Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
QuickTextPaste.exe

Overview

General Information

Sample name:QuickTextPaste.exe
Analysis ID:1562564
MD5:1fdc72504c644ec1fcc368c24f12d94d
SHA1:fb77c3f53398a7781de54ae0596fed19ed7524a4
SHA256:07fdc5476b30c54df6fbb7991f855d6c9ee1d15e000e4966c06f8f2f3951b381
Tags:Compilazioneprotetticopyrightexeuser-JAMESWT_MHT
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (creates a PE file in dynamic memory)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Drops large PE files
Injects a PE file into a foreign processes
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Compiles C# or VB.Net code
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to simulate keystroke presses
Contains long sleeps (>= 3 min)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • QuickTextPaste.exe (PID: 7320 cmdline: "C:\Users\user\Desktop\QuickTextPaste.exe" MD5: 1FDC72504C644EC1FCC368C24F12D94D)
    • csc.exe (PID: 7588 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
  • cleanup
{"C2 url": ["45.32.146.65"], "Port": 6868, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1626571461.0000000002182000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
    00000000.00000002.1626571461.0000000002182000.00000040.00001000.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x6f82:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x701f:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x7134:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x6df4:$cnc4: POST / HTTP/1.1
    00000003.00000002.3849434803.0000000005002000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
      00000003.00000002.3849434803.0000000005002000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x6f82:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x701f:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x7134:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0x6df4:$cnc4: POST / HTTP/1.1
      00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
        Click to see the 3 entries
        SourceRuleDescriptionAuthorStrings
        3.2.csc.exe.5000000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
          3.2.csc.exe.5000000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0x7182:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
          • 0x721f:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
          • 0x7334:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
          • 0x6ff4:$cnc4: POST / HTTP/1.1
          0.2.QuickTextPaste.exe.49eb26.1.raw.unpackJoeSecurity_XWormYara detected XWormJoe Security
            0.2.QuickTextPaste.exe.49eb26.1.raw.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x7182:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x721f:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x7334:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x6ff4:$cnc4: POST / HTTP/1.1
            0.2.QuickTextPaste.exe.2180000.2.unpackJoeSecurity_XWormYara detected XWormJoe Security
              Click to see the 5 entries

              System Summary

              barindex
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\Pictures\DesktopInfo\Bin\DesktopInfo.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\QuickTextPaste.exe, ProcessId: 7320, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DesktopInfo
              Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ProcessId: 7588, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-25T18:06:07.898238+010028531931Malware Command and Control Activity Detected192.168.2.94971645.32.146.656868TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: QuickTextPaste.exeAvira: detected
              Source: C:\Users\user\Pictures\DesktopInfo\Bin\DesktopInfo.exeAvira: detection malicious, Label: TR/Crypt.XPACK.Gen2
              Source: 00000003.00000002.3864228386.00000000070C1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["45.32.146.65"], "Port": 6868, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
              Source: QuickTextPaste.exeReversingLabs: Detection: 60%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: 3.2.csc.exe.5000000.0.unpackString decryptor: 45.32.146.65
              Source: 3.2.csc.exe.5000000.0.unpackString decryptor: 6868
              Source: 3.2.csc.exe.5000000.0.unpackString decryptor: <123456789>
              Source: 3.2.csc.exe.5000000.0.unpackString decryptor: <Xwormmm>
              Source: 3.2.csc.exe.5000000.0.unpackString decryptor: XWorm V5.6
              Source: 3.2.csc.exe.5000000.0.unpackString decryptor: USB.exe
              Source: 3.2.csc.exe.5000000.0.unpackString decryptor: %AppData%
              Source: 3.2.csc.exe.5000000.0.unpackString decryptor: XClient.exe

              Compliance

              barindex
              Source: C:\Users\user\Desktop\QuickTextPaste.exeUnpacked PE file: 0.2.QuickTextPaste.exe.2180000.2.unpack
              Source: QuickTextPaste.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: Binary string: StrongNameFreeBufferStrongNameTokenFromPublicKeyStrongNameErrorInfo.PDBdiasymreader.dllDllGetClassObject%X%X%X%X%X%X%X%X%X%X%X.TMP0x%016I64xCSCalink.dll with IAlink3 source: csc.exe, 00000003.00000003.1625309005.00000000080E6000.00000004.00000800.00020000.00000000.sdmp, XClient.exe.3.dr
              Source: Binary string: csc.pdb source: csc.exe, 00000003.00000003.1625309005.00000000080E6000.00000004.00000800.00020000.00000000.sdmp, XClient.exe.3.dr
              Source: Binary string: csc.pdbF source: csc.exe, 00000003.00000003.1625309005.00000000080E6000.00000004.00000800.00020000.00000000.sdmp, XClient.exe.3.dr

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2855924 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.9:49709 -> 45.32.146.65:6868
              Source: Network trafficSuricata IDS: 2853193 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.9:49716 -> 45.32.146.65:6868
              Source: Malware configuration extractorURLs: 45.32.146.65
              Source: global trafficTCP traffic: 192.168.2.9:49709 -> 45.32.146.65:6868
              Source: Joe Sandbox ViewASN Name: AS-CHOOPAUS AS-CHOOPAUS
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: unknownTCP traffic detected without corresponding DNS query: 45.32.146.65
              Source: csc.exe, 00000003.00000002.3864228386.00000000070C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: 0_2_00426601 SetWindowsHookExW 0000000D,0041ED8B,00000000,000000000_2_00426601
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: 0_2_00433F0D OpenClipboard,RegisterClipboardFormatW,GetClipboardData,GlobalLock,CloseClipboard,0_2_00433F0D
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: 0_2_00433F0D OpenClipboard,RegisterClipboardFormatW,GetClipboardData,GlobalLock,CloseClipboard,0_2_00433F0D
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: 0_2_004324DC IsWindow,GetKeyboardState,GetKeyboardState,keybd_event,keybd_event,SetForegroundWindow,GetKeyboardState,keybd_event,0_2_004324DC

              System Summary

              barindex
              Source: 3.2.csc.exe.5000000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0.2.QuickTextPaste.exe.49eb26.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0.2.QuickTextPaste.exe.2180000.2.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0.2.QuickTextPaste.exe.49eb26.1.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0.2.QuickTextPaste.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000000.00000002.1626571461.0000000002182000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000003.00000002.3849434803.0000000005002000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: C:\Users\user\Desktop\QuickTextPaste.exeFile dump: DesktopInfo.exe.0.dr 979567349Jump to dropped file
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess Stats: CPU usage > 49%
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: 0_2_00406EBE0_2_00406EBE
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: 0_2_0040691A0_2_0040691A
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: 0_2_00402A350_2_00402A35
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: 0_2_0040EB7D0_2_0040EB7D
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: 0_2_0041E3970_2_0041E397
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: 0_2_0040EBBA0_2_0040EBBA
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: 0_2_0040747A0_2_0040747A
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: 0_2_00402CBF0_2_00402CBF
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: 0_2_0040759C0_2_0040759C
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: 0_2_00402D9D0_2_00402D9D
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: 0_2_0040EE300_2_0040EE30
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: 0_2_0041EF190_2_0041EF19
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: 0_2_0040EF2D0_2_0040EF2D
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: 0_2_004067E00_2_004067E0
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: 0_2_00402FF20_2_00402FF2
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: 0_2_00402FF80_2_00402FF8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_0573B7F83_2_0573B7F8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_05738FD03_2_05738FD0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_057341383_2_05734138
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_057310303_2_05731030
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_057398A03_2_057398A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_05733B403_2_05733B40
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_05738C883_2_05738C88
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 3_2_057316103_2_05731610
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: String function: 00437C80 appears 38 times
              Source: QuickTextPaste.exeBinary or memory string: OriginalFilename vs QuickTextPaste.exe
              Source: QuickTextPaste.exe, 00000000.00000002.1626571461.0000000002182000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameXClient.exe4 vs QuickTextPaste.exe
              Source: QuickTextPaste.exe, 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXClient.exe4 vs QuickTextPaste.exe
              Source: QuickTextPaste.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: 3.2.csc.exe.5000000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0.2.QuickTextPaste.exe.49eb26.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0.2.QuickTextPaste.exe.2180000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0.2.QuickTextPaste.exe.49eb26.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0.2.QuickTextPaste.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000000.00000002.1626571461.0000000002182000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000003.00000002.3849434803.0000000005002000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0.2.QuickTextPaste.exe.49eb26.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.QuickTextPaste.exe.49eb26.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.QuickTextPaste.exe.49eb26.1.raw.unpack, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/3@0/1
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: 0_2_00426601 GetModuleHandleW,SetWindowsHookExW,GetLastError,FormatMessageW,MessageBoxW,LocalFree,0_2_00426601
              Source: C:\Users\user\Desktop\QuickTextPaste.exeFile created: C:\Users\user\Pictures\DesktopInfoJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMutant created: NULL
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMutant created: \Sessions\1\BaseNamedObjects\2IZ7P3Po0yEtvO09
              Source: QuickTextPaste.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\QuickTextPaste.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: QuickTextPaste.exeReversingLabs: Detection: 60%
              Source: QuickTextPaste.exeString found in binary or memory: <!--StartFrag
              Source: QuickTextPaste.exeString found in binary or memory: <!--StartFragment-->
              Source: QuickTextPaste.exeString found in binary or memory: EndSelectionStartSelection<!--EndFragEndFragment<!--StartFragStartFragmentEndHTML%08u<html>StartHTML<!--EndFragment--></body>
              Source: QuickTextPaste.exeString found in binary or memory: <!--StartFragment-->HTML Format
              Source: C:\Users\user\Desktop\QuickTextPaste.exeFile read: C:\Users\user\Desktop\QuickTextPaste.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\QuickTextPaste.exe "C:\Users\user\Desktop\QuickTextPaste.exe"
              Source: C:\Users\user\Desktop\QuickTextPaste.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
              Source: C:\Users\user\Desktop\QuickTextPaste.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
              Source: C:\Users\user\Desktop\QuickTextPaste.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\QuickTextPaste.exeSection loaded: k7rn7l32.dllJump to behavior
              Source: C:\Users\user\Desktop\QuickTextPaste.exeSection loaded: ntd3ll.dllJump to behavior
              Source: C:\Users\user\Desktop\QuickTextPaste.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\QuickTextPaste.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: linkinfo.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ntshrui.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cscapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: avicap32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: msvfw32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32Jump to behavior
              Source: XClient.lnk.3.drLNK file: ..\..\..\..\..\XClient.exe
              Source: Binary string: StrongNameFreeBufferStrongNameTokenFromPublicKeyStrongNameErrorInfo.PDBdiasymreader.dllDllGetClassObject%X%X%X%X%X%X%X%X%X%X%X.TMP0x%016I64xCSCalink.dll with IAlink3 source: csc.exe, 00000003.00000003.1625309005.00000000080E6000.00000004.00000800.00020000.00000000.sdmp, XClient.exe.3.dr
              Source: Binary string: csc.pdb source: csc.exe, 00000003.00000003.1625309005.00000000080E6000.00000004.00000800.00020000.00000000.sdmp, XClient.exe.3.dr
              Source: Binary string: csc.pdbF source: csc.exe, 00000003.00000003.1625309005.00000000080E6000.00000004.00000800.00020000.00000000.sdmp, XClient.exe.3.dr

