a10ee91ded326ac5a325e64224d63b6fe6a89c8ee4841
            • Opcode Fuzzy Hash: 15d8ea5e04f90963806108202341e39d57648780aa1e24a714f1ab396edb61e6
            • Instruction Fuzzy Hash: 0E319271509740BAD321EB60EC46FDF77D8AB84314F00492FF585921A1DB78A5888B9E
            APIs
            • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00464401
            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00464427
            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00464457
            • InternetCloseHandle.WININET(00000000), ref: 0046449E
              • Part of subcall function 00465052: GetLastError.KERNEL32(?,?,004643CC,00000000,00000000,00000001), ref: 00465067
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: HttpInternet$CloseErrorHandleInfoLastOpenQueryRequestSend
            • String ID:
            • API String ID: 1951874230-3916222277
            • Opcode ID: 7e18acbda86bad11616689e970cd7b63fca90a838ecb4d52c5780330d2cbbbe3
            • Instruction ID: c758ba6d483fdca144a84615857f594f268484de12e501bad2c20adce6a2eae7
            • Opcode Fuzzy Hash: 7e18acbda86bad11616689e970cd7b63fca90a838ecb4d52c5780330d2cbbbe3
            • Instruction Fuzzy Hash: 002180B1500208BFEB119F95CC86EBB76ECEB88758F10842BF10592240EE688D05977A
            APIs
              • Part of subcall function 0042D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0042D1BA
              • Part of subcall function 0042D17C: GetStockObject.GDI32(00000011), ref: 0042D1CE
              • Part of subcall function 0042D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 0042D1D8
            • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 0047915C
            • LoadLibraryW.KERNEL32(?), ref: 00479163
            • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00479178
            • DestroyWindow.USER32(?), ref: 00479180
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
            • String ID: SysAnimate32
            • API String ID: 4146253029-1011021900
            • Opcode ID: 7bf1340b4b3b6b230f60eeb8d24aeabd133444143279dca94d21f5022c725fb7
            • Instruction ID: 31f551eb5499d6621841e7ed13b2e5c5108b29f04c9e745c5a568076e96d13c6
            • Opcode Fuzzy Hash: 7bf1340b4b3b6b230f60eeb8d24aeabd133444143279dca94d21f5022c725fb7
            • Instruction Fuzzy Hash: D5218371600206BBFF104E64DC45EFB37A9EB95364F50862AF91892290C735DC61A768
            APIs
            • GetStdHandle.KERNEL32(0000000C), ref: 00459588
            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 004595B9
            • GetStdHandle.KERNEL32(0000000C), ref: 004595CB
            • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00459605
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CreateHandle$FilePipe
            • String ID: nul
            • API String ID: 4209266947-2873401336
            • Opcode ID: 3cdebb62f400d7104a5a8519de99e7a064aa0b18212379889e6566c9d60764e5
            • Instruction ID: dc68a005a136ac1b178f87e9998bccd0027ae0321cba0e9c797cc237afe5388b
            • Opcode Fuzzy Hash: 3cdebb62f400d7104a5a8519de99e7a064aa0b18212379889e6566c9d60764e5
            • Instruction Fuzzy Hash: 2921D171500209EBDB209F25CC04A9E77E4AF54321F204A2AFCA1D73D1E778DD58CB18
            APIs
            • GetStdHandle.KERNEL32(000000F6), ref: 00459653
            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00459683
            • GetStdHandle.KERNEL32(000000F6), ref: 00459694
            • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 004596CE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CreateHandle$FilePipe
            • String ID: nul
            • API String ID: 4209266947-2873401336
            • Opcode ID: ff56116bfd015a0e71d5d73127ac12ddca08d04eb6ccbf3e65f0e2b018c5ceef
            • Instruction ID: 9f252e3c6dce64bec9557d34588c2e401567fffafb6d60c6a463a4f35a088ddc
            • Opcode Fuzzy Hash: ff56116bfd015a0e71d5d73127ac12ddca08d04eb6ccbf3e65f0e2b018c5ceef
            • Instruction Fuzzy Hash: F621A171500205EBDB209F69CC04E9A77E8AF55725F200A2AFCA1D33D1D7789C4DCB19
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045DB0A
            • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0045DB5E
            • __swprintf.LIBCMT ref: 0045DB77
            • SetErrorMode.KERNEL32(00000000,00000001,00000000,004ADC00), ref: 0045DBB5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ErrorMode$InformationVolume__swprintf
            • String ID: %lu
            • API String ID: 3164766367-685833217
            • Opcode ID: 1a63af3208143de0b618d9d1517732db48684f0235a4ec0c0efe494ef2ec6676
            • Instruction ID: 985dc9cdc5342d2d6866d4e6c4a521e449c2abd12a23b5a691f0006b2d3877cb
            • Opcode Fuzzy Hash: 1a63af3208143de0b618d9d1517732db48684f0235a4ec0c0efe494ef2ec6676
            • Instruction Fuzzy Hash: D021B335A00208AFCB10EF65DD85EEEB7B8EF49708B10406AF905D7251DB74EA45CB68
            APIs
              • Part of subcall function 0044C82D: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0044C84A
              • Part of subcall function 0044C82D: GetWindowThreadProcessId.USER32(?,00000000), ref: 0044C85D
              • Part of subcall function 0044C82D: GetCurrentThreadId.KERNEL32 ref: 0044C864
              • Part of subcall function 0044C82D: AttachThreadInput.USER32(00000000), ref: 0044C86B
            • GetFocus.USER32 ref: 0044CA05
              • Part of subcall function 0044C876: GetParent.USER32(?), ref: 0044C884
            • GetClassNameW.USER32(?,?,00000100), ref: 0044CA4E
            • EnumChildWindows.USER32(?,0044CAC4), ref: 0044CA76
            • __swprintf.LIBCMT ref: 0044CA90
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf
            • String ID: %s%d
            • API String ID: 3187004680-1110647743
            • Opcode ID: 90aeb950a0279cf853540f36864cf2260ece180d1714973b9b69090a2e3d47cf
            • Instruction ID: 337674949166593d0cfc0d10ca0b4887febf2d4ebebe367b03156141f47cd7f6
            • Opcode Fuzzy Hash: 90aeb950a0279cf853540f36864cf2260ece180d1714973b9b69090a2e3d47cf
            • Instruction Fuzzy Hash: D611B4715002057BEB41BF618CC5FEA7778AF55718F04407BFE09AA182DB789945CB78
            APIs
            • __lock.LIBCMT ref: 00437AD8
              • Part of subcall function 00437CF4: __mtinitlocknum.LIBCMT ref: 00437D06
              • Part of subcall function 00437CF4: EnterCriticalSection.KERNEL32(00000000,?,00437ADD,0000000D), ref: 00437D1F
            • InterlockedIncrement.KERNEL32(?), ref: 00437AE5
            • __lock.LIBCMT ref: 00437AF9
            • ___addlocaleref.LIBCMT ref: 00437B17
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: __lock$CriticalEnterIncrementInterlockedSection___addlocaleref__mtinitlocknum
            • String ID: `I
            • API String ID: 1687444384-1097155026
            • Opcode ID: 5c3daa0fe94c8260df0bd6faaa9ea327eba53d889ae39cddc8bc156e87cf4760
            • Instruction ID: 6754b5ef64742951b2c0705554d5123d6e8264e13ace1faf61660e6d1fc557e5
            • Opcode Fuzzy Hash: 5c3daa0fe94c8260df0bd6faaa9ea327eba53d889ae39cddc8bc156e87cf4760
            • Instruction Fuzzy Hash: 5D015EB5504701EED731DF76C90574AF7F0AF54329F20990FA4D6972A0CB78A644CB49
            APIs
            • _memset.LIBCMT ref: 0047E33D
            • _memset.LIBCMT ref: 0047E34C
            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,004D3D00,004D3D44), ref: 0047E37B
            • CloseHandle.KERNEL32 ref: 0047E38D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: _memset$CloseCreateHandleProcess
            • String ID: D=M
            • API String ID: 3277943733-3931605405
            • Opcode ID: 7797c68df051fd3cc790d89f96b2c871d3851cbcc360b811748a9a6b2687577a
            • Instruction ID: d08d992745afccacb3b8b0cd3f5a681ae48a9adde426758d2a899a44ba7bf27d
            • Opcode Fuzzy Hash: 7797c68df051fd3cc790d89f96b2c871d3851cbcc360b811748a9a6b2687577a
            • Instruction Fuzzy Hash: BAF05EF1641304BAE2105F65AC55F777F9DDB08756F008433BE08D62A2D3799E008AAE
            APIs
            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 004719F3
            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00471A26
            • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00471B49
            • CloseHandle.KERNEL32(?), ref: 00471BBF
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Process$CloseCountersHandleInfoMemoryOpen
            • String ID:
            • API String ID: 2364364464-0
            • Opcode ID: 49522e053124adb278f8dcf1b9097c52c78cddf57f45d71c3d6aa57846ce70cd
            • Instruction ID: fa7a296d99a476a86a2da45024a0719a2f8e20199fad8375743f7a6091745bc8
            • Opcode Fuzzy Hash: 49522e053124adb278f8dcf1b9097c52c78cddf57f45d71c3d6aa57846ce70cd
            • Instruction Fuzzy Hash: B0818771700214ABDF109F65C886BAEBBF5AF04724F14C45AF905AF392D7B8A941CF98
            APIs
            • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0047E1D5
            • SendMessageW.USER32(?,000000B0,?,?), ref: 0047E20D
            • IsDlgButtonChecked.USER32(?,00000001), ref: 0047E248
            • GetWindowLongW.USER32(?,000000EC), ref: 0047E269
            • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0047E281
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageSend$ButtonCheckedLongWindow
            • String ID:
            • API String ID: 3188977179-0
            • Opcode ID: 753d6f1d92c134a526e18df4e5ff3a92b815d413ecc91364ccdb78d503043984
            • Instruction ID: e5de18613c4fa255ceab341328fb5b049988bc7db19e8eecb5530453eb2f3cd8
            • Opcode Fuzzy Hash: 753d6f1d92c134a526e18df4e5ff3a92b815d413ecc91364ccdb78d503043984
            • Instruction Fuzzy Hash: 46618134A00244AFDB20CF16C855FEA77BAEB4D300F5482EBE959973A1C779AD40CB19
            APIs
            • VariantInit.OLEAUT32(?), ref: 00451CB4
            • VariantClear.OLEAUT32(00000013), ref: 00451D26
            • VariantClear.OLEAUT32(00000000), ref: 00451D81
            • VariantClear.OLEAUT32(?), ref: 00451DF8
            • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00451E26
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Variant$Clear$ChangeInitType
            • String ID:
            • API String ID: 4136290138-0
            • Opcode ID: c34c68d8a981908d916abac5c616c0c141d0db5fef4a6e3667bb1f5e8b8b6258
            • Instruction ID: 01a14437ce13b90a8bf347915368b7b63144ffd9b614d2ff738383f043730fa0
            • Opcode Fuzzy Hash: c34c68d8a981908d916abac5c616c0c141d0db5fef4a6e3667bb1f5e8b8b6258
            • Instruction Fuzzy Hash: DE516AB5A00209AFCB14CF58C880AAAB7B9FF4C314B15856AED49DB311D334E915CFA4
            APIs
              • Part of subcall function 0041936C: __swprintf.LIBCMT ref: 004193AB
              • Part of subcall function 0041936C: __itow.LIBCMT ref: 004193DF
            • LoadLibraryW.KERNEL32(?,00000004,?,?), ref: 004706EE
            • GetProcAddress.KERNEL32(00000000,?), ref: 0047077D
            • GetProcAddress.KERNEL32(00000000,00000000), ref: 0047079B
            • GetProcAddress.KERNEL32(00000000,?), ref: 004707E1
            • FreeLibrary.KERNEL32(00000000,00000004), ref: 004707FB
              • Part of subcall function 0042E65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,0045A574,?,?,00000000,00000008), ref: 0042E675
              • Part of subcall function 0042E65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,0045A574,?,?,00000000,00000008), ref: 0042E699
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
            • String ID:
            • API String ID: 327935632-0
            • Opcode ID: 273db6b2783379f2b0a7fff79e030fc983e3c7db2a3485b81e51e00c1f92c82e
            • Instruction ID: 11bdea1872083ca0d5b45e5852a417aa24bc98c86857839b915944f4755cece6