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\QuickTextPaste.exeUnpacked PE file: 0.2.QuickTextPaste.exe.2180000.2.unpack
              Source: 0.2.QuickTextPaste.exe.49eb26.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: 0.2.QuickTextPaste.exe.49eb26.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: 0.2.QuickTextPaste.exe.49eb26.1.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
              Source: 0.2.QuickTextPaste.exe.49eb26.1.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
              Source: 0.2.QuickTextPaste.exe.49eb26.1.raw.unpack, Messages.cs.Net Code: Memory
              Source: C:\Users\user\Desktop\QuickTextPaste.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
              Source: C:\Users\user\Desktop\QuickTextPaste.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: 0_2_00434350 LoadLibraryW,GetProcAddress,0_2_00434350
              Source: QuickTextPaste.exeStatic PE information: real checksum: 0x844df should be: 0x10233d
              Source: XClient.exe.3.drStatic PE information: section name: .didat
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: 0_2_00437C80 push eax; ret 0_2_00437C9E
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: 0_2_00437CA0 push eax; ret 0_2_00437CCE
              Source: QuickTextPaste.exeStatic PE information: section name: .text entropy: 6.817168827886
              Source: DesktopInfo.exe.0.drStatic PE information: section name: .text entropy: 6.817168827886
              Source: C:\Users\user\Desktop\QuickTextPaste.exeFile created: C:\Users\user\Pictures\DesktopInfo\Bin\DesktopInfo.exeJump to dropped file
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Roaming\XClient.exeJump to dropped file
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnkJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnkJump to behavior
              Source: C:\Users\user\Desktop\QuickTextPaste.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run DesktopInfoJump to behavior
              Source: C:\Users\user\Desktop\QuickTextPaste.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run DesktopInfoJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: 5730000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: 70C0000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: 6DF0000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWindow / User API: threadDelayed 1433Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWindow / User API: threadDelayed 8314Jump to behavior
              Source: C:\Users\user\Desktop\QuickTextPaste.exeDropped PE file which has not been started: C:\Users\user\Pictures\DesktopInfo\Bin\DesktopInfo.exeJump to dropped file
              Source: C:\Users\user\Desktop\QuickTextPaste.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_0-9789
              Source: C:\Users\user\Desktop\QuickTextPaste.exeAPI coverage: 0.5 %
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 7772Thread sleep time: -1844674407370954s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 7784Thread sleep count: 1433 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 7784Thread sleep count: 8314 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: csc.exe, 00000003.00000002.3853497945.00000000052F8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: 0_2_00434350 LoadLibraryW,GetProcAddress,0_2_00434350
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\QuickTextPaste.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\QuickTextPaste.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 5000000 protect: page execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\QuickTextPaste.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 5000000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\QuickTextPaste.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 5000000Jump to behavior
              Source: C:\Users\user\Desktop\QuickTextPaste.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 4C82008Jump to behavior
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: 0_2_004324DC IsWindow,GetKeyboardState,GetKeyboardState,keybd_event,keybd_event,SetForegroundWindow,GetKeyboardState,keybd_event,0_2_004324DC
              Source: QuickTextPaste.exeBinary or memory string: Shell_TrayWnd
              Source: QuickTextPaste.exe, DesktopInfo.exe.0.drBinary or memory string: WidthBytes: %d bmWidth:%d bmBitsPixel:%d hb:%dNo-HBitmap<br>0};%d,UCHAR img_data[]={int ys=%d;int xs=%d;No HBITMAPShell_TrayWndTrayNotifyWndC:\shell32SetMenuInfoNULL
              Source: QuickTextPaste.exe, DesktopInfo.exe.0.drBinary or memory string: GDtGDXGDHGDWorkerWSysListView32SHELLDLL_DefViewProgram ManagerUniformResourceLocatorToolbarWindow32SHAutoCompleteSHLWAPI.DLLBackInternet Explorer_Server
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: GetLocaleInfoW,0_2_0043271F
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: GetLocaleInfoW,0_2_004327AB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\QuickTextPaste.exeCode function: 0_2_00421838 __EH_prolog,GetLocalTime,0_2_00421838
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: csc.exe, 00000003.00000002.3865330103.000000000A4B0000.00000004.00000020.00020000.00000000.sdmp, csc.exe, 00000003.00000002.3853497945.00000000053A5000.00000004.00000020.00020000.00000000.sdmp, csc.exe, 00000003.00000002.3853497945.00000000052F8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 3.2.csc.exe.5000000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.QuickTextPaste.exe.49eb26.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.QuickTextPaste.exe.2180000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.QuickTextPaste.exe.49eb26.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.QuickTextPaste.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1626571461.0000000002182000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.3849434803.0000000005002000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: QuickTextPaste.exe PID: 7320, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: csc.exe PID: 7588, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 3.2.csc.exe.5000000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.QuickTextPaste.exe.49eb26.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.QuickTextPaste.exe.2180000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.QuickTextPaste.exe.49eb26.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.QuickTextPaste.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1626571461.0000000002182000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.3849434803.0000000005002000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: QuickTextPaste.exe PID: 7320, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: csc.exe PID: 7588, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
              Windows Management Instrumentation
              21
              Registry Run Keys / Startup Folder
              32
              Process Injection
              1
              Masquerading
              111
              Input Capture
              1
              System Time Discovery
              Remote Services111
              Input Capture
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts2
              Command and Scripting Interpreter
              1
              DLL Side-Loading
              21
              Registry Run Keys / Startup Folder
              11
              Disable or Modify Tools
              LSASS Memory121
              Security Software Discovery
              Remote Desktop Protocol11
              Archive Collected Data
              1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts2
              Native API
              Logon Script (Windows)1
              DLL Side-Loading
              131
              Virtualization/Sandbox Evasion
              Security Account Manager1
              Process Discovery
              SMB/Windows Admin Shares2
              Clipboard Data
              1
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook32
              Process Injection
              NTDS131
              Virtualization/Sandbox Evasion
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
              Deobfuscate/Decode Files or Information
              LSA Secrets1
              Application Window Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
              Obfuscated Files or Information
              Cached Domain Credentials1
              File and Directory Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
              Software Packing
              DCSync24
              System Information Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              DLL Side-Loading
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              QuickTextPaste.exe61%ReversingLabsWin32.Trojan.Leonem
              QuickTextPaste.exe100%AviraTR/Crypt.XPACK.Gen2
              SourceDetectionScannerLabelLink
              C:\Users\user\Pictures\DesktopInfo\Bin\DesktopInfo.exe100%AviraTR/Crypt.XPACK.Gen2
              C:\Users\user\AppData\Roaming\XClient.exe0%ReversingLabs
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              45.32.146.650%Avira URL Cloudsafe
              No contacted domains info
              NameMaliciousAntivirus DetectionReputation
              45.32.146.65true
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namecsc.exe, 00000003.00000002.3864228386.00000000070C1000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                45.32.146.65
                unknownUnited States
                20473AS-CHOOPAUStrue
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1562564
                Start date and time:2024-11-25 18:02:03 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 8m 17s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:9
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:QuickTextPaste.exe
                Detection:MAL
                Classification:mal100.troj.spyw.evad.winEXE@3/3@0/1
                EGA Information:
                • Successful, ratio: 50%
                HCA Information:
                • Successful, ratio: 71%
                • Number of executed functions: 38
                • Number of non-executed functions: 87
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Override analysis time to 240000 for current running targets taking high CPU consumption
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target csc.exe, PID 7588 because it is empty
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • VT rate limit hit for: QuickTextPaste.exe
                TimeTypeDescription
                12:03:23API Interceptor6823129x Sleep call for process: csc.exe modified
                17:03:24AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run DesktopInfo C:\Users\user\Pictures\DesktopInfo\Bin\DesktopInfo.exe
                17:03:32AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run DesktopInfo C:\Users\user\Pictures\DesktopInfo\Bin\DesktopInfo.exe
                17:03:41AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                45.32.146.6503876399.exeGet hashmaliciousXmrigBrowse
                • accept-file.com/dashboard/para/un/api/endpoint.php
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                AS-CHOOPAUSWIN64BIT.exeGet hashmaliciousMeshAgentBrowse
                • 45.63.127.16
                WIN64BIT.exeGet hashmaliciousMeshAgentBrowse
                • 45.63.127.16
                ps1009.ps1Get hashmaliciousUnknownBrowse
                • 108.61.211.36
                dvLKUpkeV8.elfGet hashmaliciousUnknownBrowse
                • 45.77.39.16
                https://www.canva.com/design/DAGXCpgrUrs/iMtluWgvWDmsrSdUOsij5Q/view?utm_content=DAGXCpgrUrs&utm_campaign=designshare&utm_medium=link&utm_source=editorGet hashmaliciousUnknownBrowse
                • 149.28.46.36
                arm.nn-20241120-0508.elfGet hashmaliciousMirai, OkiruBrowse
                • 44.173.79.74
                Setup.exeGet hashmaliciousUnknownBrowse
                • 207.246.91.177
                owari.arm7.elfGet hashmaliciousMiraiBrowse
                • 45.32.45.196
                owari.ppc.elfGet hashmaliciousUnknownBrowse
                • 104.238.167.204
                0kToM9fVGQ.exeGet hashmaliciousXmrigBrowse
                • 95.179.241.203
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                C:\Users\user\AppData\Roaming\XClient.exeres_out.exeGet hashmaliciousXenoRATBrowse
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Nov 25 16:03:22 2024, mtime=Mon Nov 25 16:03:22 2024, atime=Mon Nov 25 16:03:22 2024, length=2141552, window=hide
                  Category:dropped
                  Size (bytes):763
                  Entropy (8bit):5.062818943637931
                  Encrypted:false
                  SSDEEP:12:8/VN624oA/4f4tChSgedY//0tFctL2d8pVjAEqwNHkstmV:8/VN8TgsjgZN2dMhAEqwCstm
                  MD5:6F6B57DDAF09191583BD5946E1998911
                  SHA1:3FE4A82861D4BC05CFDE7475EED6074963B3060E
                  SHA-256:8D7490D8038AF2DD8EF0455161CE117375A083EBA572B5867FA0F32487F4DB38
                  SHA-512:D77E5FAF156E75C4C45C67C88070534D114E8F3D3B0506AB9DF1DE1085E7B54C0A15023F6FF086414E764894CF66323B9CAA74704895A4915F0046E39C1BD169
                  Malicious:false
                  Reputation:low
                  Preview:L..................F.... .....@.[?....@.[?....@.[?..p. .....................v.:..DG..Yr?.D..U..k0.&...&.......bBDj...=#..[?....r.[?......t...CFSF..1.....EWsG..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EWsGyY\...........................=...A.p.p.D.a.t.a...B.V.1.....yY[...Roaming.@......EWsGyY[............................h..R.o.a.m.i.n.g.....b.2.p. .yYl. .XClient.exe.H......yYl.yYl......)....................}k..X.C.l.i.e.n.t...e.x.e.......X...............-.......W...........}.......C:\Users\user\AppData\Roaming\XClient.exe........\.....\.....\.....\.....\.X.C.l.i.e.n.t...e.x.e.`.......X.......849224...........hT..CrF.f4... ...E._c...,...E...hT..CrF.f4... ...E._c...,...E..E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                  File Type:PE32 executable (console) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):2141552
                  Entropy (8bit):6.386741262990515
                  Encrypted:false
                  SSDEEP:49152:Mnqqr9wJI6S7RSSon9X6f4IeY0+h1s410I1xIdcxynt:Mnq29lFHon9X5Iddq41Lxry
                  MD5:EB80BB1CA9B9C7F516FF69AFCFD75B7D
                  SHA1:DB402FB24B206C4A378A74FD649C60A413CE5A92
                  SHA-256:38C407DBF41E99396B78D00DD796930D8838DCB4AF77C3F23BA0E800D1213EBE
                  SHA-512:B7669D624366D1B2C0D162053DEE91AA2A319DEA90B32E314DD8C8ABC7306035C262454A500DEDA3EF9ED833D409E958CAD759D7925E8E352B499EB86A17E814
                  Malicious:false
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Joe Sandbox View:
                  • Filename: res_out.exe, Detection: malicious, Browse
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......c..'...'...'....).&....H..%.......%....H..%......#......(......)....(.)...........H..(...'...P............6.&.......&...Rich'...........PE..L...JC.].........."..........~....................@........................... ......T!...@... .. ...........................T..........L............l .pA.......C......T...........................H?..@............P......l...`....................text...`........................... ..`.data...tM..........................@....idata.......P......................@..@.didat..@....p......................@....tls................................@....rsrc...L............ ..............@..@.reloc...C.......D...(..............@..B........................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\QuickTextPaste.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):979567349
                  Entropy (8bit):0.018309622341759393
                  Encrypted:false
                  SSDEEP:
                  MD5:E501EFBC24F246944EE95644B388CF15
                  SHA1:8870EA7C3D57A213A7962167450FAAC368561E65
                  SHA-256:B28C5899FB149E638DB5634B08032C3DAFF4559113EF8F40BED2EC97722902C7
                  SHA-512:3C0CB7A9AB7B14C435B695FC8FD01CA881EF45693975A1D1DF54ECF4AE2F21C050931715D93F6E04E2EB6FECAF2F5310A72AB9D1FF5CBDED77CB1CA57B104264
                  Malicious:true
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........................................................9......._.....Rich...................PE..L.....7g.............................~............@..................................D...................................................i..........."...)..............................................................4............................text.............................. ..`.rdata...w.......x..................@..@.data........@..."... ..............@....rsrc....i.......j...B..............@..@................................................................................................................................................................................................................................................................................................................................................................
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):7.080290762638287
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:QuickTextPaste.exe
                  File size:1'027'072 bytes
                  MD5:1fdc72504c644ec1fcc368c24f12d94d
                  SHA1:fb77c3f53398a7781de54ae0596fed19ed7524a4
                  SHA256:07fdc5476b30c54df6fbb7991f855d6c9ee1d15e000e4966c06f8f2f3951b381
                  SHA512:e214a4a09c6b8ad0526100d0d8e8bcfaf4b0844399e6b737d1740ac513eaf6e412d08e0ae74a1d69e5ee81f8d5ec35d16b3b937162eb8b5ae45ec275f300a88d
                  SSDEEP:12288:H1JjmFIYq7Dmy8tTB8ELASLB71s9Nxr/3tgOTSGaOqlL9/d/Ce4+s6SeTEETRnLE:bye7etHLvLBhmZPtgtd4cLTEQNE
                  TLSH:FD25AE007701852FD1AA78BA06ABA7F5AA691D761C334503725FBF2CEB38417E1117EE
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........................................................................9..........._.......Rich....................PE..L.....7g...
                  Icon Hash:0f2fcaabb0aaf830
                  Entrypoint:0x437ee0
                  Entrypoint Section:.text
                  Digitally signed:true
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                  DLL Characteristics:
                  Time Stamp:0x67371DD6 [Fri Nov 15 10:09:26 2024 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:e65d5d56989c1441945255d78668884e
                  Signature Valid:
                  Signature Issuer:
                  Signature Validation Error:
                  Error Number:
                  Not Before, Not After
                    Subject Chain
                      Version:
                      Thumbprint MD5:
                      Thumbprint SHA-1:
                      Thumbprint SHA-256:
                      Serial:
                      Instruction
                      push ebp
                      mov ebp, esp
                      push FFFFFFFFh
                      push 0043D1E8h
                      push 00438066h
                      mov eax, dword ptr fs:[00000000h]
                      push eax
                      mov dword ptr fs:[00000000h], esp
                      sub esp, 68h
                      push ebx
                      push esi
                      push edi
                      mov dword ptr [ebp-18h], esp
                      xor ebx, ebx
                      mov dword ptr [ebp-04h], ebx
                      push 00000002h
                      pop edi
                      push edi
                      call 00007EFE14691DA1h
                      nop
                      pop ecx
                      or dword ptr [004808F4h], FFFFFFFFh
                      or dword ptr [004808F8h], FFFFFFFFh
                      call dword ptr [0043C330h]
                      mov ecx, dword ptr [004808C8h]
                      mov dword ptr [eax], ecx
                      call dword ptr [0043C2ACh]
                      mov ecx, dword ptr [004808C4h]
                      mov dword ptr [eax], ecx
                      mov eax, dword ptr [0043C234h]
                      mov eax, dword ptr [eax]
                      mov dword ptr [004808F0h], eax
                      call 00007EFE146C8DADh
                      cmp dword ptr [00456140h], ebx
                      jne 00007EFE146C8C6Eh
                      push 00438096h
                      call dword ptr [0043C238h]
                      pop ecx
                      call 00007EFE146C8D7Fh
                      push 004440ECh
                      push 004440E8h
                      call 00007EFE146C8D6Ah
                      mov eax, dword ptr [004808C0h]
                      mov dword ptr [ebp-6Ch], eax
                      lea eax, dword ptr [ebp-6Ch]
                      push eax
                      push dword ptr [004808BCh]
                      lea eax, dword ptr [ebp-64h]
                      push eax
                      lea eax, dword ptr [ebp-70h]
                      push eax
                      lea eax, dword ptr [ebp-60h]
                      push eax
                      call dword ptr [0043C240h]
                      push 004440E4h
                      push 00444000h
                      Programming Language:
                      • [C++] VS98 (6.0) SP6 build 8804
                      • [EXP] VC++ 6.0 SP5 build 8804
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x418e80xdc.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x810000xa6908.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x722000x2908.data
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x3c0000x634.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x3a2ea0x3a400556493db292203113e5324c6d7f95608False0.5195773538090128data6.817168827886IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x3c0000x77cc0x780091c6ff2fd3bb8dc0dd623e04098000efFalse0.3382161458333333data4.707298007686286IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x440000x3c8fc0x12200044dced594e170048a01f833f33579cdFalse0.8952586206896552data7.634244653448693IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x810000xa69080xa6a00e46c92bd2102032dc0d1beac94412508False0.5088044472055514data6.990670517689552IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      PNG0x81f6c0xefecdata0.9566916313904266
                      TEXTINCLUDE0x90f580x49ASCII text, with CRLF line terminators1.0136986301369864
                      RT_BITMAP0x90fa40x3668Device independent bitmap graphic, 512 x 54 x 4, image size 13824, 16 important colorsGermanGermany0.16082711085582999
                      RT_BITMAP0x9460c0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128GermanGermany0.3620689655172414
                      RT_BITMAP0x946f40xd4Device independent bitmap graphic, 18 x 9 x 4, image size 108GermanGermany0.42924528301886794
                      RT_BITMAP0x947c80x158Device independent bitmap graphic, 32 x 15 x 4, image size 240GermanGermany0.3081395348837209
                      RT_BITMAP0x949200xd4Device independent bitmap graphic, 18 x 9 x 4, image size 108, resolution 2867 x 2867 px/m, 16 important colorsGermanGermany0.6132075471698113
                      RT_BITMAP0x949f40x3e8Device independent bitmap graphic, 112 x 16 x 4, image size 896GermanGermany0.303
                      RT_BITMAP0x94ddc0x4e8Device independent bitmap graphic, 48 x 48 x 4, image size 1152GermanGermany0.04856687898089172
                      RT_BITMAP0x952c40x4e8Device independent bitmap graphic, 48 x 48 x 4, image size 1152GermanGermany0.04856687898089172
                      RT_BITMAP0x957ac0x4e8Device independent bitmap graphic, 48 x 48 x 4, image size 1152GermanGermany0.04856687898089172
                      RT_BITMAP0x95c940x4e8Device independent bitmap graphic, 48 x 48 x 4, image size 1152GermanGermany0.04856687898089172
                      RT_BITMAP0x9617c0x1aa8Device independent bitmap graphic, 128 x 105 x 4, image size 6720GermanGermany0.011137162954279016
                      RT_BITMAP0x97c240x4e8Device independent bitmap graphic, 48 x 48 x 4, image size 1152EnglishUnited States0.04856687898089172
                      RT_BITMAP0x9810c0xd10Device independent bitmap graphic, 144 x 45 x 4, image size 3240GermanGermany0.0215311004784689
                      RT_BITMAP0x98e1c0x4e8Device independent bitmap graphic, 48 x 48 x 4, image size 1152GermanGermany0.04856687898089172
                      RT_ICON0x993040x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0GermanGermany0.3398014440433213
                      RT_ICON0x99bac0x568Device independent bitmap graphic, 16 x 32 x 8, image size 0GermanGermany0.24783236994219654