            • Opcode Fuzzy Hash: 273db6b2783379f2b0a7fff79e030fc983e3c7db2a3485b81e51e00c1f92c82e
            • Instruction Fuzzy Hash: 23515A75A00205DFCB04EFA9C4819EDB7B5BF18314B04C06AE919AB352DB38ED46CB89
            APIs
              • Part of subcall function 00473C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00472BB5,?,?), ref: 00473C1D
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00472EEF
            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00472F2E
            • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00472F75
            • RegCloseKey.ADVAPI32(?,?), ref: 00472FA1
            • RegCloseKey.ADVAPI32(00000000), ref: 00472FAE
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Close$BuffCharConnectEnumOpenRegistryUpper
            • String ID:
            • API String ID: 3740051246-0
            • Opcode ID: 47e4933436c6ab4d64015885371e49b69c48d1cc5a73b0fccede704402c06752
            • Instruction ID: db6a2c6f5039ba3f6f963ac921372b76787664bba8147ee126b5c2171925493d
            • Opcode Fuzzy Hash: 47e4933436c6ab4d64015885371e49b69c48d1cc5a73b0fccede704402c06752
            • Instruction Fuzzy Hash: 00514B71608204AFD704EF55C981EAAB7F8FF88308F00882EF59997291DB74E945DB5A
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3cd0c014333a077a2251baec4d94aef24cb0927a46c0965b69e810dbd69840b2
            • Instruction ID: 6bd86e76cd5f0e308c191d645a4555045575542be1b12196704537cc7de98286
            • Opcode Fuzzy Hash: 3cd0c014333a077a2251baec4d94aef24cb0927a46c0965b69e810dbd69840b2
            • Instruction Fuzzy Hash: 6941C439D00204ABC724DB68CC84FEA7B69EB49310F14817BF85DA72E1C738AD41D698
            APIs
            • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 004612B4
            • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 004612DD
            • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0046131C
              • Part of subcall function 0041936C: __swprintf.LIBCMT ref: 004193AB
              • Part of subcall function 0041936C: __itow.LIBCMT ref: 004193DF
            • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00461341
            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00461349
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
            • String ID:
            • API String ID: 1389676194-0
            • Opcode ID: dad89df7136e81ca585883126d843f8ceb4f65252e1a50ea9d0a8751835f4763
            • Instruction ID: 33f73bd1882a4a67d9b988f53d464e19bfe3fd2721ae18fe6635cdf8a75cdb0c
            • Opcode Fuzzy Hash: dad89df7136e81ca585883126d843f8ceb4f65252e1a50ea9d0a8751835f4763
            • Instruction Fuzzy Hash: E0415E35A00109DFCF01EF65C9919AEBBF5FF08314B1480AAE916AB3A1DB35EE41CB55
            APIs
            • GetCursorPos.USER32(000000FF), ref: 0042B64F
            • ScreenToClient.USER32(00000000,000000FF), ref: 0042B66C
            • GetAsyncKeyState.USER32(00000001), ref: 0042B691
            • GetAsyncKeyState.USER32(00000002), ref: 0042B69F
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: AsyncState$ClientCursorScreen
            • String ID:
            • API String ID: 4210589936-0
            • Opcode ID: 46a20e0b829701043e2736b878e9f183f022ab2c619eb77a840fa27f342466a7
            • Instruction ID: ea5c49bc6a045c20aae30325ea5466259c30a1778b078819c2208b4997576a75
            • Opcode Fuzzy Hash: 46a20e0b829701043e2736b878e9f183f022ab2c619eb77a840fa27f342466a7
            • Instruction Fuzzy Hash: E7416131A04115BBCF159F65C844AEDBB74FF05324F10432BE929A62D0C738AD94EFAA
            APIs
            • GetWindowRect.USER32(?,?), ref: 0044B369
            • PostMessageW.USER32(?,00000201,00000001), ref: 0044B413
            • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 0044B41B
            • PostMessageW.USER32(?,00000202,00000000), ref: 0044B429
            • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 0044B431
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessagePostSleep$RectWindow
            • String ID:
            • API String ID: 3382505437-0
            • Opcode ID: 36505326f1787a1ab3289ef5a899208ee0989691f03bb790603c7d180b40fbec
            • Instruction ID: c6114021cf268e49b295ca73ad896ea605345acbffbf748d5dc20f77651af5d8
            • Opcode Fuzzy Hash: 36505326f1787a1ab3289ef5a899208ee0989691f03bb790603c7d180b40fbec
            • Instruction Fuzzy Hash: 2331DF71900219EBEF04CF68DD4DA9E3BB5EB44319F10422AF921AB2D1C3B4DD14CB95
            APIs
            • IsWindowVisible.USER32(?), ref: 0044DBD7
            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0044DBF4
            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0044DC2C
            • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0044DC52
            • _wcsstr.LIBCMT ref: 0044DC5C
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
            • String ID:
            • API String ID: 3902887630-0
            • Opcode ID: 37fe82f4b490a4516b23310d0b819ac787e4d778e8c7b78592c8d6fb5921b0b3
            • Instruction ID: a63f65483251d1d600654efb090371a79eac5aceaae257911f0fad0348c612f3
            • Opcode Fuzzy Hash: 37fe82f4b490a4516b23310d0b819ac787e4d778e8c7b78592c8d6fb5921b0b3
            • Instruction Fuzzy Hash: 4C212672A04240BBFB159F399D89E7B7BA8DF45750F10403FF809CA191EAA9DC41D2A8
            APIs
            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0044BC90
            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0044BCC2
            • __itow.LIBCMT ref: 0044BCDA
            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0044BD00
            • __itow.LIBCMT ref: 0044BD11
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageSend$__itow
            • String ID:
            • API String ID: 3379773720-0
            • Opcode ID: 45d5808e2f432aba9ebe24e21ce915c2c9c62a350d7d0d3995e74220ac8d06da
            • Instruction ID: 4081deab4f8184e485d69a1ed8f3105ce05963a3b3e38087a93fdd6c4841812b
            • Opcode Fuzzy Hash: 45d5808e2f432aba9ebe24e21ce915c2c9c62a350d7d0d3995e74220ac8d06da
            • Instruction Fuzzy Hash: D921DA75A003047AEB10AA658D86FDF7A68EF99314F00106BF906EB181DB68CD4547E9
            APIs
              • Part of subcall function 004150E6: _wcsncpy.LIBCMT ref: 004150FA
            • GetFileAttributesW.KERNEL32(?,?,?,?,004560C3), ref: 00456369
            • GetLastError.KERNEL32(?,?,?,004560C3), ref: 00456374
            • CreateDirectoryW.KERNEL32(?,00000000,?,?,?,004560C3), ref: 00456388
            • _wcsrchr.LIBCMT ref: 004563AA
              • Part of subcall function 00456318: CreateDirectoryW.KERNEL32(?,00000000,?,?,?,004560C3), ref: 004563E0
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CreateDirectory$AttributesErrorFileLast_wcsncpy_wcsrchr
            • String ID:
            • API String ID: 3633006590-0
            • Opcode ID: e8a9948f12555be78f035a8573176f37e59ebdbe5bacffc420a6cc6622af19b6
            • Instruction ID: a4d20869ffd47c14adb474a37beda6fb6fff047a4a22529e56530f8073d245dc
            • Opcode Fuzzy Hash: e8a9948f12555be78f035a8573176f37e59ebdbe5bacffc420a6cc6622af19b6
            • Instruction Fuzzy Hash: 0221F93190421556DB25AB74AC42FEB236CAF193A2F91007FFC05C31C2EB6C99898A5D
            APIs
              • Part of subcall function 0046A82C: inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 0046A84E
            • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00468BD3
            • WSAGetLastError.WSOCK32(00000000), ref: 00468BE2
            • connect.WSOCK32(00000000,?,00000010), ref: 00468BFE
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ErrorLastconnectinet_addrsocket
            • String ID:
            • API String ID: 3701255441-0
            • Opcode ID: 01ac4e1bb718de5b800077869236817ba7dbb371acb41085d03826d86e5413f0
            • Instruction ID: 6f9270b25347447add342da457f77a13a9c1a7e11193542f23a2f2c964780064
            • Opcode Fuzzy Hash: 01ac4e1bb718de5b800077869236817ba7dbb371acb41085d03826d86e5413f0
            • Instruction Fuzzy Hash: A921D1316002149FCB10EF69C985B7E73A8AF58724F04456EF916A73D2DB78AC018B6A
            APIs
            • IsWindow.USER32(00000000), ref: 00468441
            • GetForegroundWindow.USER32 ref: 00468458
            • GetDC.USER32(00000000), ref: 00468494
            • GetPixel.GDI32(00000000,?,00000003), ref: 004684A0
            • ReleaseDC.USER32(00000000,00000003), ref: 004684DB
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Window$ForegroundPixelRelease
            • String ID:
            • API String ID: 4156661090-0
            • Opcode ID: e129cb2e01005dd128931fd219b40d64944643ffec29a7b5aeec741a5b2222fa
            • Instruction ID: 7eb5ea12079a87998d9ad24f7eee5d760849aa70fcb3038dddee9aca5b70f9a1
            • Opcode Fuzzy Hash: e129cb2e01005dd128931fd219b40d64944643ffec29a7b5aeec741a5b2222fa
            • Instruction Fuzzy Hash: 9D21A475A00204AFD700DFA5D985A9EB7F5EF48305F04847EE85997251DF74AC00CB58
            APIs
            • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 0042AFE3
            • SelectObject.GDI32(?,00000000), ref: 0042AFF2
            • BeginPath.GDI32(?), ref: 0042B009
            • SelectObject.GDI32(?,00000000), ref: 0042B033
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ObjectSelect$BeginCreatePath
            • String ID:
            • API String ID: 3225163088-0
            • Opcode ID: b98d35192cd7674e7e223fc5e960f33633d5bef2c3dca124b6f982cca1be500f
            • Instruction ID: defb62e2d14b5dc61a60b9f8e46d82b728d0d2292644d69bb86668032924b8be
            • Opcode Fuzzy Hash: b98d35192cd7674e7e223fc5e960f33633d5bef2c3dca124b6f982cca1be500f
            • Instruction Fuzzy Hash: DC218E71A01315BBDB119F95FC847AE7B68F720355F54823BEC21922B0C37888518B99
            APIs
            • __calloc_crt.LIBCMT ref: 004321A9
            • CreateThread.KERNEL32(?,?,004322DF,00000000,?,?), ref: 004321ED
            • GetLastError.KERNEL32 ref: 004321F7
            • _free.LIBCMT ref: 00432200
            • __dosmaperr.LIBCMT ref: 0043220B
              • Part of subcall function 00437C0E: __getptd_noexit.LIBCMT ref: 00437C0E
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CreateErrorLastThread__calloc_crt__dosmaperr__getptd_noexit_free
            • String ID:
            • API String ID: 2664167353-0
            • Opcode ID: 730fa535017701607b9e5ef1b58ee5727ae4111cd7c9f82ddc2743caa70aafbb
            • Instruction ID: 4bfc23fad344fdd233653d3f36b2dd68125afd2ca30dc7effa629700dcc71c73
            • Opcode Fuzzy Hash: 730fa535017701607b9e5ef1b58ee5727ae4111cd7c9f82ddc2743caa70aafbb
            • Instruction Fuzzy Hash: 73114832104306AF9B20AFA6DE41D6B3798EF0C774F10112FF92496181DBB9D8018AA8
            APIs
            • GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 0044ABD7
            • GetLastError.KERNEL32(?,0044A69F,?,?,?), ref: 0044ABE1
            • GetProcessHeap.KERNEL32(00000008,?,?,0044A69F,?,?,?), ref: 0044ABF0
            • HeapAlloc.KERNEL32(00000000,?,0044A69F,?,?,?), ref: 0044ABF7
            • GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0044AC0E
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
            • String ID:
            • API String ID: 842720411-0
            • Opcode ID: 9fddd77adcfdfc88f722dee60f49a38f8333cd9d2923547f0c5927a8f0bcd665
            • Instruction ID: b2fb64370050a3796c16fcd9a1e03ca781d25c66129ae6c70a804cb58bc47ee6
            • Opcode Fuzzy Hash: 9fddd77adcfdfc88f722dee60f49a38f8333cd9d2923547f0c5927a8f0bcd665
            • Instruction Fuzzy Hash: 46011971640204BFEB104FA9DC89DAB3BADEF9A756714043AF945C3260DA719C50CF69
            APIs
            • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00457A74
            • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00457A82
            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00457A8A