                      RT_ICON0x9a1140x128Device independent bitmap graphic, 16 x 32 x 4, image size 192GermanGermany0.3783783783783784
                      RT_ICON0x9a23c0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640GermanGermany0.1827956989247312
                      RT_ICON0x9a5240x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsGermanGermany0.2668918918918919
                      RT_ICON0x9a64c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.7322695035460993
                      RT_ICON0x9aab40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.4294090056285178
                      RT_ICON0x9bb5c0x368Device independent bitmap graphic, 16 x 32 x 24, image size 832GermanGermany0.6353211009174312
                      RT_ICON0x9bec40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.5032833020637899
                      RT_ICON0x9cf6c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320GermanGermany0.3432080924855491
                      RT_DIALOG0x9d4d40xbcdataGermanGermany0.7287234042553191
                      RT_DIALOG0x9d5900x98dataGermanGermany0.7763157894736842
                      RT_DIALOG0x9d6280x5adataGermanGermany0.8111111111111111
                      RT_DIALOG0x9d6840xa4dataGermanGermany0.7012195121951219
                      RT_DIALOG0x9d7280xa8dataGermanGermany0.7797619047619048
                      RT_DIALOG0x9d7d00x3b6dataGermanGermany0.4610526315789474
                      RT_DIALOG0x9db880x36dataGermanGermany0.7962962962962963
                      RT_DIALOG0x9dbc00xcadataGermanLiechtenstein0.6782178217821783
                      RT_DIALOG0x9dc8c0xb6dataGermanGermany0.6813186813186813
                      RT_DIALOG0x9dd440x80dataGermanGermany0.796875
                      RT_DIALOG0x9ddc40x90dataGermanGermany0.7361111111111112
                      RT_DIALOG0x9de540x90dataGermanGermany0.7361111111111112
                      RT_DIALOG0x9dee40x90dataGermanGermany0.7361111111111112
                      RT_DIALOG0x9df740x90dataGermanGermany0.7361111111111112
                      RT_DIALOG0x9e0040x90dataGermanGermany0.7361111111111112
                      RT_DIALOG0x9e0940x90dataGermanGermany0.7361111111111112
                      RT_DIALOG0x9e1240x90dataGermanGermany0.7361111111111112
                      RT_DIALOG0x9e1b40xa6dataGermanGermany0.7469879518072289
                      RT_DIALOG0x9e25c0x90dataGermanGermany0.7361111111111112
                      RT_DIALOG0x9e2ec0x90dataGermanGermany0.7361111111111112
                      RT_DIALOG0x9e37c0x90dataGermanGermany0.7361111111111112
                      RT_DIALOG0x9e40c0xf2data0.6776859504132231
                      RT_STRING0x9e5000x80dataGermanGermany0.453125
                      RT_STRING0x9e5800x50dataGermanGermany0.6625
                      RT_GROUP_ICON0x9e5d00x22dataGermanGermany0.9705882352941176
                      RT_GROUP_ICON0x9e5f40x14dataGermanGermany1.25
                      RT_GROUP_ICON0x9e6080x14dataGermanGermany1.2
                      RT_GROUP_ICON0x9e61c0x14dataGermanGermany1.2
                      RT_GROUP_ICON0x9e6300x14dataGermanGermany1.25
                      RT_GROUP_ICON0x9e6440x14dataGermanGermany1.25
                      RT_GROUP_ICON0x9e6580x14dataGermanGermany1.2
                      RT_GROUP_ICON0x9e66c0x14dataGermanGermany1.25
                      RT_GROUP_ICON0x9e6800x14dataGermanGermany1.25
                      RT_VERSION0x9e6940x45cdata0.3888888888888889
                      RT_VXD0x9eaf00x8836PC bitmap, Windows 3.x format, 5210 x 2 x 37, image size 35523, cbSize 34870, bits offset 540.7212503584743333
                      RT_ANIICON0xa73280xcee3PC bitmap, Windows 3.x format, 7149 x 2 x 42, image size 53618, cbSize 52963, bits offset 540.4219360685761758
                      RT_ANIICON0xb420c0x80d5PC bitmap, Windows 3.x format, 4750 x 2 x 49, image size 32991, cbSize 32981, bits offset 540.4458324489857797
                      RT_ANIICON0xbc2e40x9aeaPC bitmap, Windows 3.x format, 5872 x 2 x 46, image size 40456, cbSize 39658, bits offset 540.42732866004337083
                      RT_ANIICON0xc5dd00x33edfPC bitmap, Windows 3.x format, 27311 x 2 x 36, image size 213277, cbSize 212703, bits offset 540.4810510430036248
                      RT_ANIICON0xf9cb00x2d78fPC bitmap, Windows 3.x format, 23698 x 2 x 52, image size 186515, cbSize 186255, bits offset 540.4956591769348474
                      RT_MANIFEST0x1274400x334XML 1.0 document, ASCII text, with CRLF line terminators0.4975609756097561
                      None0x1277740xaadataGermanGermany0.40588235294117647
                      None0x1278200xaadataGermanGermany0.40588235294117647
                      None0x1278cc0xcWindows metafileGermanGermany1.5
                      None0x1278d80xcdataGermanGermany1.6666666666666667
                      None0x1278e40x22dataGermanGermany1.0
                      DLLImport
                      KERNEL32.dllGetStartupInfoW, CreateThread, TerminateThread, FindFirstFileW, FindClose, FormatMessageW, GetEnvironmentVariableW, GetComputerNameW, GetLocaleInfoW, Sleep, LocalFree, CreateMutexW, MulDiv, lstrcpynW, OutputDebugStringA, GetLocalTime, GetPrivateProfileStringW, WritePrivateProfileStringW, CreateDirectoryW, GetUserDefaultLangID, GetFileAttributesW, InitializeCriticalSection, DeleteCriticalSection, GlobalHandle, FreeResource, DeleteFileW, lstrcmpW, lstrcatW, CopyFileW, GetTempPathW, GetTimeZoneInformation, GetModuleFileNameW, GetModuleHandleW, GetCurrentThreadId, GetVersionExW, GlobalReAlloc, FindResourceW, LoadResource, LockResource, FreeLibrary, LoadLibraryW, GetProcAddress, lstrlenA, InterlockedDecrement, InterlockedIncrement, GetLastError, WriteFile, CreateFileW, GetFileSize, ReadFile, CloseHandle, OutputDebugStringW, lstrcmpiW, GlobalSize, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, GlobalLock, GlobalUnlock, GlobalFree, EnterCriticalSection, LeaveCriticalSection, lstrlenW, GetCurrentProcess, FlushInstructionCache, lstrcpyW, InterlockedExchange
                      USER32.dllGetWindowRect, IsWindowVisible, FindWindowExW, PtInRect, GetCursorPos, ScreenToClient, GetWindowTextW, GetDlgCtrlID, GetScrollPos, SetWindowTextW, GetKeyState, SetFocus, LoadCursorW, SendMessageW, RegisterClassExW, CreateWindowExW, LoadImageW, GetWindowLongW, GetSysColor, DefWindowProcW, CallWindowProcW, SetMenuItemInfoW, EndDialog, SystemParametersInfoW, CharNextW, EnumClipboardFormats, GetClipboardFormatNameW, GetClipboardData, MessageBoxW, RegisterClipboardFormatW, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, SetWindowLongW, EnumChildWindows, CharLowerW, SetParent, CopyRect, DestroyWindow, PostQuitMessage, KillTimer, GetActiveWindow, SetTimer, DispatchMessageW, TranslateMessage, GetMessageW, PeekMessageW, CreateDialogParamW, GetSystemMetrics, MapWindowPoints, GetSysColorBrush, ReleaseDC, GetDC, GetClientRect, GetDlgItem, LoadBitmapW, SetWindowPos, ShowWindow, IsDialogMessageW, GetParent, IsChild, GetFocus, TrackPopupMenuEx, DestroyMenu, GetWindow, CreateDialogIndirectParamW, GetClassInfoExW, RegisterWindowMessageW, GetWindowTextLengthW, EndPaint, FillRect, BeginPaint, IsWindow, RedrawWindow, GetClassNameW, GetDesktopWindow, CreateAcceleratorTableW, wsprintfW, LoadStringW, ReleaseCapture, GetIconInfo, SetCapture, DrawAnimatedRects, DestroyIcon, CopyImage, GetKeyboardState, MessageBoxA, DrawEdge, GetCapture, SetCursor, GetMessagePos, GetSubMenu, SetRectEmpty, GetWindowPlacement, RegisterHotKey, UnregisterHotKey, UnhookWindowsHookEx, SetDlgItemTextW, GetDlgItemTextW, EnableWindow, IsCharLowerW, SendMessageA, EnableMenuItem, CheckMenuItem, GetForegroundWindow, GetWindowThreadProcessId, AttachThreadInput, GetCaretPos, SetRect, SetForegroundWindow, SetActiveWindow, GetMenuItemRect, GetMenuItemCount, GetMenuState, GetMenuItemID, CreatePopupMenu, CharUpperW, keybd_event, MapVirtualKeyW, DialogBoxParamW, GetDlgItemInt, UpdateWindow, LoadIconW, LoadAcceleratorsW, EnumWindows, SendMessageTimeoutW, AppendMenuW, DrawFocusRect, InflateRect, IntersectRect, IsRectEmpty, ClientToScreen, MoveWindow, PostMessageW, SetWindowsHookExW, CallNextHookEx, GetWindowDC, GetMenuItemInfoW, OffsetRect, SetPropW, InvalidateRgn, DrawTextW, InvalidateRect, CreateIconIndirect
                      GDI32.dllLPtoDP, RestoreDC, LineTo, MoveToEx, CreatePen, SaveDC, DPtoLP, CreatePatternBrush, SetBitmapBits, GetBitmapBits, SetPixel, GetPixel, SetWindowOrgEx, GetBkColor, ExcludeClipRect, SetPixelV, GetTextExtentPoint32W, OffsetWindowOrgEx, GetClipBox, CreateSolidBrush, GetDeviceCaps, CreateDCW, CreateEnhMetaFileW, CloseEnhMetaFile, SelectPalette, RealizePalette, CreateCompatibleBitmap, GetCurrentObject, CreateBitmap, GetStockObject, SetBkMode, SetTextColor, GetDIBits, GetObjectW, CreateDIBSection, CreateCompatibleDC, SelectObject, SetBkColor, ExtTextOutW, CreateFontIndirectW, DeleteObject, BitBlt, DeleteDC, PatBlt
                      comdlg32.dllGetOpenFileNameW
                      ADVAPI32.dllCryptAcquireContextW, CryptDestroyHash, CryptReleaseContext, CryptHashData, CryptGetHashParam, RegDeleteValueW, RegSetValueExW, RegCloseKey, RegCreateKeyExW, RegQueryValueExW, RegOpenKeyW, GetUserNameW, CryptCreateHash, OpenProcessToken, GetTokenInformation, RegOpenKeyExW
                      SHELL32.dllSHGetFileInfoW, SHAppBarMessage, Shell_NotifyIconW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, SHGetSpecialFolderPathW, ShellExecuteW, ShellExecuteExW
                      ole32.dllRegisterDragDrop, CreateStreamOnHGlobal, CoInitialize, CoCreateInstance, OleInitialize, OleUninitialize, CLSIDFromProgID, CLSIDFromString, StringFromCLSID, OleLockRunning, CoTaskMemAlloc, DoDragDrop, CoTaskMemFree
                      OLEAUT32.dllVariantTimeToSystemTime, OleCreateFontIndirect, SysAllocStringLen, SafeArrayDestroy, VariantInit, SafeArrayCreateVector, SafeArrayAccessData, SafeArrayUnaccessData, SysAllocString, SysStringLen, LoadRegTypeLib, DispCallFunc, VariantClear, SysFreeString, SystemTimeToVariantTime
                      COMCTL32.dllImageList_ReplaceIcon, ImageList_GetIcon, ImageList_GetImageCount, ImageList_Create, ImageList_Add, ImageList_Draw, ImageList_LoadImageW, InitCommonControlsEx, ImageList_DrawEx
                      Language of compilation systemCountry where language is spokenMap
                      GermanGermany
                      EnglishUnited States
                      GermanLiechtenstein
                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                      2024-11-25T18:03:35.903281+01002855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.94970945.32.146.656868TCP
                      2024-11-25T18:06:07.898238+01002853193ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.94971645.32.146.656868TCP
                      TimestampSource PortDest PortSource IPDest IP
                      Nov 25, 2024 18:03:23.869184017 CET497096868192.168.2.945.32.146.65
                      Nov 25, 2024 18:03:23.990421057 CET68684970945.32.146.65192.168.2.9
                      Nov 25, 2024 18:03:23.990551949 CET497096868192.168.2.945.32.146.65
                      Nov 25, 2024 18:03:24.554229021 CET497096868192.168.2.945.32.146.65
                      Nov 25, 2024 18:03:24.678538084 CET68684970945.32.146.65192.168.2.9
                      Nov 25, 2024 18:03:35.903280973 CET497096868192.168.2.945.32.146.65
                      Nov 25, 2024 18:03:36.024024010 CET68684970945.32.146.65192.168.2.9
                      Nov 25, 2024 18:03:45.935614109 CET68684970945.32.146.65192.168.2.9
                      Nov 25, 2024 18:03:45.938915968 CET497096868192.168.2.945.32.146.65
                      Nov 25, 2024 18:03:49.540198088 CET497096868192.168.2.945.32.146.65
                      Nov 25, 2024 18:03:49.541701078 CET497106868192.168.2.945.32.146.65
                      Nov 25, 2024 18:03:49.660825014 CET68684970945.32.146.65192.168.2.9
                      Nov 25, 2024 18:03:49.662334919 CET68684971045.32.146.65192.168.2.9
                      Nov 25, 2024 18:03:49.662971020 CET497106868192.168.2.945.32.146.65
                      Nov 25, 2024 18:03:50.353754044 CET497106868192.168.2.945.32.146.65
                      Nov 25, 2024 18:03:50.475444078 CET68684971045.32.146.65192.168.2.9
                      Nov 25, 2024 18:04:02.448378086 CET497106868192.168.2.945.32.146.65
                      Nov 25, 2024 18:04:02.568770885 CET68684971045.32.146.65192.168.2.9
                      Nov 25, 2024 18:04:11.608067036 CET68684971045.32.146.65192.168.2.9
                      Nov 25, 2024 18:04:11.608145952 CET497106868192.168.2.945.32.146.65
                      Nov 25, 2024 18:04:11.823463917 CET497106868192.168.2.945.32.146.65
                      Nov 25, 2024 18:04:11.922255039 CET497126868192.168.2.945.32.146.65
                      Nov 25, 2024 18:04:11.943888903 CET68684971045.32.146.65192.168.2.9
                      Nov 25, 2024 18:04:12.212208033 CET68684971245.32.146.65192.168.2.9
                      Nov 25, 2024 18:04:12.212291002 CET497126868192.168.2.945.32.146.65
                      Nov 25, 2024 18:04:12.561500072 CET497126868192.168.2.945.32.146.65
                      Nov 25, 2024 18:04:12.683285952 CET68684971245.32.146.65192.168.2.9
                      Nov 25, 2024 18:04:26.991821051 CET497126868192.168.2.945.32.146.65
                      Nov 25, 2024 18:04:27.112965107 CET68684971245.32.146.65192.168.2.9
                      Nov 25, 2024 18:04:28.272924900 CET497126868192.168.2.945.32.146.65
                      Nov 25, 2024 18:04:28.394092083 CET68684971245.32.146.65192.168.2.9
                      Nov 25, 2024 18:04:28.394164085 CET497126868192.168.2.945.32.146.65
                      Nov 25, 2024 18:04:28.515222073 CET68684971245.32.146.65192.168.2.9
                      Nov 25, 2024 18:04:33.491642952 CET497126868192.168.2.945.32.146.65
                      Nov 25, 2024 18:04:33.612240076 CET68684971245.32.146.65192.168.2.9
                      Nov 25, 2024 18:04:34.170609951 CET68684971245.32.146.65192.168.2.9
                      Nov 25, 2024 18:04:34.171183109 CET497126868192.168.2.945.32.146.65
                      Nov 25, 2024 18:04:38.553982019 CET497126868192.168.2.945.32.146.65
                      Nov 25, 2024 18:04:38.556436062 CET497136868192.168.2.945.32.146.65
                      Nov 25, 2024 18:04:38.674442053 CET68684971245.32.146.65192.168.2.9
                      Nov 25, 2024 18:04:38.676781893 CET68684971345.32.146.65192.168.2.9
                      Nov 25, 2024 18:04:38.676845074 CET497136868192.168.2.945.32.146.65
                      Nov 25, 2024 18:04:38.716262102 CET497136868192.168.2.945.32.146.65
                      Nov 25, 2024 18:04:38.837819099 CET68684971345.32.146.65192.168.2.9
                      Nov 25, 2024 18:04:38.851119041 CET497136868192.168.2.945.32.146.65
                      Nov 25, 2024 18:04:38.972148895 CET68684971345.32.146.65192.168.2.9
                      Nov 25, 2024 18:04:46.679233074 CET497136868192.168.2.945.32.146.65
                      Nov 25, 2024 18:04:46.805741072 CET68684971345.32.146.65192.168.2.9
                      Nov 25, 2024 18:04:49.023497105 CET497136868192.168.2.945.32.146.65
                      Nov 25, 2024 18:04:49.143953085 CET68684971345.32.146.65192.168.2.9
                      Nov 25, 2024 18:04:49.144007921 CET497136868192.168.2.945.32.146.65
                      Nov 25, 2024 18:04:49.264439106 CET68684971345.32.146.65192.168.2.9
                      Nov 25, 2024 18:04:49.264653921 CET497136868192.168.2.945.32.146.65
                      Nov 25, 2024 18:04:49.385580063 CET68684971345.32.146.65192.168.2.9
                      Nov 25, 2024 18:05:00.702300072 CET68684971345.32.146.65192.168.2.9
                      Nov 25, 2024 18:05:00.702450991 CET497136868192.168.2.945.32.146.65
                      Nov 25, 2024 18:05:05.146924019 CET497136868192.168.2.945.32.146.65
                      Nov 25, 2024 18:05:05.147634983 CET497146868192.168.2.945.32.146.65
                      Nov 25, 2024 18:05:05.267416954 CET68684971345.32.146.65192.168.2.9
                      Nov 25, 2024 18:05:05.268047094 CET68684971445.32.146.65192.168.2.9
                      Nov 25, 2024 18:05:05.268171072 CET497146868192.168.2.945.32.146.65
                      Nov 25, 2024 18:05:05.554096937 CET497146868192.168.2.945.32.146.65
                      Nov 25, 2024 18:05:05.675405025 CET68684971445.32.146.65192.168.2.9
                      Nov 25, 2024 18:05:05.913738012 CET497146868192.168.2.945.32.146.65
                      Nov 25, 2024 18:05:06.034167051 CET68684971445.32.146.65192.168.2.9
                      Nov 25, 2024 18:05:06.820024967 CET497146868192.168.2.945.32.146.65
                      Nov 25, 2024 18:05:06.941235065 CET68684971445.32.146.65192.168.2.9
                      Nov 25, 2024 18:05:16.741787910 CET497146868192.168.2.945.32.146.65
                      Nov 25, 2024 18:05:16.866660118 CET68684971445.32.146.65192.168.2.9
                      Nov 25, 2024 18:05:27.209274054 CET68684971445.32.146.65192.168.2.9
                      Nov 25, 2024 18:05:27.209341049 CET497146868192.168.2.945.32.146.65
                      Nov 25, 2024 18:05:27.211047888 CET497146868192.168.2.945.32.146.65
                      Nov 25, 2024 18:05:27.213447094 CET497156868192.168.2.945.32.146.65
                      Nov 25, 2024 18:05:27.406553030 CET68684971445.32.146.65192.168.2.9
                      Nov 25, 2024 18:05:27.406585932 CET68684971545.32.146.65192.168.2.9
                      Nov 25, 2024 18:05:27.407341957 CET497156868192.168.2.945.32.146.65
                      Nov 25, 2024 18:05:27.503576994 CET497156868192.168.2.945.32.146.65
                      Nov 25, 2024 18:05:27.730982065 CET68684971545.32.146.65192.168.2.9
                      Nov 25, 2024 18:05:27.773173094 CET497156868192.168.2.945.32.146.65
                      Nov 25, 2024 18:05:27.897584915 CET68684971545.32.146.65192.168.2.9
                      Nov 25, 2024 18:05:32.835948944 CET497156868192.168.2.945.32.146.65
                      Nov 25, 2024 18:05:32.956799030 CET68684971545.32.146.65192.168.2.9
                      Nov 25, 2024 18:05:38.789016008 CET497156868192.168.2.945.32.146.65
                      Nov 25, 2024 18:05:38.909796000 CET68684971545.32.146.65192.168.2.9
                      Nov 25, 2024 18:05:49.522412062 CET68684971545.32.146.65192.168.2.9
                      Nov 25, 2024 18:05:49.522488117 CET497156868192.168.2.945.32.146.65
                      Nov 25, 2024 18:05:49.527211905 CET497156868192.168.2.945.32.146.65
                      Nov 25, 2024 18:05:49.531613111 CET497166868192.168.2.945.32.146.65
                      Nov 25, 2024 18:05:49.647892952 CET68684971545.32.146.65192.168.2.9
                      Nov 25, 2024 18:05:49.652046919 CET68684971645.32.146.65192.168.2.9
                      Nov 25, 2024 18:05:49.652122021 CET497166868192.168.2.945.32.146.65
                      Nov 25, 2024 18:05:50.231338978 CET497166868192.168.2.945.32.146.65
                      Nov 25, 2024 18:05:50.351882935 CET68684971645.32.146.65192.168.2.9
                      Nov 25, 2024 18:05:56.086155891 CET497166868192.168.2.945.32.146.65
                      Nov 25, 2024 18:05:56.206588030 CET68684971645.32.146.65192.168.2.9
                      Nov 25, 2024 18:05:56.206681013 CET497166868192.168.2.945.32.146.65
                      Nov 25, 2024 18:05:56.327116966 CET68684971645.32.146.65192.168.2.9
                      Nov 25, 2024 18:05:56.327156067 CET497166868192.168.2.945.32.146.65
                      Nov 25, 2024 18:05:56.449925900 CET68684971645.32.146.65192.168.2.9
                      Nov 25, 2024 18:05:59.241975069 CET497166868192.168.2.945.32.146.65
                      Nov 25, 2024 18:05:59.362601042 CET68684971645.32.146.65192.168.2.9
                      Nov 25, 2024 18:06:07.898237944 CET497166868192.168.2.945.32.146.65
                      Nov 25, 2024 18:06:08.019362926 CET68684971645.32.146.65192.168.2.9
                      Nov 25, 2024 18:06:11.688457966 CET68684971645.32.146.65192.168.2.9
                      Nov 25, 2024 18:06:11.688544035 CET497166868192.168.2.945.32.146.65
                      Nov 25, 2024 18:06:12.992331982 CET497166868192.168.2.945.32.146.65
                      Nov 25, 2024 18:06:12.993706942 CET497176868192.168.2.945.32.146.65
                      Nov 25, 2024 18:06:13.113686085 CET68684971645.32.146.65192.168.2.9
                      Nov 25, 2024 18:06:13.114526033 CET68684971745.32.146.65192.168.2.9
                      Nov 25, 2024 18:06:13.114666939 CET497176868192.168.2.945.32.146.65
                      Nov 25, 2024 18:06:13.401531935 CET497176868192.168.2.945.32.146.65
                      Nov 25, 2024 18:06:13.522897959 CET68684971745.32.146.65192.168.2.9
                      Nov 25, 2024 18:06:14.243582964 CET497176868192.168.2.945.32.146.65
                      Nov 25, 2024 18:06:14.364485025 CET68684971745.32.146.65192.168.2.9
                      Nov 25, 2024 18:06:14.554737091 CET497176868192.168.2.945.32.146.65
                      Nov 25, 2024 18:06:14.675409079 CET68684971745.32.146.65192.168.2.9
                      Nov 25, 2024 18:06:14.675462961 CET497176868192.168.2.945.32.146.65
                      Nov 25, 2024 18:06:14.796021938 CET68684971745.32.146.65192.168.2.9
                      Nov 25, 2024 18:06:14.913954973 CET497176868192.168.2.945.32.146.65
                      Nov 25, 2024 18:06:15.126004934 CET68684971745.32.146.65192.168.2.9
                      Nov 25, 2024 18:06:15.126069069 CET497176868192.168.2.945.32.146.65
                      Nov 25, 2024 18:06:15.248585939 CET68684971745.32.146.65192.168.2.9
                      Nov 25, 2024 18:06:28.929629087 CET497176868192.168.2.945.32.146.65
                      Nov 25, 2024 18:06:29.055922031 CET68684971745.32.146.65192.168.2.9
                      Nov 25, 2024 18:06:35.054492950 CET68684971745.32.146.65192.168.2.9
                      Nov 25, 2024 18:06:35.057905912 CET497176868192.168.2.945.32.146.65
                      Nov 25, 2024 18:06:36.242028952 CET497176868192.168.2.945.32.146.65
                      Nov 25, 2024 18:06:36.244512081 CET497186868192.168.2.945.32.146.65
                      Nov 25, 2024 18:06:36.365820885 CET68684971745.32.146.65192.168.2.9
                      Nov 25, 2024 18:06:36.367286921 CET68684971845.32.146.65192.168.2.9
                      Nov 25, 2024 18:06:36.367367983 CET497186868192.168.2.945.32.146.65
                      Nov 25, 2024 18:06:36.801811934 CET497186868192.168.2.945.32.146.65
                      Nov 25, 2024 18:06:36.923224926 CET68684971845.32.146.65192.168.2.9
                      Nov 25, 2024 18:06:36.960993052 CET497186868192.168.2.945.32.146.65
                      Nov 25, 2024 18:06:37.082010984 CET68684971845.32.146.65192.168.2.9
                      Nov 25, 2024 18:06:37.082200050 CET497186868192.168.2.945.32.146.65
                      Nov 25, 2024 18:06:37.208972931 CET68684971845.32.146.65192.168.2.9
                      Nov 25, 2024 18:06:51.711752892 CET497186868192.168.2.945.32.146.65
                      Nov 25, 2024 18:06:51.832300901 CET68684971845.32.146.65192.168.2.9
                      Nov 25, 2024 18:06:55.539432049 CET497186868192.168.2.945.32.146.65
                      Nov 25, 2024 18:06:55.659934044 CET68684971845.32.146.65192.168.2.9
                      Nov 25, 2024 18:06:57.726689100 CET497186868192.168.2.945.32.146.65
                      Nov 25, 2024 18:06:57.847162008 CET68684971845.32.146.65192.168.2.9
                      Nov 25, 2024 18:06:57.847234964 CET497186868192.168.2.945.32.146.65
                      Nov 25, 2024 18:06:57.967724085 CET68684971845.32.146.65192.168.2.9
                      Nov 25, 2024 18:06:58.361110926 CET68684971845.32.146.65192.168.2.9
                      Nov 25, 2024 18:06:58.361170053 CET497186868192.168.2.945.32.146.65
                      Nov 25, 2024 18:07:02.885019064 CET497186868192.168.2.945.32.146.65
                      Nov 25, 2024 18:07:02.886802912 CET497196868192.168.2.945.32.146.65
                      Nov 25, 2024 18:07:03.005667925 CET68684971845.32.146.65192.168.2.9
                      Nov 25, 2024 18:07:03.007308006 CET68684971945.32.146.65192.168.2.9
                      Nov 25, 2024 18:07:03.013866901 CET497196868192.168.2.945.32.146.65
                      Nov 25, 2024 18:07:03.930949926 CET497196868192.168.2.945.32.146.65
                      Nov 25, 2024 18:07:04.052056074 CET68684971945.32.146.65192.168.2.9
                      Nov 25, 2024 18:07:07.835850954 CET497196868192.168.2.945.32.146.65
                      Nov 25, 2024 18:07:08.046456099 CET68684971945.32.146.65192.168.2.9

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:12:02:59
                      Start date:25/11/2024
                      Path:C:\Users\user\Desktop\QuickTextPaste.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\QuickTextPaste.exe"
                      Imagebase:0x400000
                      File size:1'027'072 bytes
                      MD5 hash:1FDC72504C644EC1FCC368C24F12D94D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.1626571461.0000000002182000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.1626571461.0000000002182000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                      • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmp, Author: ditekSHen
                      Reputation:low
                      Has exited:true

                      Target ID:3
                      Start time:12:03:18
                      Start date:25/11/2024
                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                      Imagebase:0x940000
                      File size:2'141'552 bytes
                      MD5 hash:EB80BB1CA9B9C7F516FF69AFCFD75B7D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000003.00000002.3849434803.0000000005002000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000003.00000002.3849434803.0000000005002000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                      Reputation:moderate
                      Has exited:false

                      Reset < >

                        Execution Graph

                        Execution Coverage:0.3%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:4.8%
                        Total number of Nodes:1245
                        Total number of Limit Nodes:0
                        execution_graph 9235 41e84f 9236 41e857 9235->9236 9252 41e8ea 9236->9252 9268 41e8fc 9252->9268 9269 41e909 ExitProcess 9268->9269 9270 41e94a 9268->9270 9283 41e978 9270->9283 9284 41e9bb 9283->9284 9292 41e9aa 9283->9292 9284->9292 9293 41eb37 9284->9293 9296 41eb41 9284->9296 9285 41ed87 9324 41edf2 9285->9324 9286 41ecb9 9318 41ed04 9286->9318 9292->9285 9292->9286 9309 41ebc3 9293->9309 9298 41eaf5 9296->9298 9297 41eb37 9299 41ebc3 4 API calls 9297->9299 9298->9297 9301 41eb41 4 API calls 9298->9301 9300 41ebbc 9299->9300 9302 41ed87 9300->9302 9303 41ecb9 9300->9303 9301->9297 9304 41edf2 2 API calls 9302->9304 9305 41ed04 3 API calls 9303->9305 9306 41edea 9304->9306 9307 41ecfd ExitProcess 9305->9307 9310 41ebdb 9309->9310 9311 41ed87 9310->9311 9312 41ecb9 9310->9312 9313 41edf2 2 API calls 9311->9313 9314 41ed04 3 API calls 9312->9314 9315 41edea 9313->9315 9316 41ecfd ExitProcess 9314->9316 9319 41ed14 9318->9319 9320 41ed87 9319->9320 9323 41f486 ExitProcess 9319->9323 9321 41edf2 2 API calls 9320->9321 9322 41edea 9321->9322 9325 41edfc 9324->9325 9328 41ee0e 9325->9328 9329 41ee1b 9328->9329 9330 41ee2a 9328->9330 9340 41f106 9329->9340 9334 41ee56 9330->9334 9335 41ee77 9334->9335 9336 41ee86 9334->9336 9337 41f106 2 API calls 9335->9337 9344 41ef19 9336->9344 9339 41f0fe 9337->9339 9341 41f13c ExitProcess 9340->9341 9343 41f131 9341->9343 9342 41f486 ExitProcess 9343->9342 9345 41efba 9344->9345 9346 41ee92 9345->9346 9348 41f03e 9345->9348 9347 41ef19 2 API calls 9346->9347 9350 41ef0f 9346->9350 9347->9350 9353 41f04e 9348->9353 9351 41f106 2 API calls 9350->9351 9352 41f0fe 9351->9352 9358 41f06c 9353->9358 9359 41f0e6 9358->9359 9360 41f106 2 API calls 9359->9360 9361 41f0fe 9360->9361 10324 43754d GetModuleHandleW 10331 437536 GetModuleFileNameW 10324->10331 10326 437573 10327 4375c2 RegOpenKeyW RegQueryValueExW 10326->10327 10328 437668 10327->10328 10329 43762a 10327->10329 10329->10328 10330 437643 lstrlenW RegSetValueExW 10329->10330 10330->10328 10331->10326 10336 434350 10337 43438b LoadLibraryW 10336->10337 10338 43439f 10336->10338 10337->10338 10339 4343b8 10337->10339 10338->10339 10340 4343a8 GetProcAddress 10338->10340 10340->10339 9223 407959 9224 40795d 9223->9224 9225 407a56 VirtualProtect 9224->9225 9226 407a93 9225->9226 10341 406d59 10344 406d61 10341->10344 10342 406c51 10343 406ebe VirtualProtect 10347 406eb4 10343->10347 10344->10342 10344->10343 10345 407a56 VirtualProtect 10346 407a93 10345->10346 10347->10345 10348 40675c 10349 406a12 10348->10349 10350 406ebe VirtualProtect 10349->10350 10351 406eb4 10349->10351 10350->10351 10352 407a56 VirtualProtect 10351->10352 10353 407a93 10352->10353 9362 421c5f 9367 422876 9362->9367 9364 421c88 9373 4218e6 9364->9373 9368 422895 9367->9368 9369 4228b8 lstrcpynW lstrcpynW 9368->9369 9370 4228e1 9369->9370 9371 4228ed IsCharLowerW 9370->9371 9372 4228fc 9370->9372 9371->9372 9372->9364 9374 4218f0 __EH_prolog 9373->9374 9375 4218fa wsprintfW 9374->9375 9388 425052 9375->9388 9389 42505e 9388->9389 9390 425063 wsprintfW 9389->9390 9394 425092 9389->9394 9392 421945 lstrcatW 9390->9392 9395 40310b 9392->9395 9393 42509e wsprintfW 9393->9392 9394->9392 9394->9393 9396 40310f 9395->9396 10354 432160 CreateWindowExW 10355 4321dc SendMessageW SendMessageW SendMessageW 10354->10355 10356 43219c GetStockObject 10354->10356 10357 432207 6 API calls 10355->10357 10358 432268 10355->10358 10359 437b74 10356->10359 10357->10358 10360 4321b2 GetObjectW CreateFontIndirectW 10359->10360 10360->10355 9397 428264 GetWindowPlacement 9398 428283 8 API calls 9397->9398 9399 42833c 9397->9399 9400 4282f4 9398->9400 9400->9399 9401 428329 MoveWindow 9400->9401 9401->9399 10361 409767 10362 42120d 10361->10362 10363 421215 SetWindowTextW 10362->10363 10364 42122d 10363->10364 10365 421294 GetSystemMetrics GetSystemMetrics ImageList_Create 10364->10365 10372 421338 10364->10372 10366 4354e9 2 API calls 10365->10366 10367 4212c7 ImageList_ReplaceIcon 10366->10367 10368 4354e9 2 API calls 10367->10368 10369 4212e2 ImageList_ReplaceIcon LoadImageW ImageList_ReplaceIcon 10368->10369 10370 421324 10369->10370 10371 4215aa 4 API calls 10370->10371 10371->10372 10373 42169f 3 API calls 10372->10373 10374 421386 wsprintfW 10373->10374 10375 4213ba 10374->10375 10376 421728 SendMessageW 10375->10376 10377 4213c7 10376->10377 10378 4213ce wsprintfW 10377->10378 10379 4213f5 10378->10379 10380 421728 SendMessageW 10379->10380 10381 421402 10380->10381 10382 421728 SendMessageW 10381->10382 10383 421424 10382->10383 10384 421728 SendMessageW 10383->10384 10385 421443 10384->10385 10386 421728 SendMessageW 10385->10386 10387 421465 10386->10387 10388 421728 SendMessageW 10387->10388 10389 421484 10388->10389 10390 425e22 19 API calls 10389->10390 10391 4214d4 10390->10391 10392 4214db GetDlgItem SetWindowTextW 10391->10392 10393 4165af 10392->10393 10394 4214fb GetDlgItem SetWindowTextW 10393->10394 10395 4165af 10394->10395 10396 421515 GetDlgItem SetWindowTextW 10395->10396 10397 4165af 10396->10397 10398 42152f 6 API calls 10397->10398 10399 421599 10398->10399 9402 42a66a 9403 42a67d 9402->9403 9404 42a69a 9403->9404 9405 42a6d5 9403->9405 9406 42a6b7 lstrlenW 9404->9406 9407 42a6be 9404->9407 9405->9407 9408 42a6fa lstrlenW 9405->9408 9406->9407 9408->9407 9409 42ce68 9410 42ce7d 9409->9410 9415 4380a0 9410->9415 9414 42cec5 9416 4380b8 9415->9416 9423 4380b1 9415->9423 9418 4380c1 InterlockedExchange 9416->9418 9419 4380ec 9416->9419 9417 438112 EnterCriticalSection 9421 42ce99 9417->9421 9418->9419 9422 4380d2 InitializeCriticalSection 9418->9422 9420 4380ff Sleep 9419->9420 9419->9423 9420->9419 9424 43813c 9421->9424 9422->9423 9423->9417 9423->9421 9425 438150 9424->9425 9426 438145 LeaveCriticalSection 9424->9426 9425->9414 9426->9425 10415 435173 lstrcpyW 10421 4350f1 GetSystemMetrics GetSystemMetrics LoadImageW 10415->10421 10418 4351de 10419 4351c5 CreateThread 10419->10418 10420 4351b9 TerminateThread 10420->10419 10422 435132 10421->10422 10423 43512c 10421->10423 10442 434eb5 10422->10442 10429 435209 GetIconInfo 10423->10429 10427 434eb5 3 API calls 10428 435170 10427->10428 10428->10418 10428->10419 10428->10420 10430 4353c1 10429->10430 10431 435229 GetDC CreateCompatibleDC CreateCompatibleDC 10429->10431 10430->10422 10431->10430 10432 43524f 10431->10432 10432->10430 10433 435260 GetObjectW 10432->10433 10434 435398 DeleteObject DeleteObject DeleteDC DeleteDC ReleaseDC 10433->10434 10435 43527d CreateBitmap 10433->10435 10434->10430 10436 435393 DeleteObject 10435->10436 10437 4352ab SelectObject SelectObject 10435->10437 10436->10434 10438 43536a SelectObject SelectObject CreateIconIndirect 10437->10438 10439 4352d3 10437->10439 10438->10436 10439->10438 10440 4352dd GetPixel 10439->10440 10441 435331 SetPixel 10439->10441 10440->10439 10441->10439 10445 434ed6 10442->10445 10446 434f33 10445->10446 10447 434f1f lstrcpynW 10445->10447 10448 434f38 Shell_NotifyIconW 10446->10448 10447->10448 10449 434ed2 10448->10449 10450 434f4e DestroyIcon 10448->10450 10449->10427 10450->10449 9433 428e73 InitCommonControlsEx 9434 428f48 9433->9434 9435 428e9d CreateWindowExW 9433->9435 9436 428ef5 9435->9436 9437 428f12 SendMessageW 9436->9437 9437->9434 9438 428f39 SendMessageW 9437->9438 9438->9434 9439 41f675 9440 41f760 9439->9440 9441 41f684 9439->9441 9448 41f600 GetClientRect GetDlgItem SetWindowPos GetDlgItem SetWindowPos 9440->9448 9442 41f738 GetDlgItem SendMessageW 9441->9442 9444 41f6e1 GetDlgItem 9441->9444 9445 41f6d3 EndDialog 9441->9445 9442->9445 9447 4165af 9444->9447 9446 41f768 9445->9446 9447->9442 9448->9446 10451 425b7a 10452 425b93 10451->10452 10453 425ba7 10452->10453 10454 425e22 19 API calls 10452->10454 10454->10453 9449 43607a 9450 436087 9449->9450 9454 436095 9449->9454 9450->9454 9455 435bfc 9450->9455 9451 4360b1 CallNextHookEx 9453 436099 9451->9453 9454->9451 9454->9453 9456 435d35 9455->9456 9457 435c1d 9455->9457 9458 435dd7 9456->9458 9463 435d82 9456->9463 9464 435d4a 9456->9464 9459 435c26 9457->9459 9460 435d0c SendMessageW 9457->9460 9461 435c59 9458->9461 9462 435ddd PostMessageW 9458->9462 9465 435c76 9459->9465 9466 435c2d 9459->9466 9460->9461 9461->9454 9462->9461 9463->9458 9470 435d8c 9463->9470 9489 435bc2 SendMessageW 9464->9489 9465->9461 9486 435dfe GetMessagePos 9465->9486 9466->9461 9484 435dfe GetMessagePos 9466->9484 9469 435d55 PostMessageW PostMessageW PostMessageW 9469->9461 9470->9461 9490 435bc2 SendMessageW 9470->9490 9472 435c3d ScreenToClient 9485 435bab SendMessageW 9472->9485 9473 435c8a ScreenToClient 9475 435ca2 9473->9475 9475->9461 9487 435bab SendMessageW 9475->9487 9477 435d9d PostMessageW PostMessageW PostMessageW 9477->9461 9478 435c55 9478->9461 9480 435cfe PostMessageW 9478->9480 9480->9461 9481 435cc0 9481->9461 9488 435bc2 SendMessageW 9481->9488 9483 435ce7 SendMessageW 9483->9480 9484->9472 9485->9478 9486->9473 9487->9481 9488->9483 9489->9469 9490->9477 10455 429b7c CreateFileW 10456 429ba5 10455->10456 10458 429bfa 10455->10458 10457 429bbc WideCharToMultiByte WriteFile CloseHandle 10456->10457 10457->10458 9499 426601 9505 42666f 9499->9505 9502 426634 GetLastError FormatMessageW 9503 42666c 9502->9503 9504 426652 MessageBoxW LocalFree 9502->9504 9504->9503 9506 42660d GetModuleHandleW SetWindowsHookExW 9505->9506 9507 426678 UnhookWindowsHookEx 9505->9507 9506->9502 9506->9503 9507->9506 9508 437407 9513 437536 GetModuleFileNameW 9508->9513 9510 437425 9514 43748c RegOpenKeyW 9510->9514 9513->9510 9515 437486 9514->9515 9516 4374b7 lstrlenW RegSetValueExW RegCloseKey 9514->9516 9516->9515 9216 41f106 9220 41f13c 9216->9220 9218 41f486 ExitProcess 9219 41f131 9219->9218 9222 41f14b 9220->9222 9221 41f486 ExitProcess 9222->9221 9517 43580b 9518 435817 9517->9518 9519 43582d CallWindowProcW 9517->9519 9518->9519 9520 435845 9518->9520 9519->9520 9521 43680e 9558 43672e 9521->9558 9523 436857 9524 4368ca 9523->9524 9562 436e79 9523->9562 9526 436982 9524->9526 9527 4368da 9524->9527 9566 4372d6 9526->9566 9528 43692a 9527->9528 9532 43672e GetSysColor 9527->9532 9530 436999 OffsetRect 9528->9530 9531 436939 9528->9531 9535 4369f2 9530->9535 9536 436a85 GetMenuItemInfoW 9530->9536 9537 43693e CopyRect 9531->9537 9533 4368ee 9532->9533 9533->9528 9549 436e79 SetPixel 9533->9549 9538 436a49 9535->9538 9539 436a2c 9535->9539 9541 436abb 9536->9541 9542 436ae9 9536->9542 9540 43672e GetSysColor 9537->9540 9574 4366f6 9538->9574 9539->9536 9544 436a36 ImageList_Draw 9539->9544 9545 436970 9540->9545 9543 436b13 SetBkMode 9541->9543 9546 436ac0 GetSystemMetrics GetSystemMetrics GetSystemMetrics 9541->9546 9542->9543 9581 436cda 9542->9581 9548 436b44 9543->9548 9544->9536 9546->9542 9551 43672e GetSysColor 9548->9551 9549->9528 9553 436b66 9551->9553 9587 436f70 lstrlenW 9553->9587 9556 436b7e 9556->9545 9597 436c21 9556->9597 9561 436733 9558->9561 9559 43673b GetSysColor 9560 436760 9559->9560 9560->9523 9561->9559 9561->9560 9563 436f6b 9562->9563 9564 436ec1 9562->9564 9563->9524 9564->9563 9565 436f45 SetPixel 9564->9565 9565->9564 9565->9565 9567 4372f1 9566->9567 9568 4373e8 9566->9568 9570 43672e GetSysColor 9567->9570 9569 43672e GetSysColor 9568->9569 9573 43731f 9569->9573 9571 437302 9570->9571 9572 43672e GetSysColor 9571->9572 9572->9573 9573->9528 9575 4366fb 9574->9575 9576 436706 GetSysColorBrush 9575->9576 9577 436712 9575->9577 9578 43672b GetSysColorBrush 9576->9578 9577->9578 9579 43671b CreateSolidBrush 9577->9579 9580 436c1e 9578->9580 9579->9578 9580->9536 9582 436ce5 9581->9582 9583 43672e GetSysColor 9582->9583 9584 436d05 9583->9584 9601 436d29 9584->9601 9588 436fb1 SetTextColor 9587->9588 9589 436f8f 9587->9589 9590 436fc3 OutputDebugStringW GetCurrentObject 9588->9590 9591 436ff4 DrawTextW 9588->9591 9592 436f9e lstrlenW 9589->9592 9596 436fac 9589->9596 9590->9591 9593 436fdd GetObjectW CreateFontIndirectW 9590->9593 9594 437051 9591->9594 9595 437029 DrawTextW 9591->9595 9592->9589 9592->9596 9593->9591 9594->9556 9595->9594 9596->9588 9598 436c53 9597->9598 9599 436cd5 9598->9599 9600 436c8d SetPixel SetPixel SetPixel SetPixel 9598->9600 9599->9545 9600->9598 9600->9600 9602 436d65 9601->9602 9603 436de6 9602->9603 9604 436da5 SetBkColor ExtTextOutW SetBkColor 9602->9604 9606 436e02 SetPixel SetPixel 9603->9606 9608 436e32 9603->9608 9605 436d1d 9604->9605 9605->9543 9606->9603 9606->9606 9607 436e4b SetPixel SetPixel 9607->9607 9607->9608 9608->9605 9608->9607 10476 433f0d OpenClipboard 10477 433f21 10476->10477 10482 433f91 10476->10482 10478 433f41 GetClipboardData 10477->10478 10479 433f2a RegisterClipboardFormatW 10477->10479 10480 433f51 GlobalLock 10478->10480 10481 433f8b CloseClipboard 10478->10481 10479->10478 10480->10481 10483 433f5c 10480->10483 10481->10482 10486 433d4c 10483->10486 10485 433f66 10487 433d56 __EH_prolog 10486->10487 10488 433d6c SHGetDesktopFolder 10487->10488 10491 433d83 10487->10491 10488->10491 10493 433d8a 10488->10493 10489 433dd3 ILCombine 10489->10493 10490 433eb5 ILFree 10490->10493 10491->10485 10493->10489 10493->10490 10493->10491 10494 4325aa SHGetMalloc 10493->10494 10495 4325da 10494->10495 10496 4325e5 10495->10496 10497 432624 10495->10497 10499 432600 10496->10499 10502 432605 10496->10502 10503 432563 MultiByteToWideChar lstrlenW 10496->10503 