            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00457A94
            • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00457AD0
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: PerformanceQuery$CounterSleep$Frequency
            • String ID:
            • API String ID: 2833360925-0
            • Opcode ID: a1ab50dbaa400ee0f35af581b93bebd3d034504358e51fffec0234da4fa6e53b
            • Instruction ID: 746975d6f761098cdefc978455666e6c60c5cbcab41208852490033a1247a154
            • Opcode Fuzzy Hash: a1ab50dbaa400ee0f35af581b93bebd3d034504358e51fffec0234da4fa6e53b
            • Instruction Fuzzy Hash: 5C016D72C04619EBCF00AFE4ED499DDBB78FB58302F004477E802B2251DB789A54C7A9
            APIs
            • CLSIDFromProgID.OLE32 ref: 00449ADC
            • ProgIDFromCLSID.OLE32(?,00000000), ref: 00449AF7
            • lstrcmpiW.KERNEL32(?,00000000), ref: 00449B05
            • CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00449B15
            • CLSIDFromString.OLE32(?,?), ref: 00449B21
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: From$Prog$FreeStringTasklstrcmpi
            • String ID:
            • API String ID: 3897988419-0
            • Opcode ID: 1cc8a2f94725260517449aeb50518d65eec12019442650986c5528cd0426cdb7
            • Instruction ID: 56237133057e954482622df0bff4b56f6f8ca3d3ebd40510f2d6be53eebfbb56
            • Opcode Fuzzy Hash: 1cc8a2f94725260517449aeb50518d65eec12019442650986c5528cd0426cdb7
            • Instruction Fuzzy Hash: 97018F76A00204BFEB109F54ED48F9BBAEDEB58392F144036F905D2210D774ED00ABA4
            APIs
            • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 0044AA79
            • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 0044AA83
            • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 0044AA92
            • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 0044AA99
            • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0044AAAF
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: HeapInformationToken$AllocErrorLastProcess
            • String ID:
            • API String ID: 44706859-0
            • Opcode ID: d46d5726169be317421ae8eed6a70f1b1da5d51b3fb809236447fcdb6b794044
            • Instruction ID: c1a9603be3acfe53a7f4d867b4225e7e1712979715b1dc59aac0c93ffdc08452
            • Opcode Fuzzy Hash: d46d5726169be317421ae8eed6a70f1b1da5d51b3fb809236447fcdb6b794044
            • Instruction Fuzzy Hash: 0AF0AF312402046FEB105FA4AC89E673BACFF49754F00003BFA01D7290DA609C15CA65
            APIs
            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0044AADA
            • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0044AAE4
            • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0044AAF3
            • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0044AAFA
            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0044AB10
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: HeapInformationToken$AllocErrorLastProcess
            • String ID:
            • API String ID: 44706859-0
            • Opcode ID: 0e193d17cdf6ba65c0ab09260042c070dda179349033c92151f803f4e2e75f05
            • Instruction ID: 7b3094dd8073a0d4b54ac6e4c054ebd56232fdceee0a77b743a18eb2448949dc
            • Opcode Fuzzy Hash: 0e193d17cdf6ba65c0ab09260042c070dda179349033c92151f803f4e2e75f05
            • Instruction Fuzzy Hash: 69F062716402087FEB110FA4EC89E673B6DFF49795F00003BFA41C7290CA64AC11CB65
            APIs
            • GetDlgItem.USER32(?,000003E9), ref: 0044EC94
            • GetWindowTextW.USER32(00000000,?,00000100), ref: 0044ECAB
            • MessageBeep.USER32(00000000), ref: 0044ECC3
            • KillTimer.USER32(?,0000040A), ref: 0044ECDF
            • EndDialog.USER32(?,00000001), ref: 0044ECF9
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: BeepDialogItemKillMessageTextTimerWindow
            • String ID:
            • API String ID: 3741023627-0
            • Opcode ID: 871ebd2dc50cb6d83e2542fe6b8797d59794c75f8c0ca65ea003d5911283b1bc
            • Instruction ID: 7c0e253e6daf71275f144a977830b0db213ad0456a6eb4ba7e01fcadcf456d5f
            • Opcode Fuzzy Hash: 871ebd2dc50cb6d83e2542fe6b8797d59794c75f8c0ca65ea003d5911283b1bc
            • Instruction Fuzzy Hash: BD01A430940704ABFB245B56DE8EB9677B8FF10705F00057BB583A24E0DBF8AA84CB48
            APIs
            • EndPath.GDI32(?), ref: 0042B0BA
            • StrokeAndFillPath.GDI32(?,?,0048E680,00000000,?,?,?), ref: 0042B0D6
            • SelectObject.GDI32(?,00000000), ref: 0042B0E9
            • DeleteObject.GDI32 ref: 0042B0FC
            • StrokePath.GDI32(?), ref: 0042B117
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Path$ObjectStroke$DeleteFillSelect
            • String ID:
            • API String ID: 2625713937-0
            • Opcode ID: a933078c1e41325a7fda665779402759be8dd26840c69f4cc75981d0f99e1c88
            • Instruction ID: d09e3ba8106f09b7fb0ffccf771ac6374f8d5cf7ff3259fc2f0692271a8bebb6
            • Opcode Fuzzy Hash: a933078c1e41325a7fda665779402759be8dd26840c69f4cc75981d0f99e1c88
            • Instruction Fuzzy Hash: 5CF0F630101204AFCB229F65FC0A7693B64E710366F488337E825851F1C7348966CF5C
            APIs
            • CoInitialize.OLE32(00000000), ref: 0045F2DA
            • CoCreateInstance.OLE32(0049DA7C,00000000,00000001,0049D8EC,?), ref: 0045F2F2
            • CoUninitialize.OLE32 ref: 0045F555
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CreateInitializeInstanceUninitialize
            • String ID: .lnk
            • API String ID: 948891078-24824748
            • Opcode ID: 8f9f6183a8d804eedb8b9093ce08ccb399b402f89017405afb939c6d10efa3b7
            • Instruction ID: 56ca2aa1e8ab0d55dadeccbfee5ed0d702dd398b15755cccfc95ad1f1bf6af72
            • Opcode Fuzzy Hash: 8f9f6183a8d804eedb8b9093ce08ccb399b402f89017405afb939c6d10efa3b7
            • Instruction Fuzzy Hash: D4A14CB1204301AFD300EF55DC81EABB7A8EF98318F40492EF55597192EB74EA49CB96
            APIs
              • Part of subcall function 0041660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,004153B1,?,?,004161FF,?,00000000,00000001,00000000), ref: 0041662F
            • CoInitialize.OLE32(00000000), ref: 0045E85D
            • CoCreateInstance.OLE32(0049DA7C,00000000,00000001,0049D8EC,?), ref: 0045E876
            • CoUninitialize.OLE32 ref: 0045E893
              • Part of subcall function 0041936C: __swprintf.LIBCMT ref: 004193AB
              • Part of subcall function 0041936C: __itow.LIBCMT ref: 004193DF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
            • String ID: .lnk
            • API String ID: 2126378814-24824748
            • Opcode ID: 668e621b4f843236c55c20dc755c86773dbb98216bad8e99c517538290258a07
            • Instruction ID: 8ed42b7ffcbf8c34fdfa87bac7f6017b0905d4b703ef9b035486e8dd125d5539
            • Opcode Fuzzy Hash: 668e621b4f843236c55c20dc755c86773dbb98216bad8e99c517538290258a07
            • Instruction Fuzzy Hash: 9CA19775A043019FCB14EF25C484D5ABBE5BF88314F00899EF9A59B3A2CB35ED49CB85
            APIs
            • __startOneArgErrorHandling.LIBCMT ref: 004332ED
              • Part of subcall function 0043E0D0: __87except.LIBCMT ref: 0043E10B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ErrorHandling__87except__start
            • String ID: pow
            • API String ID: 2905807303-2276729525
            • Opcode ID: 0750a7a351930661fcc1e1418c311a1907902d47dc722e9d1e7a2f1656e447bd
            • Instruction ID: 917e370787e20e9ac7c3c789a3533865973c7ab29dfd68936cfab577bd1622d1
            • Opcode Fuzzy Hash: 0750a7a351930661fcc1e1418c311a1907902d47dc722e9d1e7a2f1656e447bd
            • Instruction Fuzzy Hash: FB517B71A0A20196CF157F1AC90137B2B949B48711F20ADBBF8D1823E9DF7C8D849A4E
            APIs
            • CharUpperBuffW.USER32(0000000C,00000016,00000016,00000000,00000000,?,00000000,004ADC50,?,0000000F,0000000C,00000016,004ADC50,?), ref: 00454645
              • Part of subcall function 0041936C: __swprintf.LIBCMT ref: 004193AB
              • Part of subcall function 0041936C: __itow.LIBCMT ref: 004193DF
            • CharUpperBuffW.USER32(?,?,00000000,?), ref: 004546C5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: BuffCharUpper$__itow__swprintf
            • String ID: REMOVE$THIS
            • API String ID: 3797816924-776492005
            • Opcode ID: 99eb1063d92ffa89d9bb5e829bd753cc6b5cef06c9ff0b80d17b7bb1bcc13428
            • Instruction ID: 9d53be668d9fb5a327bbf5121fc8cddf821c48a50070adcd8d7b58695f76f920
            • Opcode Fuzzy Hash: 99eb1063d92ffa89d9bb5e829bd753cc6b5cef06c9ff0b80d17b7bb1bcc13428
            • Instruction Fuzzy Hash: 32415234A001199FCF00DF55C881AAEB7B5FF89309F14846AED16AF352DB389D89CB59
            APIs
              • Part of subcall function 0045430B: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,0044BC08,?,?,00000034,00000800,?,00000034), ref: 00454335
            • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 0044C1D3
              • Part of subcall function 004542D6: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,0044BC37,?,?,00000800,?,00001073,00000000,?,?), ref: 00454300
              • Part of subcall function 0045422F: GetWindowThreadProcessId.USER32(?,?), ref: 0045425A
              • Part of subcall function 0045422F: OpenProcess.KERNEL32(00000438,00000000,?,?,?,0044BBCC,00000034,?,?,00001004,00000000,00000000), ref: 0045426A
              • Part of subcall function 0045422F: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,0044BBCC,00000034,?,?,00001004,00000000,00000000), ref: 00454280
            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0044C240
            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0044C28D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
            • String ID: @
            • API String ID: 4150878124-2766056989
            • Opcode ID: 1fa1ad6eabfa0c436aa46e39dec3e043eb82f04723597a785a374a401d539bba
            • Instruction ID: 97a9d9f35f65140ac21fffe6615ecee2d13822cac0b05c15574c3fbb8fa1d40b
            • Opcode Fuzzy Hash: 1fa1ad6eabfa0c436aa46e39dec3e043eb82f04723597a785a374a401d539bba
            • Instruction Fuzzy Hash: 59415176D00218BFDB10DFA4CD81ADEB778BF49304F04409AF945B7181DAB56E89CB65
            APIs
            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,004ADC00,00000000,?,?,?,?), ref: 0047A6D8
            • GetWindowLongW.USER32 ref: 0047A6F5
            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0047A705
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Window$Long
            • String ID: SysTreeView32
            • API String ID: 847901565-1698111956
            • Opcode ID: cec0c1ffba73cebd5112c29abe5935a16720a1f01f8c524f03e458aec7f53b67
            • Instruction ID: 34812f4bd590aac53a1d70bd9b183c7009eef4c1eaab86ac7654d8077e9bf195
            • Opcode Fuzzy Hash: cec0c1ffba73cebd5112c29abe5935a16720a1f01f8c524f03e458aec7f53b67
            • Instruction Fuzzy Hash: E131B331600205AFDB158F34CC41BDB7769EB89324F24872AF879932E0C778E8609799
            APIs
            • _memset.LIBCMT ref: 00465190
            • InternetCrackUrlW.WININET(?,00000000,00000000,?), ref: 004651C6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CrackInternet_memset
            • String ID: |$DF
            • API String ID: 1413715105-52440868
            • Opcode ID: 0c59bd178daf4ac2d7fb1a55e7c25b15bf3a86f1a87f3b565fe955a487c33f11
            • Instruction ID: 0e3a8f5d2b0018d0b8c995439948e53949e20dc0c2c210d091c584513de02932
            • Opcode Fuzzy Hash: 0c59bd178daf4ac2d7fb1a55e7c25b15bf3a86f1a87f3b565fe955a487c33f11
            • Instruction Fuzzy Hash: 8B314A71C00109ABCF01EFA5CC85EEE7FB9FF18704F00015AF805A6166EB35A946CBA5
            APIs
            • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 0047A15E