10504 432589 lstrcpynW lstrlenW 10497->10504 10500 432653 lstrlenW 10499->10500 10499->10502 10500->10502 10502->10493 10503->10499 10504->10499 10505 42a30d 10506 42a319 lstrcatW 10505->10506 10509 42a320 10505->10509 10508 42a387 10506->10508 10509->10506 10510 42a38d lstrcatW 10509->10510 10510->10508 9609 41fa12 9610 41fac5 9609->9610 9611 41fa2d 9609->9611 9611->9610 9613 424930 9611->9613 9614 42493a __EH_prolog 9613->9614 9615 42498a SendMessageW 9614->9615 9619 4249bc 9614->9619 9616 4249c0 lstrlenW 9615->9616 9615->9619 9616->9619 9617 424a52 lstrcpynW 9618 424a6d 9617->9618 9618->9610 9619->9617 9620 423c17 9629 424245 lstrcpyW 9620->9629 9622 423c28 9623 423c55 lstrcpyW 9622->9623 9624 423c2c 9622->9624 9625 423c76 9623->9625 9626 423c39 MessageBoxW 9624->9626 9627 423c50 9625->9627 9637 424156 9625->9637 9626->9627 9631 42426f 9629->9631 9630 4242da 9630->9622 9631->9630 9632 424286 lstrcatW 9631->9632 9644 402cc3 9632->9644 9634 42429d CreateDirectoryW 9635 4242c3 9634->9635 9636 4242b6 lstrlenW 9634->9636 9635->9622 9636->9635 9638 424160 __EH_prolog 9637->9638 9639 424245 4 API calls 9638->9639 9640 424168 GetLocalTime 9639->9640 9641 42417b 9640->9641 9642 4241fc CopyFileW 9641->9642 9643 424215 9642->9643 9643->9627 9644->9634 9645 42b015 9646 42b092 9645->9646 9647 42b027 9645->9647 9648 42b034 9647->9648 9649 42b04f 9647->9649 9668 42bf1a GetStockObject GetObjectW 9648->9668 9651 42b054 9649->9651 9652 42b06f 9649->9652 9678 42d41b 9651->9678 9653 42b074 9652->9653 9656 42b08d 9652->9656 9655 42b07e SetFocus 9653->9655 9658 42b04d 9653->9658 9655->9658 9656->9646 9659 42b0a1 9656->9659 9661 42b0d1 9656->9661 9657 42b03e 9657->9658 9670 42be3e 9657->9670 9658->9646 9702 42ad4b 9658->9702 9687 42bd49 9659->9687 9664 42b0d6 9661->9664 9665 42b0ed 9661->9665 9698 42bde2 9664->9698 9665->9658 9667 42b104 GetParent SendMessageW 9665->9667 9667->9658 9669 42bf58 9668->9669 9669->9657 9671 42be5b 9670->9671 9706 42c5a9 9671->9706 9673 42be79 9674 42be83 SendMessageW SendMessageW SendMessageW SendMessageW 9673->9674 9675 42bf0a 9673->9675 9676 42beed SetWindowPos 9674->9676 9675->9658 9676->9675 9679 42d48f SetRect 9678->9679 9680 42d43f SetRect 9678->9680 9681 42d46a 9679->9681 9683 42d4ae SetWindowPos 9679->9683 9680->9681 9682 42d45e SetWindowPos 9680->9682 9684 42d487 9681->9684 9685 42d481 SetWindowPos 9681->9685 9682->9681 9683->9681 9686 42d4de InvalidateRect 9684->9686 9685->9686 9686->9658 9688 42bd53 __EH_prolog 9687->9688 9689 42bd61 9688->9689 9690 42bd85 BeginPaint 9688->9690 9709 42d4f4 GetClientRect 9689->9709 9692 42d4f4 12 API calls 9690->9692 9694 42bdb0 9692->9694 9696 42d5e3 4 API calls 9694->9696 9697 42bd83 9694->9697 9696->9697 9697->9658 9699 42bdf9 9698->9699 9700 42bdef 9698->9700 9699->9700 9720 42d656 9699->9720 9700->9658 9705 42ad5c 9702->9705 9703 42ad72 9703->9646 9704 42ada1 GetParent SendMessageW 9704->9646 9705->9703 9705->9704 9707 42c5b7 9706->9707 9708 42c5bc CreateWindowExW 9706->9708 9707->9708 9708->9673 9710 42d523 DrawEdge FillRect 9709->9710 9711 42d554 7 API calls 9709->9711 9712 42bd6e 9710->9712 9713 42d5c0 DrawTextW SelectObject 9711->9713 9714 42d5bc 9711->9714 9712->9697 9715 42d5e3 GetClientRect 9712->9715 9713->9712 9714->9713 9716 42d615 GetWindowLongW 9715->9716 9718 42d643 FillRect 9716->9718 9719 42d62f DrawEdge 9716->9719 9718->9697 9719->9718 9721 42d69f 9720->9721 9722 42d67c 9720->9722 9723 42d67e 9721->9723 9727 430481 9721->9727 9722->9723 9726 430468 FillRect 9722->9726 9723->9700 9726->9723 9745 437c80 9727->9745 9729 43048b OffsetRect 9730 430556 9729->9730 9731 4304d9 OffsetRect GetSysColor CreatePen 9729->9731 9733 430564 GetSysColor CreatePen 9730->9733 9734 43055a OffsetRect 9730->9734 9746 431aad 10 API calls 9731->9746 9748 431aad 10 API calls 9733->9748 9734->9733 9736 43051b GetSysColor CreatePen 9747 431aad 10 API calls 9736->9747 9737 43058e 9739 430592 DeleteObject 9737->9739 9740 430599 9737->9740 9739->9740 9740->9723 9741 43053d 9742 430547 DeleteObject 9741->9742 9743 43054a 9741->9743 9742->9743 9743->9740 9744 43054f DeleteObject 9743->9744 9744->9740 9745->9729 9746->9736 9747->9741 9748->9737 9753 42b61a GetSubMenu 9754 436419 GetStockObject GetObjectW SystemParametersInfoW 9755 43646e 9754->9755 9756 43647c 6 API calls 9754->9756 9755->9756 9757 425c1e 9758 425c31 lstrlenW 9757->9758 9759 425c4f 9757->9759 9758->9759 9760 425c3f 9758->9760 9760->9758 9760->9759 10517 43271f GetLocaleInfoW 10518 4327a5 10517->10518 10519 436521 10522 435738 10519->10522 10523 43575f 10522->10523 10524 43574c 10522->10524 10526 435a19 10524->10526 10527 435a43 SendMessageW 10526->10527 10528 435a2b 10526->10528 10529 435af2 10527->10529 10530 435a6c GetClientRect 10527->10530 10528->10527 10536 435b82 10528->10536 10532 435afd SendMessageW 10529->10532 10529->10536 10538 435b92 SendMessageW 10530->10538 10534 435b10 GetClientRect SendMessageW SendMessageW PostMessageW 10532->10534 10532->10536 10533 435aa9 10539 435be3 SendMessageW 10533->10539 10534->10536 10536->10523 10537 435ac3 PostMessageW PostMessageW 10537->10536 10538->10533 10539->10537 9761 406a27 9762 406a51 9761->9762 9766 406eb4 9761->9766 9767 406ebe 9762->9767 9764 407a56 VirtualProtect 9765 407a93 9764->9765 9766->9764 9768 406ecb 9767->9768 9769 407a56 VirtualProtect 9768->9769 9770 407a93 9769->9770 10544 42ab2b 10551 42b866 10544->10551 10546 42ab44 10547 4380a0 4 API calls 10546->10547 10548 42ab5f 10547->10548 10549 43813c LeaveCriticalSection 10548->10549 10550 42ab7c 10549->10550 10552 42b877 10551->10552 10553 42b883 10552->10553 10555 42c699 10552->10555 10553->10546 10556 42c6a3 __EH_prolog 10555->10556 10557 4380a0 4 API calls 10556->10557 10560 42c6f3 10557->10560 10558 43813c LeaveCriticalSection 10559 42c970 10558->10559 10559->10552 10560->10558 9771 43622c 9772 436252 6 API calls 9771->9772 9773 436238 CallWindowProcW 9771->9773 9774 4362c1 9772->9774 9773->9774 10561 425931 10562 437ca0 10561->10562 10563 42593e SendMessageW 10562->10563 10564 425973 10563->10564 10565 4259b8 lstrcpyW lstrcpyW 10564->10565 10566 42598c 10564->10566 10565->10566 9781 406c36 9782 406e90 9781->9782 9783 406ebe VirtualProtect 9782->9783 9786 406eb4 9783->9786 9784 407a56 VirtualProtect 9785 407a93 9784->9785 9786->9784 9787 421838 9796 437c80 9787->9796 9789 421842 GetLocalTime 9790 42185d 9789->9790 9791 4218a7 9790->9791 9792 421899 9790->9792 9794 4218a0 9791->9794 9795 424156 6 API calls 9791->9795 9793 424156 6 API calls 9792->9793 9793->9794 9795->9794 9796->9789 9797 42ac3f 9798 42ac70 SendMessageW 9797->9798 10584 42e53c 10585 42e555 10584->10585 10586 42e5bd 10585->10586 10588 4310a7 10585->10588 10589 4310b6 10588->10589 10592 43204c 10589->10592 10591 4310dd 10591->10586 10593 432056 __EH_prolog 10592->10593 10594 43206d 10593->10594 10596 432105 10593->10596 10594->10591 10599 430ecd 10596->10599 10598 43212f 10598->10594 10600 430ede 10599->10600 10601 4380a0 4 API calls 10600->10601 10602 430ef8 10601->10602 10603 43813c LeaveCriticalSection 10602->10603 10604 430f21 10603->10604 10604->10598 10605 43653c 10606 43656f 10605->10606 10607 43654c 10605->10607 10608 4365b7 10606->10608 10612 43656d 10606->10612 10625 437058 10606->10625 10607->10608 10611 436564 10607->10611 10635 435763 10608->10635 10614 4365cd 10611->10614 10615 4365e8 10614->10615 10616 4366ef 10614->10616 10617 4365f1 GetSystemMetrics 10615->10617 10618 43660e GetDC 10615->10618 10616->10612 10617->10616 10619 436621 CreateFontIndirectW SelectObject 10618->10619 10620 436650 SelectObject 10618->10620 10621 436660 DrawTextW SelectObject 10619->10621 10620->10621 10622 4366a0 GetSystemMetrics ReleaseDC 10621->10622 10623 436699 DeleteObject 10621->10623 10622->10616 10623->10622 10626 437078 10625->10626 10627 437070 10625->10627 10626->10627 10628 43709b GetMenuItemCount 10626->10628 10627->10608 10628->10627 10631 4370af 10628->10631 10629 4370c4 GetMenuItemInfoW 10630 4371b4 GetMenuItemCount 10629->10630 10629->10631 10630->10627 10630->10631 10631->10629 10631->10630 10632 43716f lstrlenW 10631->10632 10633 437191 lstrcpyW 10631->10633 10634 43719f SetMenuItemInfoW 10631->10634 10632->10631 10633->10634 10634->10630 10636 4357ba SendMessageW 10635->10636 10637 435774 10635->10637 10646 4357a4 10636->10646 10638 4357d4 10637->10638 10639 43577b 10637->10639 10651 435dfe GetMessagePos 10638->10651 10639->10636 10644 435783 10639->10644 10642 4357e0 10652 435e18 GetCursorPos ScreenToClient 10642->10652 10644->10646 10647 4360c1 10644->10647 10646->10612 10648 4360ca 10647->10648 10657 435f35 10648->10657 10651->10642 10675 435bab SendMessageW 10652->10675 10654 435e40 10655 435e53 10654->10655 10656 435f35 16 API calls 10654->10656 10655->10646 10656->10655 10658 435e57 4 API calls 10657->10658 10659 435f47 IsWindowVisible 10658->10659 10660 436076 10659->10660 10661 435f59 GetActiveWindow 10659->10661 10660->10646 10661->10660 10662 435f68 GetSubMenu 10661->10662 10662->10660 10663 435f81 10662->10663 10672 435bc2 SendMessageW 10663->10672 10665 435f93 10673 435b92 SendMessageW 10665->10673 10667 435fad MapWindowPoints MapWindowPoints GetCurrentThreadId SetWindowsHookExW TrackPopupMenuEx 10668 436037 SendMessageW 10667->10668 10669 43604b 10667->10669 10668->10669 10674 435bc2 SendMessageW 10669->10674 10671 43605a UnhookWindowsHookEx 10671->10660 10672->10665 10673->10667 10674->10671 10675->10654 10676 42c9cb 10677 42c9e0 10676->10677 10678 4380a0 4 API calls 10677->10678 10679 42c9fc 10678->10679 10680 43813c LeaveCriticalSection 10679->10680 10681 42ca28 10680->10681 9812 4210cc 9813 421062 9812->9813 9813->9812 9814 42111f lstrcatW 9813->9814 9815 421138 lstrcatW 9814->9815 9817 4163ab 9815->9817 9818 42117e wsprintfW 9817->9818 9821 4211a4 9818->9821 9820 421215 SetWindowTextW 9823 42122d 9820->9823 9859 427c1a 9821->9859 9822 4211e5 9822->9820 9824 421294 GetSystemMetrics GetSystemMetrics ImageList_Create 9823->9824 9829 421338 9823->9829 9867 4354e9 9824->9867 9827 4354e9 2 API calls 9828 4212e2 ImageList_ReplaceIcon LoadImageW ImageList_ReplaceIcon 9827->9828 9830 421324 9828->9830 9877 42169f GetDlgItem SendMessageW SendMessageW 9829->9877 9871 4215aa 9830->9871 9833 421386 wsprintfW 9834 4213ba 9833->9834 9879 421728 9834->9879 9836 4213c7 9837 4213ce wsprintfW 9836->9837 9838 4213f5 9837->9838 9839 421728 SendMessageW 9838->9839 9840 421402 9839->9840 9841 421728 SendMessageW 9840->9841 9842 421424 9841->9842 9843 421728 SendMessageW 9842->9843 9844 421443 9843->9844 9845 421728 SendMessageW 9844->9845 9846 421465 9845->9846 9847 421728 SendMessageW 9846->9847 9848 421484 9847->9848 9883 425e22 9848->9883 9850 4214d4 9851 4214db GetDlgItem SetWindowTextW 9850->9851 9852 4165af 9851->9852 9853 4214fb GetDlgItem SetWindowTextW 9852->9853 9854 4165af 9853->9854 9855 421515 GetDlgItem SetWindowTextW 9854->9855 9856 4165af 9855->9856 9857 42152f 6 API calls 9856->9857 9858 421599 9857->9858 9860 427c24 __EH_prolog 9859->9860 9861 427c60 RegSetValueExW 9860->9861 9864 427c93 9860->9864 9862 427c97 RegDeleteValueW 9861->9862 9863 427c7f 9861->9863 9862->9864 9865 427caf RegCloseKey 9862->9865 9863->9864 9866 427c8a RegCloseKey 9863->9866 9864->9822 9865->9864 9866->9864 9868 4354f2 GetModuleHandleW 9867->9868 9869 435506 LoadIconW 9867->9869 9868->9869 9870 4212c7 ImageList_ReplaceIcon 9868->9870 9869->9870 9870->9827 9873 4215b4 __EH_prolog 9871->9873 9872 421679 9872->9829 9873->9872 9874 4215e5 GetDlgItem CreateWindowExW 9873->9874 9874->9872 9875 421623 9874->9875 9875->9872 9876 421627 SendMessageW SendMessageA 9875->9876 9876->9872 9878 421721 9877->9878 9878->9833 9880 421732 __EH_prolog 9879->9880 9881 421789 SendMessageW 9880->9881 9882 4217aa 9881->9882 9882->9836 9884 425e33 9883->9884 9885 425e40 KillTimer SetTimer 9884->9885 9886 425e37 9884->9886 9888 425e3e 9885->9888 9889 425cdf 9886->9889 9888->9850 9903 437c80 9889->9903 9891 425ce9 SendMessageW 9892 425d10 9891->9892 9902 425e13 9891->9902 9904 425c5d SendMessageW SendMessageW SendMessageW 9892->9904 9894 425d26 9895 425d44 SetWindowTextW 9894->9895 9896 425d64 KillTimer SetTimer SetDlgItemTextW 9895->9896 9897 425d5e SetWindowTextW 9895->9897 9898 425db0 9896->9898 9899 425da8 SetWindowTextW 9896->9899 9897->9896 9900 425052 2 API calls 9898->9900 9899->9898 9901 425dda SendMessageW SendMessageW 9900->9901 9901->9902 9902->9888 9903->9891 9905 425ca5 9904->9905 9906 425cd8 9904->9906 9905->9906 9907 425cae SendMessageW SendMessageW 9905->9907 9906->9894 9907->9906 9908 425cd1 SendMessageW 9907->9908 9908->9906 10682 4355cc CreateWindowExW 10683 435613 GetStockObject 10682->10683 10684 435685 SendMessageW SendMessageW SendMessageW GetClientRect 10682->10684 10685 437b74 10683->10685 10686 437dbe 10684->10686 10687 435629 GetObjectW SystemParametersInfoW 10685->10687 10688 4356d9 SetWindowPos GetWindowLongW SetWindowLongW GetWindowLongW SetWindowLongW 10686->10688 10689 435676 CreateFontIndirectW 10687->10689 10690 435666 10687->10690 10689->10684 10690->10689 9917 4264d2 9927 437ca0 9917->9927 9920 4265eb 9921 4265a9 lstrlenW 9925 42651a 9921->9925 9922 42653a GetEnvironmentVariableW 9924 42657f lstrcatW 9922->9924 9922->9925 9923 4265d5 9923->9920 9926 4265db lstrcpyW 9923->9926 9924->9925 9925->9921 9925->9922 9925->9923 9926->9920 9928 4264df lstrlenW 9927->9928 9928->9920 9928->9925 9929 4254da SendMessageW SendMessageW 9930 425517 ClientToScreen SendMessageW 9929->9930 9931 425514 9929->9931 9931->9930 9932 42aeda 9934 42aeed 9932->9934 9933 42af6d 9934->9933 9935 42af28 9934->9935 9936 42af1f 9934->9936 9937 42af26 9935->9937 9941 42af3a DestroyWindow 9935->9941 9939 42be3e 6 API calls 9936->9939 9938 42af60 9937->9938 9940 42bf1a 2 API calls 9937->9940 9938->9933 9943 42bd15 GetClientRect 9938->9943 9939->9937 9940->9938 9941->9937 9944 42d41b 6 API calls 9943->9944 9945 42bd45 9944->9945 9945->9933 9946 406eda 9947 406ede 9946->9947 9948 407a56 VirtualProtect 9947->9948 9949 407a93 9948->9949 9950 4324dc IsWindow 9951 4324f4 GetKeyboardState 9950->9951 9952 43255f 9950->9952 9953 432537 SetForegroundWindow GetKeyboardState 9951->9953 9954 432526 9951->9954 9953->9952 9956 43254e 9953->9956 9954->9953 9955 43252f keybd_event 9954->9955 9955->9953 9956->9952 9957 432557 keybd_event 9956->9957 9957->9952 10708 42b9e2 10711 42b94b 10708->10711 10710 42b9f4 10712 42b95c 10711->10712 10713 42b968 10712->10713 10715 42cb36 10712->10715 10713->10710 10716 42cb40 __EH_prolog 10715->10716 10717 4380a0 4 API calls 10716->10717 10720 42cb90 10717->10720 10718 43813c LeaveCriticalSection 10719 42ce0d 10718->10719 10719->10712 10720->10718 10721 4067e0 10722 4067fa 10721->10722 10723 406ebe VirtualProtect 10722->10723 10724 406eb4 10722->10724 10723->10724 10725 407a56 VirtualProtect 10724->10725 10726 407a93 10725->10726 10726->10726 10727 42abe0 10728 42b94b 5 API calls 10727->10728 10729 42abf9 10728->10729 10730 4380a0 4 API calls 10729->10730 10731 42ac14 10730->10731 10732 43813c LeaveCriticalSection 10731->10732 10733 42ac31 10732->10733 10734 40b7e3 10740 40b7f1 10734->10740 10735 421ddf 10737 421e8c 10735->10737 10741 421df7 10735->10741 10736 421d3a lstrcmpW 10736->10740 10746 4217c6 10737->10746 10738 4218e6 12 API calls 10738->10740 10740->10735 10740->10736 10740->10738 10744 421eac MessageBoxW 10741->10744 10743 421e72 10745 421ec9 10744->10745 10745->10743 10747 4217d0 __EH_prolog 10746->10747 10752 43226f 10747->10752 10749 42181d 10749->10743 10750 4217f9 10750->10749 10756 4323bc 10750->10756 10754 432279 __EH_prolog 10752->10754 10753 432395 10753->10750 10754->10753 10755 432344 lstrlenW 10754->10755 10755->10754 10763 437c80 10756->10763 10758 4323c6 CreateFileW 10759 4323ef WriteFile 10758->10759 10762 43243d 10758->10762 10760 403013 10759->10760 10761 432426 WriteFile CloseHandle 10760->10761 10761->10762 10762->10749 10763->10758 9970 4374ea RegOpenKeyW 9971 437515 RegDeleteValueW RegCloseKey 9970->9971 9972 43752c 9970->9972 9971->9972 10781 426de8 lstrcatW GetModuleHandleW GetOpenFileNameW 10782 426e9f 10781->10782 10783 426e86 10781->10783 10785 427502 10783->10785 10786 42750c __EH_prolog 10785->10786 10787 42752b InterlockedIncrement 10786->10787 10793 42753a 10786->10793 10787->10793 10788 4275cb wsprintfW 10788->10793 10789 427675 lstrlenW 10789->10793 10790 42769a lstrlenW 10790->10793 10791 4276ca lstrlenW 10791->10793 10792 4276f0 lstrlenW 10792->10793 10793->10788 10793->10789 10793->10790 10793->10791 10793->10792 10794 42773f 10793->10794 10795 4277c1 MessageBoxW 10794->10795 10796 4277e5 10795->10796 10797 427889 10796->10797 10799 421ecf 10796->10799 10797->10782 10800 421ed9 __EH_prolog 10799->10800 10801 421f04 lstrlenW 10800->10801 10802 421f12 10801->10802 10803 422876 3 API calls 10802->10803 10804 422088 10802->10804 10803->10804 10804->10796 10805 436be8 SetBkColor ExtTextOutW SetBkColor 10806 424fee 10807 425052 2 API calls 10806->10807 10808 425020 10807->10808 10811 424f77 10808->10811 10810 425030 lstrcatW lstrcatW 10813 424f82 10811->10813 10812 424fde lstrcatW 10812->10810 10813->10812 10814 4205f1 GetClientRect 10815 420613 GetWindowRect 10814->10815 10816 42062b GetSystemMetrics 10814->10816 10815->10816 10817 437dbe 10816->10817 10818 42064d SendMessageW GetSystemMetrics 10817->10818 10819 420689 10818->10819 10820 4206bf SendMessageW 10819->10820 10821 437dbe 10820->10821 10822 4206ef SetWindowPos GetWindowRect GetDlgItem GetDlgItem 10821->10822 10823 42073f GetWindowRect 10822->10823 10824 42079d SetWindowPos ShowWindow SetWindowPos CopyRect 10822->10824 10826 404106 10823->10826 10825 420827 10824->10825 10830 420845 SetWindowPos SetWindowPos GetSystemMetrics 10825->10830 10827 42076b ScreenToClient 10826->10827 10828 420780 ScreenToClient 10827->10828 10829 420787 CopyRect 10827->10829 10828->10829 10829->10824 10831 437dbe 10830->10831 10832 4208dd GetDlgItem SetWindowPos GetDlgItem 10831->10832 10833 437dbe 10832->10833 10834 42093b SetWindowPos GetSystemMetrics 10833->10834 10835 437dbe 10834->10835 10836 420974 GetSystemMetrics 10835->10836 10837 420993 10836->10837 10838 4209a9 GetDlgItem ShowWindow SetWindowPos GetDlgItem 10837->10838 10839 437dbe 10838->10839 10840 420a14 ShowWindow SetWindowPos 10839->10840 10841 437dbe 10840->10841 10842 420a46 GetDlgItem 10841->10842 10843 437dbe 10842->10843 10844 420a7a SetWindowPos GetDlgItem 10843->10844 10845 437dbe 10844->10845 10846 420acc SetWindowPos GetDlgItem 10845->10846 10847 437dbe 10846->10847 10848 420b12 SetWindowPos GetDlgItem 10847->10848 10849 437dbe 10848->10849 10850 420b58 SetWindowPos GetSystemMetrics 10849->10850 10851 437dbe 10850->10851 10852 420b8d SetWindowPos 10851->10852 10855 4362c5 10852->10855 10854 420bc1 10856 4362d7 10855->10856 10857 43630b GetClientRect 10855->10857 10863 4360e5 CreateWindowExW 10856->10863 10859 43633a SendMessageW SendMessageW SetWindowPos 10857->10859 10860 436328 10857->10860 10859->10854 10862 43598b 2 API calls 10860->10862 10862->10859 10864 436195 SendMessageW SendMessageW SendMessageW 10863->10864 10865 436125 GetStockObject 10863->10865 10867 4361c6 6 API calls 10864->10867 10868 436224 GetWindowLongW SetWindowLongW 10864->10868 10866 437b74 10865->10866 10869 43613b GetObjectW SystemParametersInfoW 10866->10869 10867->10868 10868->10857 10870 436186 CreateFontIndirectW 10869->10870 10871 436178 10869->10871 10870->10864 10871->10870 9981 432681 9983 432698 9981->9983 9982 4326ee 9983->9982 9984 4326d3 lstrlenW 9983->9984 9984->9983 9985 435087 9986 435093 9985->9986 9987 4350c6 ShowWindow 9985->9987 9993 435063 SystemParametersInfoW 9986->9993 9989 435098 9989->9987 9990 43509c GetWindowRect 9989->9990 9994 434f5d FindWindowExW 9990->9994 9993->9989 9995 434f9a SHAppBarMessage 9994->9995 9996 434f7d FindWindowExW 9994->9996 9998 435000 FindWindowExW 9995->9998 10001 434fb1 DrawAnimatedRects 9995->10001 9996->9995 9997 434f8b GetWindowRect 9996->9997 9997->10001 9999 43500a GetWindowRect 9998->9999 10000 43503d SystemParametersInfoW 9998->10000 9999->10001 10000->10001 10001->9987 10002 435886 10003 4358a1 10002->10003 10004 43589a 10002->10004 10005 4358a8 DestroyMenu 10003->10005 10006 4358af SendMessageW SendMessageW 10003->10006 10005->10006 10007 4358d5 10006->10007 10008 4358e9 10006->10008 10009 4358d8 SendMessageW 10007->10009 10010 4358f5 GetMenuItemCount 10008->10010 10009->10008 10009->10009 10011 435913 10010->10011 10012 435977 SendMessageW 10010->10012 10011->10012 10013 43591f GetMenuItemInfoW 10011->10013 10012->10004 10015 43598b 10013->10015 10016 4359da 10015->10016 10017 4359dd SendMessageW 10015->10017 10016->10017 10018 435a10 10017->10018 10019 4359fc SendMessageW 10017->10019 10018->10011 10019->10018 10020 43548b 10021 437b74 10020->10021 10022 4354ad SHGetFileInfoW 10021->10022 10025 435465 10022->10025 10024 4354e2 10029 4353f4 10025->10029 10030 435407 SHGetFileInfoW SHGetFileInfoW 10029->10030 10031 43545d ImageList_GetIcon 10029->10031 10030->10031 10031->10024 10032 429893 10033 42989f 10032->10033 10034 4298ae GetModuleFileNameW 10033->10034 10035 402cef 10034->10035 10036 4298d1 DeleteFileW CreateFileW 10035->10036 10037 42990a 10036->10037 10040 4299c7 10036->10040 10038 429954 10037->10038 10039 429958 lstrlenW 10037->10039 10041 429988 WriteFile CloseHandle ShellExecuteW 10038->10041 10042 437ca0 10039->10042 10041->10040 10043 42996f WideCharToMultiByte 10042->10043 10043->10041 10899 423593 10900 4235ba 10899->10900 10901 42359c 10899->10901 10901->10900 10903 4235d0 10901->10903 10904 4235e4 10903->10904 10905 4235e8 10904->10905 10906 4235fe GetSysColor 10904->10906 10905->10900 10906->10905 10907 41e397 10908 41e43c 10907->10908 10909 41ed87 10908->10909 10930 41e52e 10908->10930 10911 41edf2 2 API calls 10909->10911 10913 41edea 10911->10913 10950 41e5ea 10930->10950 10951 41e603 10950->10951 10952 41e612 10950->10952 10954 41e8ea 8 API calls 10951->10954 10969 41e642 10952->10969 10955 41e8e0 10954->10955 10957 41e978 6 API calls 10955->10957 10963 41e909 ExitProcess 10955->10963 10965 41e970 10957->10965 10958 41ed87 10960 41edf2 2 API calls 10958->10960 10959 41ecb9 10961 41ed04 3 API calls 10959->10961 10962 41edea 10960->10962 10961->10963 10964 41eb37 10966 41ebc3 4 API calls 10964->10966 10965->10964 10967 41eb41 5 API calls 10965->10967 10968 41e9aa 10965->10968 10966->10968 10967->10964 10968->10958 10968->10959 10972 41e652 10969->10972 10971 41e64a 10973 41e65f 10972->10973 10974 41e8ea 8 API calls 10973->10974 10978 41e697 10973->10978 10975 41e8e0 10974->10975 10977 41e978 6 API calls 10975->10977 10986 41e909 ExitProcess 10975->10986 10980 41e970 10977->10980 10978->10971 10979 41e9aa 10981 41ed87 10979->10981 10982 41ecb9 10979->10982 10980->10979 10987 41eb37 10980->10987 10989 41eb41 5 API calls 10980->10989 10983 41edf2 2 API calls 10981->10983 10984 41ed04 3 API calls 10982->10984 10985 41edea 10983->10985 10984->10986 10988 41ebc3 4 API calls 10987->10988 10988->10979 10989->10987 10084 435eb1 10089 435e57 10084->10089 10088 435f11 UnhookWindowsHookEx 10090 435e6a 10089->10090 10091 435e78 CreateSolidBrush 10090->10091 10092 435e6e GetSysColor 10090->10092 10096 43551a 10091->10096 10092->10091 10095 435bc2 SendMessageW 10095->10088 10097 435523 LoadLibraryW 10096->10097 10098 435537 10096->10098 10097->10098 10099 435551 GetCurrentThreadId SetWindowsHookExW TrackPopupMenuEx 10097->10099 10098->10099 10100 435540 GetProcAddress 10098->10100 10099->10095 10100->10099 10101 42b4b7 10108 42c242 10101->10108 10103 42b4d0 10104 4380a0 4 API calls 10103->10104 10105 42b4eb 10104->10105 10106 43813c LeaveCriticalSection 10105->10106 10107 42b508 10106->10107 10109 42c252 10108->10109 10111 42c28a 10108->10111 10110 42c25e 10109->10110 10109->10111 10115 42e87a 10110->10115 10113 42c268 10111->10113 10120 42e5da 10111->10120 10113->10103 10116 42e8b2 10115->10116 10119 42e88d 10115->10119 10116->10113 10117 42e87a 5 API calls 10117->10119 10119->10116 10119->10117 10126 42b85e 10119->10126 10121 42e5e4 __EH_prolog 10120->10121 10122 4380a0 4 API calls 10121->10122 10123 42e634 10122->10123 10124 43813c LeaveCriticalSection 10123->10124 10125 42e84a 10124->10125 10125->10111 10127 42c1e3 10126->10127 10134 42e46f 10127->10134 10129 42c1fc 10130 4380a0 4 API calls 10129->10130 10131 42c217 10130->10131 10132 43813c LeaveCriticalSection 10131->10132 10133 42c234 10132->10133 10133->10119 10135 42e480 10134->10135 10136 42e48c 10135->10136 10138 430b98 10135->10138 10136->10129 10139 430ba2 __EH_prolog 10138->10139 10140 4380a0 4 API calls 10139->10140 10141 430bf2 10140->10141 10142 43813c LeaveCriticalSection 10141->10142 10143 430e08 10142->10143 10143->10135 10156 42acbc 10158 42acd1 10156->10158 10163 42acd7 10156->10163 10157 42acfa 10174 42b9f6 10157->10174 10158->10157 10158->10163 10164 42ceff 10158->10164 10162 42ad4b 2 API calls 10162->10163 10165 42cf25 10164->10165 10166 42cf0b GetClientRect 10164->10166 10167 42cf34 10165->10167 10168 42cf3d 10165->10168 10166->10165 10208 42bcc3 10167->10208 10171 42cf3b 10168->10171 10213 430429 10168->10213 10172 42cf5c 10171->10172 10217 42bbbe 10171->10217 10172->10157 10175 42ba08 10174->10175 10195 42ad17 10174->10195 10176 42ba15 10175->10176 10177 42ba2c 10175->10177 10238 42d015 10176->10238 10179 42ba2a 10177->10179 10245 42d06e 10177->10245 10181 42bb53 10179->10181 10184 42ba82 10179->10184 10185 42ba9e 10179->10185 10179->10195 10182 42bb82 10181->10182 10183 42bb58 10181->10183 10189 42bb9c 10182->10189 10284 42d279 CallWindowProcW 10182->10284 10188 42bb6e SetFocus 10183->10188 10183->10195 10251 42d0e4 10184->10251 10186 42baa7 10185->10186 10187 42babe 10185->10187 10255 42d14d 10186->10255 10193 42bac7 10187->10193 10194 42bade 10187->10194 10188->10195 10189->10195 10290 430328 GetSystemMetrics 10189->10290 10271 42d208 10193->10271 10198 42bae6 ReleaseCapture 10194->10198 10199 42baf4 10194->10199 10195->10162 10195->10163 10198->10195 10200 42bb1a 10199->10200 10201 42bafc 10199->10201 10200->10181 10202 42bb22 10200->10202 10203 42cf61 6 API calls 10201->10203 10202->10195 10277 430273 10202->10277 10203->10195 10205 42bb36 10206 42bbbe 5 API calls 10205->10206 10207 42bb3d UpdateWindow 10206->10207 10207->10195 10209 42bccc 10208->10209 10210 42bd13 10209->10210 10211 42bcea MulDiv 10209->10211 10210->10171 10228 42cf61 10211->10228 10214 430430 10213->10214 10215 430467 10214->10215 10216 42cf61 6 API calls 10214->10216 10215->10171 10216->10215 10218 42bbd1 10217->10218 10219 42bbf8 10218->10219 10220 42bc75 10218->10220 10227 42bc73 10218->10227 10221 42bc07 InvalidateRect 10219->10221 10224 42bc16 10219->10224 10222 42bcaf InvalidateRect 10220->10222 10223 42bc8f SetWindowPos 10220->10223 10220->10227 10221->10224 10222->10227 10223->10227 10225 42bc57 InvalidateRect 10224->10225 10226 42bc37 SetWindowPos 10224->10226 10224->10227 10225->10224 10226->10224 10227->10172 10229 42cf6f 10228->10229 10232 42cfe2 10229->10232 10234 4303b8 10229->10234 10230 42d00d 10230->10210 10232->10230 10233 42bbbe 5 API calls 10232->10233 10233->10230 10235 4303c1 10234->10235 10236 4303f3 10235->10236 10237 4303df MulDiv 10235->10237 10236->10232 10237->10232 10239 430328 10 API calls 10238->10239 10240 42d021 10239->10240 10241 42d060 10240->10241 10242 42d026 EnterCriticalSection 10240->10242 10241->10179 10243 42d051 LeaveCriticalSection 10242->10243 10244 42d03a LoadCursorW 10242->10244 10243->10241 10244->10243 10246 42d078 __EH_prolog 10245->10246 10247 42d09f BeginPaint 10246->10247 10250 42cf61 6 API calls 10246->10250 10299 43018b 10247->10299 10249 42d0cb 10249->10179 10250->10247 10252 42d100 10251->10252 10253 42d136 10251->10253 10252->10253 10254 42d107 GetMessagePos ScreenToClient 10252->10254 10253->10195 10254->10253 10256 42d1e1 10255->10256 10257 42d175 GetCapture 10255->10257 10258 42d1f0 SetCursor 10256->10258 10259 42d1df 10256->10259 10257->10256 10260 42d180 10257->10260 10258->10259 10259->10195 10260->10259 10261 42d1c6 10260->10261 10262 42d1ac 10260->10262 10264 430273 8 API calls 10261->10264 10263 42cf61 6 API calls 10262->10263 10265 42d1b7 10263->10265 10266 42d1cd 10264->10266 10265->10259 10267 42d1bb UpdateWindow 10265->10267 10268 42cf61 6 API calls 10266->10268 10267->10259 10269 42d1d8 10268->10269 10270 430273 8 API calls 10269->10270 10270->10259 10272 42d221 10271->10272 10273 42d225 SetCapture SetCursor 10272->10273 10276 42d24f 10272->10276 10274 42d248 10273->10274 10273->10276 10275 430273 8 API calls 10274->10275 10275->10276 10276->10195 10278 43027d __EH_prolog 10277->10278 10279 43029f GetWindowDC 10278->10279 10283 43030d 10278->10283 10319 4318e0 10279->10319 10282 4302d0 SelectObject PatBlt SelectObject DeleteObject 10282->10283 10283->10205 10285 42d2b0 GetMessagePos ScreenToClient 10284->10285 10286 42d2ab 10284->10286 10288 42d2d4 10285->10288 10286->10285 10287 42d2fe 10286->10287 10287->10189 10288->10287 10289 42d2e4 PtInRect 10288->10289 10289->10287 10289->10288 10291 430349 10290->10291 10292 43034c GetWindowLongW 10290->10292 10291->10292 10293 430367 GetSystemMetrics 10292->10293 10294 43037f GetSystemMetrics 10292->10294 10295 430395 SystemParametersInfoW 10293->10295 10294->10295 10296 4303b3 10295->10296 10297 4303ac 10295->10297 10296->10195 10298 42bbbe 5 API calls 10297->10298 10298->10296 10300 430195 __EH_prolog 10299->10300 10301 4301e5 10300->10301 10302 4301bb 10300->10302 10307 4301e2 10300->10307 10304 431a51 3 API calls 10301->10304 10301->10307 10308 4319f0 10302->10308 10304->10307 10305 4301c9 10305->10307 10313 431a51 10305->10313 10307->10249 10309 431a02 10308->10309 10310 431a06 FillRect GetWindowLongW 10309->10310 10311 431a4c 10309->10311 10310->10311 10312 431a30 DrawEdge 10310->10312 10311->10305 10312->10311 10314 431a66 10313->10314 10315 431a6a GetWindowLongW 10314->10315 10316 431aa8 10314->10316 10317 431a85 DrawEdge 10315->10317 10318 431a99 FillRect 10315->10318 10316->10305 10317->10318 10318->10316 10320 4318f2 10319->10320 10320->10320 10321 431909 CreateBitmap 10320->10321 10322 4302ca 10321->10322 10323 431921 CreatePatternBrush DeleteObject 10321->10323 10322->10282 10322->10283 10323->10322