            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 0047A172
            • SendMessageW.USER32(?,00001002,00000000,?), ref: 0047A196
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageSend$Window
            • String ID: SysMonthCal32
            • API String ID: 2326795674-1439706946
            • Opcode ID: ae4a772cbb5679667218635877ccbffa9cdd3e1528c133959c220de601507474
            • Instruction ID: 3d07f6a8656c98a60a218c76e638a6384608bc942360046108f403df068c4194
            • Opcode Fuzzy Hash: ae4a772cbb5679667218635877ccbffa9cdd3e1528c133959c220de601507474
            • Instruction Fuzzy Hash: 59219132510218ABEF118F94CC42FEE3B79EF88714F114225FE59AB1D0D679AC55CB94
            APIs
            • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 0047A941
            • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 0047A94F
            • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0047A956
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageSend$DestroyWindow
            • String ID: msctls_updown32
            • API String ID: 4014797782-2298589950
            • Opcode ID: d148ef9ce7ae0178c9f29fb430c5e697fceb79d1acc397a0305d74544e503e15
            • Instruction ID: f4b732ce61ef04990da3c7ad1e8262ccf4f24b597dcf722976fd34360e4e1239
            • Opcode Fuzzy Hash: d148ef9ce7ae0178c9f29fb430c5e697fceb79d1acc397a0305d74544e503e15
            • Instruction Fuzzy Hash: 9121B2F5600209BFDB00DF14DC91DBB37ACEB9A358B05445AFA08973A1CB34EC218B69
            APIs
            • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00479A30
            • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00479A40
            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00479A65
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageSend$MoveWindow
            • String ID: Listbox
            • API String ID: 3315199576-2633736733
            • Opcode ID: c7d075a14e7c419bfdde171d9583bbe656b380122719623c9ec7dcfbd2c2c8da
            • Instruction ID: b16847f54f3bbe551224f5b7a10f8a7b00d9c28c67af162b2df8198ff57283bf
            • Opcode Fuzzy Hash: c7d075a14e7c419bfdde171d9583bbe656b380122719623c9ec7dcfbd2c2c8da
            • Instruction Fuzzy Hash: 7821D772611118BFEF118F54DC85FFF3BAAEF89754F01812AF948572A0C6759C1187A4
            APIs
            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0047A46D
            • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 0047A482
            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 0047A48F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: msctls_trackbar32
            • API String ID: 3850602802-1010561917
            • Opcode ID: e678bb6a1d527a46139aa38c1b35a965afe505dcd88d3de11d13096f77acbd2a
            • Instruction ID: 5dbd2ac2b98247e172e9957a1bfa228c2db5509b112a01da0e74ef04d1773e25
            • Opcode Fuzzy Hash: e678bb6a1d527a46139aa38c1b35a965afe505dcd88d3de11d13096f77acbd2a
            • Instruction Fuzzy Hash: 40110A71200208BEEF209F75CC49FEB3769EFC8754F01422DFA49A6191D2B6E821C728
            APIs
            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00432350,?), ref: 004322A1
            • GetProcAddress.KERNEL32(00000000), ref: 004322A8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: RoInitialize$combase.dll
            • API String ID: 2574300362-340411864
            • Opcode ID: fcedfc9659ec0c7c64bc5119958f557a4720371b1e3e804458d48a2424c6a692
            • Instruction ID: 09ede9aae58cef9486e68371fe4ae4646b4b8eb1e797198e2bf9ef7d0be636f4
            • Opcode Fuzzy Hash: fcedfc9659ec0c7c64bc5119958f557a4720371b1e3e804458d48a2424c6a692
            • Instruction Fuzzy Hash: 11E01270A91300ABDF605FB1EE4EB1A3B64AB14B0AF104072B182D61A0CBFA4050CF1C
            APIs
            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00432276), ref: 00432376
            • GetProcAddress.KERNEL32(00000000), ref: 0043237D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: RoUninitialize$combase.dll
            • API String ID: 2574300362-2819208100
            • Opcode ID: 778677b6a8caa6dc428da957c2ff63bfe522dcf52e03ffaf57b5f6c554d6dff9
            • Instruction ID: a31f54394a8b229da8a051bef5177e87c7ac8e844c2c36bb9f34271d07e84e43
            • Opcode Fuzzy Hash: 778677b6a8caa6dc428da957c2ff63bfe522dcf52e03ffaf57b5f6c554d6dff9
            • Instruction Fuzzy Hash: 9FE0BD70A86305ABDB60AF61EE0EB193B64B71470AF200437F509E31B4CBBA94208A1C
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: LocalTime__swprintf
            • String ID: %.3d$WIN_XPe
            • API String ID: 2070861257-2409531811
            • Opcode ID: cda00aeba2dd113d83b987a3eed122ba082014d44831d7c995bae8c2129a9bdd
            • Instruction ID: ed6aefd46cac5bf6410161ede234a9b3f9da04a218b558fb66ec53ee4bca7bb5
            • Opcode Fuzzy Hash: cda00aeba2dd113d83b987a3eed122ba082014d44831d7c995bae8c2129a9bdd
            • Instruction Fuzzy Hash: 98E012B1C04618DBEB50A750DE05DFD737CA708741F5408D3B906A2110D77D9BA6AB1F
            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll,?,004721FB,?,004723EF), ref: 00472213
            • GetProcAddress.KERNEL32(00000000,GetProcessId), ref: 00472225
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: GetProcessId$kernel32.dll
            • API String ID: 2574300362-399901964
            • Opcode ID: fc9da1b2b8e1fce5087c0a7ba7b6e1b85fefb403bded1bbd054a01d7b1269b9c
            • Instruction ID: 3924a98e2e59399ed5088d0bb09ecd68b8f7d19da3da61378ec378b7accb85c7
            • Opcode Fuzzy Hash: fc9da1b2b8e1fce5087c0a7ba7b6e1b85fefb403bded1bbd054a01d7b1269b9c
            • Instruction Fuzzy Hash: 9FD0A779800712AFC7214F30FB09B4276D4EB14304B11887FE846E2250D7F8D8808658
            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll,00000000,004142EC,?,004142AA,?), ref: 00414304
            • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00414316
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
            • API String ID: 2574300362-1355242751
            • Opcode ID: 913e7605f0d524d0b44ee2cbc5430c987a84a9c54ddfb09f1f20248633be2ea2
            • Instruction ID: 0874cb1e3382c80ad4e36f397802e131c29ed0526b199c033dd3070212127dc4
            • Opcode Fuzzy Hash: 913e7605f0d524d0b44ee2cbc5430c987a84a9c54ddfb09f1f20248633be2ea2
            • Instruction Fuzzy Hash: 4CD0A7759007129FC7204F20E80DB5276D4AB24701B10843FE851D2264D7F8C8C08618
            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll,004141BB,00414341,?,0041422F,?,004141BB,?,?,?,?,004139FE,?,00000001), ref: 00414359
            • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 0041436B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
            • API String ID: 2574300362-3689287502
            • Opcode ID: 884fe836626ee1e49fea4f3d8286b88e30e8eb37f6c4400741fa02c30b2e9933
            • Instruction ID: bcd0c3a306c1f3c45e019965339ccb8996e7af0c30471b9f746d40f830373149
            • Opcode Fuzzy Hash: 884fe836626ee1e49fea4f3d8286b88e30e8eb37f6c4400741fa02c30b2e9933
            • Instruction Fuzzy Hash: 17D0A7759007129FC7204F30E809B4276D4AB20716B10843FE891D2250D7F8D8C08618
            APIs
            • LoadLibraryA.KERNEL32(oleaut32.dll,00000000,0045052F,?,004506D7), ref: 00450572
            • GetProcAddress.KERNEL32(00000000,UnRegisterTypeLibForUser), ref: 00450584
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: UnRegisterTypeLibForUser$oleaut32.dll
            • API String ID: 2574300362-1587604923
            • Opcode ID: 86ece393e60a1fa7707accc30790fb6a7a80835d3484a66ea30eae433763569a
            • Instruction ID: b21b3317a3c77d7f1e01db388c13e0df763c3e1ad02915f43559e0f511f5c779
            • Opcode Fuzzy Hash: 86ece393e60a1fa7707accc30790fb6a7a80835d3484a66ea30eae433763569a
            • Instruction Fuzzy Hash: C5D05E39800716AAC7209F20A809B0277E4AF14701B20883FEC4192254EAF8C4848A28
            APIs
            • LoadLibraryA.KERNEL32(oleaut32.dll,?,0045051D,?,004505FE), ref: 00450547
            • GetProcAddress.KERNEL32(00000000,RegisterTypeLibForUser), ref: 00450559
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: RegisterTypeLibForUser$oleaut32.dll
            • API String ID: 2574300362-1071820185
            • Opcode ID: 45b903a4533446c3dd1c4be3605739d221c8462a8f25aba3df3463862aaec728
            • Instruction ID: ee59e23ee0f6a034b1eb35206856121915951727f2ea323caf8622d8373917b2
            • Opcode Fuzzy Hash: 45b903a4533446c3dd1c4be3605739d221c8462a8f25aba3df3463862aaec728
            • Instruction Fuzzy Hash: 7CD0A73980072AAFC720DF20E809B0276E4AB10302B60C43FE846D2255EAF8C884CA18
            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll,?,0046ECBE,?,0046EBBB), ref: 0046ECD6
            • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0046ECE8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: GetSystemWow64DirectoryW$kernel32.dll
            • API String ID: 2574300362-1816364905
            • Opcode ID: e3df4a6aaadb8d219b49e558a85ec70fab98a3b0eef5ec348a2577c270af705c
            • Instruction ID: 9e935221f50e00ae709b118c086d257a31122a312d588d7ec4c6cd902a8db6fe
            • Opcode Fuzzy Hash: e3df4a6aaadb8d219b49e558a85ec70fab98a3b0eef5ec348a2577c270af705c
            • Instruction Fuzzy Hash: DBD0A7B98007239FCB205F65E949B0376E8AF10300B20843FF846D2250EBF8C8848618
            APIs
            • LoadLibraryA.KERNEL32(kernel32.dll,00000000,0046BAD3,00000001,0046B6EE,?,004ADC00), ref: 0046BAEB
            • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 0046BAFD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: GetModuleHandleExW$kernel32.dll
            • API String ID: 2574300362-199464113
            • Opcode ID: 824c6417e4bf8bd2d824be6ca78a07ae596f41a6a6fc1b87fcb0e970766067a4
            • Instruction ID: 239926296e4094b45b65568183d6aaf57ec83597fe006d41ef081b979db3c630
            • Opcode Fuzzy Hash: 824c6417e4bf8bd2d824be6ca78a07ae596f41a6a6fc1b87fcb0e970766067a4
            • Instruction Fuzzy Hash: FFD05E75C00B129EC7309F21A849B1276E4AB10700B10443FA843D2654E7B8D8C0C65D
            APIs
            • LoadLibraryA.KERNEL32(advapi32.dll,?,00473BD1,?,00473E06), ref: 00473BE9
            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00473BFB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: RegDeleteKeyExW$advapi32.dll
            • API String ID: 2574300362-4033151799
            • Opcode ID: b6bef8ec5ebec15aadda2a5262816ca1b5f56705468f59b126756dc9c381b53f
            • Instruction ID: a67e0e2a1e827335695acfb736f14fe8719594200cddcc33486598c0b9eb1c30
            • Opcode Fuzzy Hash: b6bef8ec5ebec15aadda2a5262816ca1b5f56705468f59b126756dc9c381b53f
            • Instruction Fuzzy Hash: CED0A7769007229FC7205FA0ED09B43BAF4AB11719B20883FE449E2254D7BCC4808E18
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c516d79c8338961fa857a5ea15e4569cb763489ab9bd697ba9e7bd4be009c197
            • Instruction ID: f54840b3a3f998abab4bed9b03dd9ad534d873c6ae72cb0cc2d51b49b8ed12aa
            • Opcode Fuzzy Hash: c516d79c8338961fa857a5ea15e4569cb763489ab9bd697ba9e7bd4be009c197
            • Instruction Fuzzy Hash: EDC15D75A0021AEFEB14CF94C884EAFB7B5FF48704F20459AE905AB291D734DE41EB94
            APIs
            • CoInitialize.OLE32(00000000), ref: 0046AAB4
            • CoUninitialize.OLE32 ref: 0046AABF
              • Part of subcall function 00450213: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0045027B
            • VariantInit.OLEAUT32(?), ref: 0046AACA
            • VariantClear.OLEAUT32(?), ref: 0046AD9D
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
            • String ID:
            • API String ID: 780911581-0
            • Opcode ID: f4b901ded99774338a7c96425ab5a45cb6e508599952d50de266af8f44e49a8f
            • Instruction ID: d3cec052526a88191b8264ebe28c40fbd9c1d91494d1efb5085a12ca8a7ee0db