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 4067e0-406a4b call 406801 call 406849 call 406a3a 16 406a51-406ec9 call 406ebe 0->16 17 407349-407a2e call 407377 call 4076e3 0->17 27 406ecb-406f07 16->27 28 406f0c-406f6a 16->28 34 407a34-407a91 call 407a56 VirtualProtect 17->34 27->34 31 406f6c-406f78 28->31 32 406f7d-406f92 28->32 35 40726e-407275 31->35 36 406f94-406fa0 32->36 37 406fa5-406fc4 32->37 52 407a93-407ad1 34->52 53 407ad9-407b22 call 407b20 34->53 35->17 40 40727b-407306 call 407291 call 4072d9 35->40 36->35 38 406fc6-406fd2 37->38 39 406fd7-406fe9 37->39 38->35 44 406feb-406ff7 39->44 45 406ffc-407065 39->45 40->17 78 407308-407344 40->78 44->35 54 407262-407268 45->54 55 40706b-4070b5 45->55 52->53 80 407b24 53->80 54->35 58 4070c6-4070d7 55->58 62 407178-40725b call 407186 call 407197 58->62 63 4070dd-4070ed 58->63 62->35 63->62 67 4070f3-407144 call 40711b 63->67 82 407146-407168 67->82 83 40716a 67->83 78->34 80->80 82->83 86 407171 82->86 83->58 86->62
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: =<J=$L$L$W$a$a$b$d$i$o$r$r$y
                        • API String ID: 0-4014269246
                        • Opcode ID: 0411835356f1e99fe726466764d439a675ece6bae9d9b91ec0af716ad98a374d
                        • Instruction ID: 2c68c16b3c9552cff33701e784215426489a4e626329e3ecda5d4fc364bf889c
                        • Opcode Fuzzy Hash: 0411835356f1e99fe726466764d439a675ece6bae9d9b91ec0af716ad98a374d
                        • Instruction Fuzzy Hash: E1B106B2D042649AE7208B24EC44BEA7B75FF94310F0481FAD44DA7281D67E1FC5CB96