            • Opcode Fuzzy Hash: f4b901ded99774338a7c96425ab5a45cb6e508599952d50de266af8f44e49a8f
            • Instruction Fuzzy Hash: 7BA17835604B019FCB10EF15C491B5AB7E5BF88714F04445EFA96AB3A2DB38ED44CB8A
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Variant$AllocClearCopyInitString
            • String ID:
            • API String ID: 2808897238-0
            • Opcode ID: 5ddd23e8b0729d4bc55d5bae39a5ad49c673541f0e22b3ad22ced03f4a84fb7a
            • Instruction ID: b24994892b28ea22ed41cd7962b557d9e5a8685ba2ad242708bf07318edd6759
            • Opcode Fuzzy Hash: 5ddd23e8b0729d4bc55d5bae39a5ad49c673541f0e22b3ad22ced03f4a84fb7a
            • Instruction Fuzzy Hash: A45185306043069BEB24AF66D49566FB3E5EF5D314F20882FE946C72D1DB789C81A70D
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: _memset$__filbuf__getptd_noexit_memcpy_s
            • String ID:
            • API String ID: 3877424927-0
            • Opcode ID: 065ad613f1183b824f05baa70d3d15c8958660488bca00daffb81e2f860a9d07
            • Instruction ID: 53d79c8ecb3d3fe5b7629954e40d90ef5bfb24acafe66cc4ecbc36d81b619dec
            • Opcode Fuzzy Hash: 065ad613f1183b824f05baa70d3d15c8958660488bca00daffb81e2f860a9d07
            • Instruction Fuzzy Hash: 9551D5B0A00205AFDB249F6A888566F77A1AF48325F24972FF825863D0D778DF518B49
            APIs
            • GetWindowRect.USER32(01636678,?), ref: 0047C544
            • ScreenToClient.USER32(?,00000002), ref: 0047C574
            • MoveWindow.USER32(00000002,?,?,?,000000FF,00000001,?,00000002,?,?,?,00000002,?,?), ref: 0047C5DA
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Window$ClientMoveRectScreen
            • String ID:
            • API String ID: 3880355969-0
            • Opcode ID: 29778ceadc88e8043b24cae127be9cb281ee8e0c3a6fcb133308a472c28339b4
            • Instruction ID: 05c21488dbecdfa167331e3038b7816cd2669d1c04a8c9574ea230a7522a6a40
            • Opcode Fuzzy Hash: 29778ceadc88e8043b24cae127be9cb281ee8e0c3a6fcb133308a472c28339b4
            • Instruction Fuzzy Hash: 82514C75A00205EFCF20DF68D8C0AEE7BB5EB55324F10866AF9599B290D734ED41CB94
            APIs
            • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 0044C462
            • __itow.LIBCMT ref: 0044C49C
              • Part of subcall function 0044C6E8: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 0044C753
            • SendMessageW.USER32(?,0000110A,00000001,?), ref: 0044C505
            • __itow.LIBCMT ref: 0044C55A
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageSend$__itow
            • String ID:
            • API String ID: 3379773720-0
            • Opcode ID: ab0542c797ae680f34bc32dcf149f10d4139ff0be4ce629fa4971586f17fa215
            • Instruction ID: 94aa8f8244d48e76c93dd802fac7fd0a0f8affcbe3f7f1f337656ba9483b655c
            • Opcode Fuzzy Hash: ab0542c797ae680f34bc32dcf149f10d4139ff0be4ce629fa4971586f17fa215
            • Instruction Fuzzy Hash: 2B41C571A00219BBEF11DF55CD91BEE7BB5AF48704F04002FF905A3291DB789A45CBA9
            APIs
            • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00453966
            • SetKeyboardState.USER32(00000080,?,00000001), ref: 00453982
            • PostMessageW.USER32(00000000,00000102,?,00000001), ref: 004539EF
            • SendInput.USER32(00000001,?,0000001C,00000000,?,00000001), ref: 00453A4D
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: KeyboardState$InputMessagePostSend
            • String ID:
            • API String ID: 432972143-0
            • Opcode ID: ef860633596be485adc8c2d2001e2cfec1f5757956d865553a94ebf13c823712
            • Instruction ID: c3a5fc2247ca57258dfbd45ab748ad776bb5d11102d32a0855e6eab2f4ab92db
            • Opcode Fuzzy Hash: ef860633596be485adc8c2d2001e2cfec1f5757956d865553a94ebf13c823712
            • Instruction Fuzzy Hash: 1B41E7F0A042086AEF218F6588057FEBBB59B55357F04015BFCC1922C2C7BC9E899769
            APIs
            • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0045E742
            • GetLastError.KERNEL32(?,00000000), ref: 0045E768
            • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0045E78D
            • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0045E7B9
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CreateHardLink$DeleteErrorFileLast
            • String ID:
            • API String ID: 3321077145-0
            • Opcode ID: bdef32a8ad46d848ed5936b1697a7e79bcc66746b9348510daef3cf5fc3c8590
            • Instruction ID: 7c82d8f7034c297a17edc80f6f1f559cedbe83e8a4f55341b4a5263fe7553a37
            • Opcode Fuzzy Hash: bdef32a8ad46d848ed5936b1697a7e79bcc66746b9348510daef3cf5fc3c8590
            • Instruction Fuzzy Hash: 0B414A39A00610DFCB15EF16C54494DBBE5BF59714B08809AED169B3A2CB78FD44CB89
            APIs
            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0047B5D1
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: InvalidateRect
            • String ID:
            • API String ID: 634782764-0
            • Opcode ID: 407ff049ce14b452d75764b25c7e584e8d68f2c6fd02a8a3057bb67f1aecd71f
            • Instruction ID: 57e28f881fa191b69b789a201495b93db2dab7d3e06c3b33892f8c859f32ca08
            • Opcode Fuzzy Hash: 407ff049ce14b452d75764b25c7e584e8d68f2c6fd02a8a3057bb67f1aecd71f
            • Instruction Fuzzy Hash: 2E31BE74601208BFEB248A18CC89FEA7765EB05758F54C113FB19D62E1C738A9408ADE
            APIs
            • ClientToScreen.USER32(?,?), ref: 0047D807
            • GetWindowRect.USER32(?,?), ref: 0047D87D
            • PtInRect.USER32(?,?,0047ED5A), ref: 0047D88D
            • MessageBeep.USER32(00000000), ref: 0047D8FE
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Rect$BeepClientMessageScreenWindow
            • String ID:
            • API String ID: 1352109105-0
            • Opcode ID: 484d40a7e24bb3ac0e4d7325bb41d78b87c750840d4a41d58f662c46bc75195c
            • Instruction ID: bd834d0390477c0285ff9464f83b2979a01ba64205cbee16b8b392e58c799586
            • Opcode Fuzzy Hash: 484d40a7e24bb3ac0e4d7325bb41d78b87c750840d4a41d58f662c46bc75195c
            • Instruction Fuzzy Hash: 94418F70E10219EFCB11EF59D884BA977B5BF45310F1AC1BBE9289B260D334E945CB46
            APIs
            • GetKeyboardState.USER32(?,75A4C0D0,?,00008000), ref: 00453AB8
            • SetKeyboardState.USER32(00000080,?,00008000), ref: 00453AD4
            • PostMessageW.USER32(00000000,00000101,00000000,?), ref: 00453B34
            • SendInput.USER32(00000001,?,0000001C,75A4C0D0,?,00008000), ref: 00453B92
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: KeyboardState$InputMessagePostSend
            • String ID:
            • API String ID: 432972143-0
            • Opcode ID: ee1cb2a252a75a9602d05cf7c96861c714d2e44eea82e126ad1b221e09ad3506
            • Instruction ID: 27b72a86794425fe0b8d053071287e17dcd007313c081713a0b207d5bd7cc2c2
            • Opcode Fuzzy Hash: ee1cb2a252a75a9602d05cf7c96861c714d2e44eea82e126ad1b221e09ad3506
            • Instruction Fuzzy Hash: 2B31F431D00258AEEB218F6488197BE7BA59B55357F04016BEC81932D3C7BCAE4DC769
            APIs
            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00444038
            • __isleadbyte_l.LIBCMT ref: 00444066
            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 00444094
            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 004440CA
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
            • String ID:
            • API String ID: 3058430110-0
            • Opcode ID: 7b108a0bb2571968fa02d0986387a7f6d4b93a724efe95f9a85180f7c6e31ba1
            • Instruction ID: 3bf6b04f36da3cd1fc6af00a07f0fc9eb4165bfe06db3e75784bc5fcf6265c2f
            • Opcode Fuzzy Hash: 7b108a0bb2571968fa02d0986387a7f6d4b93a724efe95f9a85180f7c6e31ba1
            • Instruction Fuzzy Hash: 3A31D231600206AFFB21DF75C845B6B7BA5BF81310F15402AE661872E0E735DCA1DB98
            APIs
            • GetForegroundWindow.USER32 ref: 00477CB9
              • Part of subcall function 00455F55: GetWindowThreadProcessId.USER32(?,00000000), ref: 00455F6F
              • Part of subcall function 00455F55: GetCurrentThreadId.KERNEL32 ref: 00455F76
              • Part of subcall function 00455F55: AttachThreadInput.USER32(00000000,?,0045781F), ref: 00455F7D
            • GetCaretPos.USER32(?), ref: 00477CCA
            • ClientToScreen.USER32(00000000,?), ref: 00477D03
            • GetForegroundWindow.USER32 ref: 00477D09
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
            • String ID:
            • API String ID: 2759813231-0
            • Opcode ID: 7a851ad328cee1b16e2bd4f381e874094e9f9bfc1e45ce6079b745986ed6ae05
            • Instruction ID: 1e8d5d08c58c4f4f9afaf2b8480808f23e7f85ff3a1db76d80e28d2a1a114446
            • Opcode Fuzzy Hash: 7a851ad328cee1b16e2bd4f381e874094e9f9bfc1e45ce6079b745986ed6ae05
            • Instruction Fuzzy Hash: 00314472E00118AFCB00EFA6D9859EFBBF9EF54314B10806BE815E3211DA349E058BA4
            APIs
              • Part of subcall function 0042B34E: GetWindowLongW.USER32(?,000000EB), ref: 0042B35F
            • GetCursorPos.USER32(?), ref: 0047F211
            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0048E4C0,?,?,?,?,?), ref: 0047F226
            • GetCursorPos.USER32(?), ref: 0047F270
            • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0048E4C0,?,?,?), ref: 0047F2A6
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Cursor$LongMenuPopupProcTrackWindow
            • String ID:
            • API String ID: 2864067406-0
            • Opcode ID: 5032b0c2194b7c4299a7984e93d0ed595972f3ce43f4abf7bb911aa90676e437
            • Instruction ID: 63e934ad27ac873e6da2f3885b345cfe2735ecc1dfff78e520f1f2a1c573745c
            • Opcode Fuzzy Hash: 5032b0c2194b7c4299a7984e93d0ed595972f3ce43f4abf7bb911aa90676e437
            • Instruction Fuzzy Hash: 5D217139601014BFCB15CF94D858DEB7BB5EB09720F0580BAF909572A2D3399D51DB98
            APIs
            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00464358
              • Part of subcall function 004643E2: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00464401
              • Part of subcall function 004643E2: InternetCloseHandle.WININET(00000000), ref: 0046449E
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Internet$CloseConnectHandleOpen
            • String ID:
            • API String ID: 1463438336-0
            • Opcode ID: 021c05920f494ff87407bcf62c897d22b344578fd335e9af72131060eb765405
            • Instruction ID: 9cc24286abcb9e2702159473c7d2b96598c863b8fae1a8e55a5dcdd7c23c96d7
            • Opcode Fuzzy Hash: 021c05920f494ff87407bcf62c897d22b344578fd335e9af72131060eb765405
            • Instruction Fuzzy Hash: 0B21CF71700601BBEF119FA0DC00FBBB7A9FF94714F00402BBA1596750EB7598619B9A
            APIs
            • select.WSOCK32(00000000,00000001,00000000,00000000,?), ref: 00468AE0
            • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00468AF2
            • accept.WSOCK32(00000000,00000000,00000000), ref: 00468AFF
            • WSAGetLastError.WSOCK32(00000000), ref: 00468B16
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ErrorLastacceptselect
            • String ID:
            • API String ID: 385091864-0
            • Opcode ID: fa39f2e54e03414bf6d013516220253155c22e91e3cf369861db77e9255f7be3
            • Instruction ID: a5558390a313f7459c5eb50eebe4cf880f672894f4d7221024302a8e9e67c137
            • Opcode Fuzzy Hash: fa39f2e54e03414bf6d013516220253155c22e91e3cf369861db77e9255f7be3
            • Instruction Fuzzy Hash: 5121C372A00124AFC7209F69C884A9EBBECEF59714F0041BBF849D7290DB789A418F94
            APIs
            • GetWindowLongW.USER32(?,000000EC), ref: 00478AA6
            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00478AC0
            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00478ACE
            • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00478ADC
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Window$Long$AttributesLayered
            • String ID:
            • API String ID: 2169480361-0
            • Opcode ID: 6ab1f606fb6f75642a4dd57da16259963dbdfe9ee23026c79322001a07793ecc
            • Instruction ID: 9a301ab6d85809a24ee430c3f0f753741fd75d4908ac6fd873a8c4ae415f027b
            • Opcode Fuzzy Hash: 6ab1f606fb6f75642a4dd57da16259963dbdfe9ee23026c79322001a07793ecc
            • Instruction Fuzzy Hash: 0811B4317851116FDB049B19CD09FFA7799AF95324F14812FF91AC72E1CB78AC418798
            APIs
              • Part of subcall function 00451E68: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00450ABB,?,?,?,0045187A,00000000,000000EF,00000119,?,?), ref: 00451E77
              • Part of subcall function 00451E68: lstrcpyW.KERNEL32(00000000,?,?,00450ABB,?,?,?,0045187A,00000000,000000EF,00000119,?,?,00000000), ref: 00451E9D
              • Part of subcall function 00451E68: lstrcmpiW.KERNEL32(00000000,?,00450ABB,?,?,?,0045187A,00000000,000000EF,00000119,?,?), ref: 00451ECE
            • lstrlenW.KERNEL32(?,00000002,?,?,?,?,0045187A,00000000,000000EF,00000119,?,?,00000000), ref: 00450AD4
            • lstrcpyW.KERNEL32(00000000,?,?,0045187A,00000000,000000EF,00000119,?,?,00000000), ref: 00450AFA
            • lstrcmpiW.KERNEL32(00000002,cdecl,?,0045187A,00000000,000000EF,00000119,?,?,00000000), ref: 00450B2E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: lstrcmpilstrcpylstrlen
            • String ID: cdecl
            • API String ID: 4031866154-3896280584
            • Opcode ID: 19b82ab00df1371e5b016832701b64b2c9741df6213fc63da3ecb7d0aecc6632
            • Instruction ID: 145be95598b7e1a648dd04afa6e117c70f87bd8e37ea0e96bc8854903cea4303
            • Opcode Fuzzy Hash: 19b82ab00df1371e5b016832701b64b2c9741df6213fc63da3ecb7d0aecc6632
            • Instruction Fuzzy Hash: EC11B13A200305AFDB25AF64DC45E7A77A8FF45354B80413BEC06CB261EB75E844C7A8
            APIs
            • _free.LIBCMT ref: 00442FB5
              • Part of subcall function 0043395C: __FF_MSGBANNER.LIBCMT ref: 00433973
              • Part of subcall function 0043395C: __NMSG_WRITE.LIBCMT ref: 0043397A
              • Part of subcall function 0043395C: RtlAllocateHeap.NTDLL(01610000,00000000,00000001,00000001,00000000,?,?,0042F507,?,0000000E), ref: 0043399F
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: AllocateHeap_free
            • String ID:
            • API String ID: 614378929-0
            • Opcode ID: 54c38f9f08a0f519f703607504d9ecf4fc2804a6520cd809b06142924e8df86c
            • Instruction ID: 76b0ad49cdb85c388189d76d1fe121886c392acaaf7d6adad2480c7a152804b0
            • Opcode Fuzzy Hash: 54c38f9f08a0f519f703607504d9ecf4fc2804a6520cd809b06142924e8df86c
            • Instruction Fuzzy Hash: 9C113A71409211ABEF313F71AC0462A3BA4AF18369F60693BF849C6261CF7CCC40979C
            APIs
            • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 004505AC
            • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 004505C7
            • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 004505DD
            • FreeLibrary.KERNEL32(?), ref: 00450632
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Type$FileFreeLibraryLoadModuleNameRegister
            • String ID:
            • API String ID: 3137044355-0
            • Opcode ID: bf8619a0c9aba981bc15ccca1db7ff7e9fb4881d086a03c40d52b467fc4f2e37
            • Instruction ID: 4731fdb1b1567b0ae19da271165ce05f429b2441af8087529cf53811cff3dc9d
            • Opcode Fuzzy Hash: bf8619a0c9aba981bc15ccca1db7ff7e9fb4881d086a03c40d52b467fc4f2e37
            • Instruction Fuzzy Hash: 6D21AF79900209EFDB20CF91DC88ADABBB8EF40305F00846FE91692111D778EA59DF59
            APIs
            • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00456733
            • _memset.LIBCMT ref: 00456754
            • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 004567A6
            • CloseHandle.KERNEL32(00000000), ref: 004567AF
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CloseControlCreateDeviceFileHandle_memset
            • String ID:
            • API String ID: 1157408455-0
            • Opcode ID: 43f9cf68ad243a26290874813f2d247d24e1a893440e2b8cc91cc2b019d852b3
            • Instruction ID: fd60b409f56f833d8a6cd2ffd74bc756abd75956c5152ccc18da0620cbfe824a
            • Opcode Fuzzy Hash: 43f9cf68ad243a26290874813f2d247d24e1a893440e2b8cc91cc2b019d852b3
            • Instruction Fuzzy Hash: 17110A72D012287AE73057A5AC4DFABBBBCEF48724F1041ABF904E71C0D2744E848B69
            APIs
              • Part of subcall function 0044AA62: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 0044AA79
              • Part of subcall function 0044AA62: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 0044AA83
              • Part of subcall function 0044AA62: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 0044AA92
              • Part of subcall function 0044AA62: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 0044AA99
              • Part of subcall function 0044AA62: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0044AAAF
            • GetLengthSid.ADVAPI32(?,00000000,0044ADE4,?,?), ref: 0044B21B
            • GetProcessHeap.KERNEL32(00000008,00000000), ref: 0044B227
            • HeapAlloc.KERNEL32(00000000), ref: 0044B22E
            • CopySid.ADVAPI32(?,00000000,?), ref: 0044B247
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Heap$AllocInformationProcessToken$CopyErrorLastLength
            • String ID:
            • API String ID: 4217664535-0
            • Opcode ID: 79fa0771b1b0de77c34839b3920780a75f91c359e85712ead06fb105e3eb68ba
            • Instruction ID: ddb838783a8d980ccf522e3005a5bb529784060da0dd22f8c7e97ea2b4c614ce
            • Opcode Fuzzy Hash: 79fa0771b1b0de77c34839b3920780a75f91c359e85712ead06fb105e3eb68ba
            • Instruction Fuzzy Hash: 40118F71A00205AFEB049F98DC89AAFB7A9FF95308F14806FE94297210D779EE44CB54
            APIs
            • SendMessageW.USER32(?,000000B0,?,?), ref: 0044B498
            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0044B4AA
            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0044B4C0
            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0044B4DB
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageSend
            • String ID:
            • API String ID: 3850602802-0
            • Opcode ID: 1bb350ae0722a71d9331574708964cf4b0afed708a673f82c82f2e754d377fa8
            • Instruction ID: 0cde940b2380dfbe2419275a40ecd7dcbc7a601a66b3a8a4632e56c5ce5e9487
            • Opcode Fuzzy Hash: 1bb350ae0722a71d9331574708964cf4b0afed708a673f82c82f2e754d377fa8
            • Instruction Fuzzy Hash: 6711487A900218FFEB11DFA9CD81E9DBBB4FB08700F2040A2E604B7290D771AE11DB94
            APIs
              • Part of subcall function 0042B34E: GetWindowLongW.USER32(?,000000EB), ref: 0042B35F
            • DefDlgProcW.USER32(?,00000020,?,00000000), ref: 0042B5A5
            • GetClientRect.USER32(?,?), ref: 0048E69A
            • GetCursorPos.USER32(?), ref: 0048E6A4
            • ScreenToClient.USER32(?,?), ref: 0048E6AF
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Client$CursorLongProcRectScreenWindow
            • String ID:
            • API String ID: 4127811313-0
            • Opcode ID: 254648ca822ff78b7b2c07c0bd5a257e440f5d096f27a07920ce1ff14d7b983b
            • Instruction ID: 38adbe0424925ba1536d15aaa9292e66d33fb06dbb45d485947c45a5efc121bb
            • Opcode Fuzzy Hash: 254648ca822ff78b7b2c07c0bd5a257e440f5d096f27a07920ce1ff14d7b983b
            • Instruction Fuzzy Hash: AF110A31A01429BBCB10EF95DC459EE77B9EF19308F900466E901E7150D738AA92CBA9
            APIs
            • GetCurrentThreadId.KERNEL32 ref: 00457352
            • MessageBoxW.USER32(?,?,?,?), ref: 00457385
            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0045739B
            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004573A2
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
            • String ID:
            • API String ID: 2880819207-0
            • Opcode ID: fcb416f9a989c42e7f02910b133a8696f5435dc7913b608b976dfed4ef512055
            • Instruction ID: e8bb2425b88c138615c9f3d1bc26131b162209e64043e56cf56b4ad77c314c7b
            • Opcode Fuzzy Hash: fcb416f9a989c42e7f02910b133a8696f5435dc7913b608b976dfed4ef512055
            • Instruction Fuzzy Hash: 89110872E04204AFC7019F6CEC05A9F7BAD9B48322F144377FC25D3252D6748D0487A9
            APIs
            • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0042D1BA
            • GetStockObject.GDI32(00000011), ref: 0042D1CE
            • SendMessageW.USER32(00000000,00000030,00000000), ref: 0042D1D8
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CreateMessageObjectSendStockWindow
            • String ID:
            • API String ID: 3970641297-0
            • Opcode ID: 77a954fb8573469ab591b10b498ca751a64198622bb37dc6f3c0c7830843e23f
            • Instruction ID: 55f94a0f12abd240e0ba8da287b40f181f5b8fd68ec8dd77b74e083dc65b8265
            • Opcode Fuzzy Hash: 77a954fb8573469ab591b10b498ca751a64198622bb37dc6f3c0c7830843e23f
            • Instruction Fuzzy Hash: CE118B72A01619BFEB024F90EC54EFABB69FF18364F444127FA0552160CB359C60EBA8
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
            • String ID:
            • API String ID: 3016257755-0
            • Opcode ID: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
            • Instruction ID: 57016d5f6f7b9a0cbf3ace85b12a9f850bb74cc57af204a52d619faf8e644707
            • Opcode Fuzzy Hash: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
            • Instruction Fuzzy Hash: 8E014C3200014EBBDF125E85DC029EE3F63BB58354B688456FE1859135D73ADAB2AB89
            APIs
              • Part of subcall function 00437A0D: __getptd_noexit.LIBCMT ref: 00437A0E
            • __lock.LIBCMT ref: 0043748F
            • InterlockedDecrement.KERNEL32(?), ref: 004374AC
            • _free.LIBCMT ref: 004374BF
            • InterlockedIncrement.KERNEL32(01621340), ref: 004374D7
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Interlocked$DecrementIncrement__getptd_noexit__lock_free
            • String ID:
            • API String ID: 2704283638-0
            • Opcode ID: 3fdd3bbda3f26bf179df47909c5ed370fc3ee281713cac094f052e3268ac7909
            • Instruction ID: 35cf8e37dc949e82140368de4f1eae71442478175296d5358856b7f3032eeee2
            • Opcode Fuzzy Hash: 3fdd3bbda3f26bf179df47909c5ed370fc3ee281713cac094f052e3268ac7909
            • Instruction Fuzzy Hash: 5601A172909625A7C731AF259905B5EBB60BB1C718F15A11BF89463790C72C6901CFCE
            APIs
              • Part of subcall function 0042AF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 0042AFE3
              • Part of subcall function 0042AF83: SelectObject.GDI32(?,00000000), ref: 0042AFF2
              • Part of subcall function 0042AF83: BeginPath.GDI32(?), ref: 0042B009
              • Part of subcall function 0042AF83: SelectObject.GDI32(?,00000000), ref: 0042B033
            • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0047EA8E
            • LineTo.GDI32(00000000,?,?), ref: 0047EA9B
            • EndPath.GDI32(00000000), ref: 0047EAAB
            • StrokePath.GDI32(00000000), ref: 0047EAB9
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
            • String ID:
            • API String ID: 1539411459-0
            • Opcode ID: 8c024d379c3136ef7e267075562d8a5e9e44ff27e5c0af04d24ea2f023b9dcdc
            • Instruction ID: b2e8b8fc649b8f27fbbac486eb314a5a8b2e1c13cb73f32e70f871bcc1b3e548
            • Opcode Fuzzy Hash: 8c024d379c3136ef7e267075562d8a5e9e44ff27e5c0af04d24ea2f023b9dcdc
            • Instruction Fuzzy Hash: B2F0E232402258BBDB129F94AC0EFCE3F19AF1A314F048223FE01610F183789521CBAD
            APIs
            • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0044C84A
            • GetWindowThreadProcessId.USER32(?,00000000), ref: 0044C85D
            • GetCurrentThreadId.KERNEL32 ref: 0044C864
            • AttachThreadInput.USER32(00000000), ref: 0044C86B
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
            • String ID:
            • API String ID: 2710830443-0
            • Opcode ID: 3be4cd699c1510bce34b0b461cd4d97d521e0b84dd0abcf34bf593af61285030
            • Instruction ID: a4fa697d9a3e91647062018159062b65f2a954dbd57dc30da3e84651cdb12074
            • Opcode Fuzzy Hash: 3be4cd699c1510bce34b0b461cd4d97d521e0b84dd0abcf34bf593af61285030
            • Instruction Fuzzy Hash: 33E0657154222876EB102B62DC4DEDB7F1CEF257A1F048032B50D85450C675C981C7E4
            APIs
            • GetCurrentThread.KERNEL32 ref: 0044B0D6
            • OpenThreadToken.ADVAPI32(00000000,?,?,?,0044AC9D), ref: 0044B0DD
            • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,0044AC9D), ref: 0044B0EA
            • OpenProcessToken.ADVAPI32(00000000,?,?,?,0044AC9D), ref: 0044B0F1
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CurrentOpenProcessThreadToken
            • String ID:
            • API String ID: 3974789173-0
            • Opcode ID: 36a0d75048c0d9be3209e197010c6c98503d60fb1aa5dbb6f85df83e5cddb8a9
            • Instruction ID: 74524ffbb3e46b94d1fb655a2312772ad862a2771309a36f7a1cc06a5c24715b
            • Opcode Fuzzy Hash: 36a0d75048c0d9be3209e197010c6c98503d60fb1aa5dbb6f85df83e5cddb8a9
            • Instruction Fuzzy Hash: 74E08632E012119BE7201FB15D0DB473BA8EF65796F01C839F641D6040EB788401C768
            APIs
            • GetSysColor.USER32(00000008), ref: 0042B496
            • SetTextColor.GDI32(?,000000FF), ref: 0042B4A0
            • SetBkMode.GDI32(?,00000001), ref: 0042B4B5
            • GetStockObject.GDI32(00000005), ref: 0042B4BD
            • GetWindowDC.USER32(?,00000000), ref: 0048DE2B
            • GetPixel.GDI32(00000000,00000000,00000000), ref: 0048DE38
            • GetPixel.GDI32(00000000,?,00000000), ref: 0048DE51
            • GetPixel.GDI32(00000000,00000000,?), ref: 0048DE6A
            • GetPixel.GDI32(00000000,?,?), ref: 0048DE8A
            • ReleaseDC.USER32(?,00000000), ref: 0048DE95
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
            • String ID:
            • API String ID: 1946975507-0
            • Opcode ID: 3f8704632c0e75f43ca24f0936bcd16855c3c8eb402154f1116d62cc76dde97f
            • Instruction ID: 50112e87be2f30852f0f0154de58da718e312b235e62c34a3ae1a7313ea698a1
            • Opcode Fuzzy Hash: 3f8704632c0e75f43ca24f0936bcd16855c3c8eb402154f1116d62cc76dde97f
            • Instruction Fuzzy Hash: 2DE0ED32900240AADB216F64EC4ABD93B11AB65335F14C677F7A9580E2C7754581DB15
            APIs
            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0044B2DF
            • UnloadUserProfile.USERENV(?,?), ref: 0044B2EB
            • CloseHandle.KERNEL32(?), ref: 0044B2F4
            • CloseHandle.KERNEL32(?), ref: 0044B2FC
              • Part of subcall function 0044AB24: GetProcessHeap.KERNEL32(00000000,?,0044A848), ref: 0044AB2B
              • Part of subcall function 0044AB24: HeapFree.KERNEL32(00000000), ref: 0044AB32
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
            • String ID:
            • API String ID: 146765662-0
            • Opcode ID: e02b08b5b485128a0bb44ed4dce569c064d8c0e1825b94a5619bf74bac6fe40c
            • Instruction ID: b6ebfdd629baa519bf37bcac1fd7a12b6036ca1bd84f58e54d7e3addf7f1107d
            • Opcode Fuzzy Hash: e02b08b5b485128a0bb44ed4dce569c064d8c0e1825b94a5619bf74bac6fe40c
            • Instruction Fuzzy Hash: 59E0E636504005BFDB012FA5EC08859FF76FF983213108233F61581571CB32A471EB55
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CapsDesktopDeviceReleaseWindow
            • String ID:
            • API String ID: 2889604237-0
            • Opcode ID: 15deece9b16f2fdae2d1e23535f9a6a28c1152bdcba64f0a9ee23f361bc08d78
            • Instruction ID: f6f2778d9e5f1930d9cdc4fa28c516a2209d5b46f812ae5a8c111d73b3a71056
            • Opcode Fuzzy Hash: 15deece9b16f2fdae2d1e23535f9a6a28c1152bdcba64f0a9ee23f361bc08d78
            • Instruction Fuzzy Hash: 23E04FB1900204EFDB015F71D84CA6D7BB4EB5C364F11C83BFD5A87210CB7898418B48
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: CapsDesktopDeviceReleaseWindow
            • String ID:
            • API String ID: 2889604237-0
            • Opcode ID: 0679684777abb856ac3c99020ffce6204d84a95336b0d1d10bed02ba84499608
            • Instruction ID: 70ec70184627ba5c58fe453e2c9b63142391eb171c2a98267e52fe1026e899de
            • Opcode Fuzzy Hash: 0679684777abb856ac3c99020ffce6204d84a95336b0d1d10bed02ba84499608
            • Instruction Fuzzy Hash: 42E046B1A00200EFDB005F71D848A6D7BA8EB5C364F11883BF95A8B210CBB898418B08
            APIs
            • OleSetContainedObject.OLE32(?,00000001), ref: 0044DEAA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ContainedObject
            • String ID: AutoIt3GUI$Container
            • API String ID: 3565006973-3941886329
            • Opcode ID: 06ac907439b2f390823124ff2e20a1ed227bb50cb58f5605e4ebd244f9da10a8
            • Instruction ID: caaf60f4ac3680db04d59953f6cfb4991cdfc9a1ab25511df37565d25b984bbd
            • Opcode Fuzzy Hash: 06ac907439b2f390823124ff2e20a1ed227bb50cb58f5605e4ebd244f9da10a8
            • Instruction Fuzzy Hash: DE913C74A00601AFEB14DF64C884F6AB7F5BF48714F20846EF94ACB291DBB4E845CB58
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: _wcscpy
            • String ID: I/H$I/H
            • API String ID: 3048848545-3901109334
            • Opcode ID: 88dfdb524e9d45900ed7a20722aa58de949687d2b7979f4fca71de7ff0cb1198
            • Instruction ID: f16e19eb140c8a9baa7af3498286bb97e140d4bc0e16ea98cd6ea20c78895d46
            • Opcode Fuzzy Hash: 88dfdb524e9d45900ed7a20722aa58de949687d2b7979f4fca71de7ff0cb1198
            • Instruction Fuzzy Hash: 79414C71A00216AACF25DF89D1815FEB770EF0A316F54400BEC80A7353D7B85E8AC798
            APIs
            • Sleep.KERNEL32(00000000), ref: 0042BCDA
            • GlobalMemoryStatusEx.KERNEL32 ref: 0042BCF3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: GlobalMemorySleepStatus
            • String ID: @
            • API String ID: 2783356886-2766056989
            • Opcode ID: 21da6d15e3ca817b623b47af87e6daf90ac47f8e658beda3e88811b78cf9c3eb
            • Instruction ID: 1bf689df8457bd5c44b4d49a02cf236451e2879443becbfec152a6d8a8a5dfcc
            • Opcode Fuzzy Hash: 21da6d15e3ca817b623b47af87e6daf90ac47f8e658beda3e88811b78cf9c3eb
            • Instruction Fuzzy Hash: 47517D71608744ABE360AF11EC85BAFBBECFF94354F41485EF1C8411A6DFB084A8875A
            APIs
              • Part of subcall function 004144ED: __fread_nolock.LIBCMT ref: 0041450B
            • _wcscmp.LIBCMT ref: 0045C65D
            • _wcscmp.LIBCMT ref: 0045C670
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: _wcscmp$__fread_nolock
            • String ID: FILE
            • API String ID: 4029003684-3121273764
            • Opcode ID: 5b0d0eba16d44ff05854417bd20b9105ed68c8cced796e2dca5e90cfa74dc188
            • Instruction ID: 3a59bc611d4a36118ea21c6f86ac736072893baa26f317f8f80da3420256d125
            • Opcode Fuzzy Hash: 5b0d0eba16d44ff05854417bd20b9105ed68c8cced796e2dca5e90cfa74dc188
            • Instruction Fuzzy Hash: 5241E872A0020A7EDF109BA5CC81FEF77B9DF89708F00406AFA01F7181D7789A058769
            APIs
            • SendMessageW.USER32(?,00001132,00000000,?), ref: 0047A85A
            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0047A86F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: '
            • API String ID: 3850602802-1997036262
            • Opcode ID: 5b060f6150296566c2fbd5f5dd0943d36ccb891b7dccd1180b7872ed752c64e7
            • Instruction ID: df0d06c3975999d3420f212a39c62cc5a75e3b6aa4152ba0fa56d7029d35760d
            • Opcode Fuzzy Hash: 5b060f6150296566c2fbd5f5dd0943d36ccb891b7dccd1180b7872ed752c64e7
            • Instruction Fuzzy Hash: 2F412874E013099FDB14DF68C880BDE7BB9FB48304F11406AE908AB381D774A952CFA6
            APIs
            • DestroyWindow.USER32(?,?,?,?), ref: 0047980E
            • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0047984A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Window$DestroyMove
            • String ID: static
            • API String ID: 2139405536-2160076837
            • Opcode ID: 9cbbdd41917b552a6e4b6e5e7c6f3b844dd9ce940d07ef7098271dee245c6374
            • Instruction ID: 6f1fcb5843ac1f5c818102564327e2679437655490a7abf6e06d98d991e5bb6e
            • Opcode Fuzzy Hash: 9cbbdd41917b552a6e4b6e5e7c6f3b844dd9ce940d07ef7098271dee245c6374
            • Instruction Fuzzy Hash: 5F319071110604AAEB109F75DC80BFB73A9FF59764F00861EF8A9C7150DA38AC51C768
            APIs
            • _memset.LIBCMT ref: 004551C6
            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00455201
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: InfoItemMenu_memset
            • String ID: 0
            • API String ID: 2223754486-4108050209
            • Opcode ID: 57886baccc68b22bd6bd355c073c5ed209e60a77fee4f006122da44205f12476
            • Instruction ID: 98827948d23d78b444b9b42d4d9ff022d48a1b29de4fcf806677f0bebbee31f0
            • Opcode Fuzzy Hash: 57886baccc68b22bd6bd355c073c5ed209e60a77fee4f006122da44205f12476
            • Instruction Fuzzy Hash: 3F310531A00704ABDB24CF89D854BBEBBF4AF45351F14006BFD85A62A2D7789948CF19
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: __snwprintf
            • String ID: , $$AUTOITCALLVARIABLE%d
            • API String ID: 2391506597-2584243854
            • Opcode ID: a5c7a8984b6b207a27f46b7069ccaee90e352d18d9b78483c7c3e0bcd79c353d
            • Instruction ID: 7467f7872bc7c2626849a34976cb38a9629e962a9ce5ac86ec3b5116d3b410a3
            • Opcode Fuzzy Hash: a5c7a8984b6b207a27f46b7069ccaee90e352d18d9b78483c7c3e0bcd79c353d
            • Instruction Fuzzy Hash: 7B218E71A00218ABCF11EF65D882FEE77B4AF45304F11445FF405AB191EB78EA45CBAA
            APIs
            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0047945C
            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00479467
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: Combobox
            • API String ID: 3850602802-2096851135
            • Opcode ID: 24b06f1d3c964c0a542659c1f67c0a9de3461b3ce9855f9fafafb9f7ea830190
            • Instruction ID: 49a3216b925195458f163f843c0c2a292b9a7af1c32e12c88312dfc6ce393180
            • Opcode Fuzzy Hash: 24b06f1d3c964c0a542659c1f67c0a9de3461b3ce9855f9fafafb9f7ea830190
            • Instruction Fuzzy Hash: CA11B6713002087FEF119E64DC81FFB376EEB883A4F10812AF918973A0D6399C528768
            APIs
              • Part of subcall function 0042B34E: GetWindowLongW.USER32(?,000000EB), ref: 0042B35F
            • GetActiveWindow.USER32 ref: 0047DA7B
            • EnumChildWindows.USER32(?,0047D75F,00000000), ref: 0047DAF5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Window$ActiveChildEnumLongWindows
            • String ID: T1F
            • API String ID: 3814560230-3440819305
            • Opcode ID: d4d97808603640f6926f2ef28f008995ee3515483d6e35b830cce5263c4df7c0
            • Instruction ID: ddae3f2b98f05d4f6250856e0d88ba6cb70f30ce86967f127e6ea6a6e8052d54
            • Opcode Fuzzy Hash: d4d97808603640f6926f2ef28f008995ee3515483d6e35b830cce5263c4df7c0
            • Instruction Fuzzy Hash: CA212A35615201EFC714DF28E850AA677F5FF59320F25462BE86A873E0D734B840CB68
            APIs
              • Part of subcall function 0042D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0042D1BA
              • Part of subcall function 0042D17C: GetStockObject.GDI32(00000011), ref: 0042D1CE
              • Part of subcall function 0042D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 0042D1D8
            • GetWindowRect.USER32(00000000,?), ref: 00479968
            • GetSysColor.USER32(00000012), ref: 00479982
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Window$ColorCreateMessageObjectRectSendStock
            • String ID: static
            • API String ID: 1983116058-2160076837
            • Opcode ID: fc9774a6d599f5ad7d7f45ff6660e96f27b7cd6f6e7f8b311ffa2d94ef0e4215
            • Instruction ID: d491615f3a206f4ae6196440530606b0a667da0e807d4d6cb29fdec2e67eaffb
            • Opcode Fuzzy Hash: fc9774a6d599f5ad7d7f45ff6660e96f27b7cd6f6e7f8b311ffa2d94ef0e4215
            • Instruction Fuzzy Hash: 6F112CB2510209AFDB04DFB8CC45EEA7BB8FB48354F05462EF955D2250D738E851DB54
            APIs
            • GetWindowTextLengthW.USER32(00000000), ref: 00479699
            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 004796A8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: LengthMessageSendTextWindow
            • String ID: edit
            • API String ID: 2978978980-2167791130
            • Opcode ID: 3ecf5f39a06189be9bc85aa0c79a2055c5ff952cf7a056ba3d6c732472a0b907
            • Instruction ID: 82b55cef058d4d939aaa24889a10cbfc957542157ba903f6873597400a1f154b
            • Opcode Fuzzy Hash: 3ecf5f39a06189be9bc85aa0c79a2055c5ff952cf7a056ba3d6c732472a0b907
            • Instruction Fuzzy Hash: 78119E71500208ABEF105FA4DC44EFB3B6AEB15378F60832AF969932E0C739DC519768
            APIs
            • _memset.LIBCMT ref: 004552D5
            • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 004552F4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: InfoItemMenu_memset
            • String ID: 0
            • API String ID: 2223754486-4108050209
            • Opcode ID: 5521a330af807d1eaba27fa4afb8095a6cb364d2807d60911dd85939ee313ff5
            • Instruction ID: 1498dc996eeb07b49aa9b7c1fb549df67b2c1fe5f8ad32c05656961fb29728b7
            • Opcode Fuzzy Hash: 5521a330af807d1eaba27fa4afb8095a6cb364d2807d60911dd85939ee313ff5
            • Instruction Fuzzy Hash: 5D11D371A01614ABDB10DA99D914BBA77B8AB05751F040077FD05A72B1D3B8ED08CB99
            APIs
            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00464DF5
            • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00464E1E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Internet$OpenOption
            • String ID: <local>
            • API String ID: 942729171-4266983199
            • Opcode ID: 4688056092bf3329aa4ce397a114d4ecbdaa7700242586da192e1ec716d5dedb
            • Instruction ID: f35570c0b643999c3cb03b2930bf117b5979567f7ff51ee0067b8bf2c2bcc3fe
            • Opcode Fuzzy Hash: 4688056092bf3329aa4ce397a114d4ecbdaa7700242586da192e1ec716d5dedb
            • Instruction Fuzzy Hash: F611E0B0900221BBDF248F51CC88EFBFAA8FF56751F10822BF10546240E3785941C6F6
            APIs
            • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 004437A7
            • ___raise_securityfailure.LIBCMT ref: 0044388E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: FeaturePresentProcessor___raise_securityfailure
            • String ID: (M
            • API String ID: 3761405300-1960611114
            • Opcode ID: bd708df5f622090fdce387b79b712afb0215fd9ac19271bfe72a61e620822ba9
            • Instruction ID: 24ac5eae8874abb07ca19468fbc00d0696ba85afb0728b037f6b255853fd88df
            • Opcode Fuzzy Hash: bd708df5f622090fdce387b79b712afb0215fd9ac19271bfe72a61e620822ba9
            • Instruction Fuzzy Hash: 9621E2B5502204DAEB40DF65E985B453BF5FB48319F20983BE5098B3A1E3B4A980CF4D
            APIs
            • inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 0046A84E
            • htons.WSOCK32(00000000,?,00000000), ref: 0046A88B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: htonsinet_addr
            • String ID: 255.255.255.255
            • API String ID: 3832099526-2422070025
            • Opcode ID: e639932bb92c23762fa66e58457b564385edbe6bf18e71789e334ccdf4158c9c
            • Instruction ID: be72ee6d9a1d1aa7a560d39f9b4a1fb31a46ac2ee54d02815704df5d14c8a60b
            • Opcode Fuzzy Hash: e639932bb92c23762fa66e58457b564385edbe6bf18e71789e334ccdf4158c9c
            • Instruction Fuzzy Hash: A401C475600304ABCB10EF68C886FADB364EF44314F10846BE516A73D1E779E8158B5B
            APIs
            • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 0044B7EF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: ComboBox$ListBox
            • API String ID: 3850602802-1403004172
            • Opcode ID: 4774570f363ef0959f673899c68badc50b9ce6214f5685ca384e05b6d3ae355e
            • Instruction ID: 50edc98c106b932b74f37f9373f2574024242eca1d1f92f97ee619f8fa4deb17
            • Opcode Fuzzy Hash: 4774570f363ef0959f673899c68badc50b9ce6214f5685ca384e05b6d3ae355e
            • Instruction Fuzzy Hash: D301F571640114ABDB04EBA4CC42EFE3379AF45314710061FF461932C2DB78590887A8
            APIs
            • SendMessageW.USER32(?,00000180,00000000,?), ref: 0044B6EB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: ComboBox$ListBox
            • API String ID: 3850602802-1403004172
            • Opcode ID: 2a662205d7ab96e33bbb53e0ac1cc70c0698f2f8328e43202d965d64f3ef0bd4
            • Instruction ID: 2990784ab934e24b8b92e3167fc650c2c5b4243f46ed8d3ba6afba1256834476
            • Opcode Fuzzy Hash: 2a662205d7ab96e33bbb53e0ac1cc70c0698f2f8328e43202d965d64f3ef0bd4
            • Instruction Fuzzy Hash: 25018475A41104ABDB04EBA5CE52FFF73B89F05344F10002FB402A3281DB989E1887EE
            APIs
            • SendMessageW.USER32(?,00000182,?,00000000), ref: 0044B76C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: ComboBox$ListBox
            • API String ID: 3850602802-1403004172
            • Opcode ID: 670a7febc4a7e3b8625b402cb66bfb634e3524142758484f696362f97284be1e
            • Instruction ID: 3a03c8fd60c178fd2ae647588d4725a95986fdd64c9a2f032ee5575cdf5cca39
            • Opcode Fuzzy Hash: 670a7febc4a7e3b8625b402cb66bfb634e3524142758484f696362f97284be1e
            • Instruction Fuzzy Hash: 3E018475680104BADB04E6A4DA42FFE73A89B15344B10002FB401B3192DB689E0987AD
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: __calloc_crt
            • String ID: "M
            • API String ID: 3494438863-1273950097
            • Opcode ID: d6a4e3e7e6a352fe7c3d98b417e747479f86baff58c2b5641124a51de18f7d9d
            • Instruction ID: 6f40db5d328d19517876ecdd26c0099eea240a697c1930f5d638e0d8fd26842e
            • Opcode Fuzzy Hash: d6a4e3e7e6a352fe7c3d98b417e747479f86baff58c2b5641124a51de18f7d9d
            • Instruction Fuzzy Hash: 8DF04C7020A2025AE3148F5ABD40BE667E4FB5C724F10507FF200CA294E77CD8818B9C
            APIs
            • LoadImageW.USER32(00410000,00000063,00000001,00000010,00000010,00000000), ref: 00414048
            • EnumResourceNamesW.KERNEL32(00000000,0000000E,004567E9,00000063,00000000,75A50280,?,?,00413EE1,?,?,000000FF), ref: 004841B3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: EnumImageLoadNamesResource
            • String ID: >A
            • API String ID: 1578290342-2754608871
            • Opcode ID: 6a21a2d58aff5ec4ce5a2631acbac05fc29a60f34b9f3c933a3eed889aff5be6
            • Instruction ID: 2cc723422c72a666259eadd1a50aa58a5c57cb81a827ff4b0d25ab0f78b4f053
            • Opcode Fuzzy Hash: 6a21a2d58aff5ec4ce5a2631acbac05fc29a60f34b9f3c933a3eed889aff5be6
            • Instruction Fuzzy Hash: CAF06D31741321B7E6205B1AFC4AFD63FA9A758BB5F104527FA14AA1E0D2E494808B9C
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: ClassName_wcscmp
            • String ID: #32770
            • API String ID: 2292705959-463685578
            • Opcode ID: 8d2cf52eb49a1897352eb4ee7bf7f73facd83f7c4db3381b29e99525f90d6d8c
            • Instruction ID: fdb2b5af58779a1a4506751f987bc79c667882b029603a232ca0f14ee6995e02
            • Opcode Fuzzy Hash: 8d2cf52eb49a1897352eb4ee7bf7f73facd83f7c4db3381b29e99525f90d6d8c
            • Instruction Fuzzy Hash: 06E09277A042242BD720ABA5AC49F87FBACAB65765F00006BB905E3141D664AA0587E8
            APIs
            • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 0044A63F
              • Part of subcall function 004313F1: _doexit.LIBCMT ref: 004313FB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: Message_doexit
            • String ID: AutoIt$Error allocating memory.
            • API String ID: 1993061046-4017498283
            • Opcode ID: 17e57bf1bfb5dc48582ed112940ef2b16ced0726720fa0a2c9817bce07c7d905
            • Instruction ID: 35d84e7d82ade84fbffbc8f86d5be6f8fe773a0aacfed885f4fe17045b82a64a
            • Opcode Fuzzy Hash: 17e57bf1bfb5dc48582ed112940ef2b16ced0726720fa0a2c9817bce07c7d905
            • Instruction Fuzzy Hash: 0CD05B313C432833D31436997D1BFC975488B29B95F14003BBF08955D249EED99041ED
            APIs
            • GetSystemDirectoryW.KERNEL32(?), ref: 0048ACC0
            • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 0048AEBD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: DirectoryFreeLibrarySystem
            • String ID: WIN_XPe
            • API String ID: 510247158-3257408948
            • Opcode ID: db70b7b358ef3b54303050e8dc4d0137b831dd5a6d593655f99dd66e92739479
            • Instruction ID: 94c99a913c9484aba2b35362acaaede6f81a881e821ec043bc66814ed695d252
            • Opcode Fuzzy Hash: db70b7b358ef3b54303050e8dc4d0137b831dd5a6d593655f99dd66e92739479
            • Instruction Fuzzy Hash: 70E06570C00109DFDB11EBA5D9449ECF7B8AB58300F1084A7E002B2260DBB45A85DF3A
            APIs
            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 004786E2
            • PostMessageW.USER32(00000000), ref: 004786E9
              • Part of subcall function 00457A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00457AD0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: FindMessagePostSleepWindow
            • String ID: Shell_TrayWnd
            • API String ID: 529655941-2988720461
            • Opcode ID: d9c7b8eead11efad4b291914df12913c9e5f27e076faaac72b75a3377fd8f358
            • Instruction ID: e03843c4374babc8d8fdad8d1f1cda1b6286a23fe41c7da822a320d6f378fcc4
            • Opcode Fuzzy Hash: d9c7b8eead11efad4b291914df12913c9e5f27e076faaac72b75a3377fd8f358
            • Instruction Fuzzy Hash: 8AD0C9317853147BE6646770AC0BFC66A589B54B22F11083AB645AA1D1C9A8AD40875C
            APIs
            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 004786A2
            • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 004786B5
              • Part of subcall function 00457A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00457AD0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1277927055.0000000000411000.00000020.00000001.01000000.00000003.sdmp, Offset: 00410000, based on PE: true
            • Associated: 00000000.00000002.1277881690.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.000000000049D000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278001146.00000000004BE000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278063299.00000000004CA000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1278096228.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_410000_LOI REQUEST.jbxd
            Similarity
            • API ID: FindMessagePostSleepWindow
            • String ID: Shell_TrayWnd
            • API String ID: 529655941-2988720461
            • Opcode ID: ce31679cbbbed40f4264f6a2da3bb25f46dd5b88bedeca20f5c624e3ce6838ff
            • Instruction ID: bad59880fd43ec88827a739532b685f6edc10647a6682564418e372b232661b0
            • Opcode Fuzzy Hash: ce31679cbbbed40f4264f6a2da3bb25f46dd5b88bedeca20f5c624e3ce6838ff
            • Instruction Fuzzy Hash: D2D01235784314B7E7647770AC0BFC67A589B54B22F11083BB749AA1D1C9E8ED40C75C