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 91 40691a-40692a 92 406930-40693d 91->92 93 40682f-406905 call 406849 91->93 94 40694b 92->94 95 40693f-406949 92->95 99 406961-406a4b call 406a3a 93->99 97 406955-40695b 94->97 95->97 97->99 108 406a51-406ec9 call 406ebe 99->108 109 407349-407a2e call 407377 call 4076e3 99->109 119 406ecb-406f07 108->119 120 406f0c-406f6a 108->120 126 407a34-407a91 call 407a56 VirtualProtect 109->126 119->126 123 406f6c-406f78 120->123 124 406f7d-406f92 120->124 127 40726e-407275 123->127 128 406f94-406fa0 124->128 129 406fa5-406fc4 124->129 144 407a93-407ad1 126->144 145 407ad9-407b22 call 407b20 126->145 127->109 132 40727b-407306 call 407291 call 4072d9 127->132 128->127 130 406fc6-406fd2 129->130 131 406fd7-406fe9 129->131 130->127 136 406feb-406ff7 131->136 137 406ffc-407065 131->137 132->109 170 407308-407344 132->170 136->127 146 407262-407268 137->146 147 40706b-4070b5 137->147 144->145 172 407b24 145->172 146->127 150 4070c6-4070d7 147->150 154 407178-40725b call 407186 call 407197 150->154 155 4070dd-4070ed 150->155 154->127 155->154 159 4070f3-407144 call 40711b 155->159 174 407146-407168 159->174 175 40716a 159->175 170->126 172->172 174->175 178 407171 174->178 175->150 178->154
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: =<J=$L$L$W$a$a$b$d$i$o$r$r$y
                        • API String ID: 0-4014269246
                        • Opcode ID: 421a658dd392df710e2980d55fc65b84dbf2d44b67ff5baaec0e926ea5b89acd
                        • Instruction ID: 735344d9b9f8781e42937aab5551b62c973feb849933e8d3aadb6fb6529b90e1
                        • Opcode Fuzzy Hash: 421a658dd392df710e2980d55fc65b84dbf2d44b67ff5baaec0e926ea5b89acd
                        • Instruction Fuzzy Hash: 3AB107B1D042649AEB208B24DC44BEA7BB5FF94314F1441FAD44DA7281D67E1FC1CBA6

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 499 41e397-41e475 501 41ed87-41edf1 call 41edf2 499->501 502 41e47b-41e5da call 41e52e 499->502 507 41e5e0-41e601 502->507 508 41e5db call 41e5ea 502->508 510 41e603-41e60d 507->510 511 41e612-41e640 call 41e642 507->511 508->507 512 41e8ce-41e907 call 41e8ea 510->512 511->512 517 41e909-41e945 512->517 518 41e94a-41e9a8 call 41e978 512->518 523 41f486-41f488 ExitProcess 517->523 526 41e9bb-41e9d0 518->526 527 41e9aa-41e9b6 518->527 529 41e9e3-41ea02 526->529 530 41e9d2-41e9de 526->530 528 41ecac-41ecb3 527->528 528->501 533 41ecb9-41ed03 call 41ed04 528->533 531 41ea15-41ea27 529->531 532 41ea04-41ea10 529->532 530->528 534 41ea29-41ea35 531->534 535 41ea3a-41eaa3 531->535 532->528 533->523 534->528 539 41eca0-41eca6 535->539 540 41eaa9-41eb15 535->540 539->528 542 41ebb6-41ebc2 call 41ebc3 540->542 543 41eb1b-41eb2b 540->543 542->539 543->542 544 41eb31-41eb40 call 41eb41 543->544 544->542
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID: L$L$W$a$a$b$d$i$o$r$r$y
                        • API String ID: 621844428-4069139063
                        • Opcode ID: 6ef5ffdaa3d6d2533fac22b14bf18c693c50f9ae1fd002498bb8a7f5ee8dc040
                        • Instruction ID: 7d649fead518623d42cc9d8e58729371736bb5d974bd47763e21c6028a608654
                        • Opcode Fuzzy Hash: 6ef5ffdaa3d6d2533fac22b14bf18c693c50f9ae1fd002498bb8a7f5ee8dc040
                        • Instruction Fuzzy Hash: 9371D0B1E096988EF7258B34CC147EA7BB5EF51304F0480FED4499B282DA7D4BC58B66

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 595 406ebe-406ec9 596 406ecb-406f07 595->596 597 406f0c-406f6a 595->597 601 407a34-407a91 call 407a56 VirtualProtect 596->601 599 406f6c-406f78 597->599 600 406f7d-406f92 597->600 602 40726e-407275 599->602 603 406f94-406fa0 600->603 604 406fa5-406fc4 600->604 619 407a93-407ad1 601->619 620 407ad9-407b22 call 407b20 601->620 607 407349-407a2e call 407377 call 4076e3 602->607 608 40727b-407306 call 407291 call 4072d9 602->608 603->602 605 406fc6-406fd2 604->605 606 406fd7-406fe9 604->606 605->602 611 406feb-406ff7 606->611 612 406ffc-407065 606->612 607->601 608->607 651 407308-407344 608->651 611->602 621 407262-407268 612->621 622 40706b-4070b5 612->622 619->620 654 407b24 620->654 621->602 626 4070c6-4070d7 622->626 632 407178-40725b call 407186 call 407197 626->632 633 4070dd-4070ed 626->633 632->602 633->632 638 4070f3-407144 call 40711b 633->638 657 407146-407168 638->657 658 40716a 638->658 651->601 654->654 657->658 661 407171 657->661 658->626 661->632
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID: =<J=$=@32
                        • API String ID: 544645111-3383516053
                        • Opcode ID: 9765fcfc9b84c1aa165d1d77c1f02148d68d484e8c8b9ad6771be5e7772f0d45
                        • Instruction ID: e750c7f7439aadec8c6e5426c393129ed4d7152597e28964240f52a71426d38f
                        • Opcode Fuzzy Hash: 9765fcfc9b84c1aa165d1d77c1f02148d68d484e8c8b9ad6771be5e7772f0d45
                        • Instruction Fuzzy Hash: 8AF17FB1D092689BEB24CB14CC94BEA77B5EB85314F1441FAD80E67281D6386FC2CF56

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 666 40747a-407a91 call 407553 call 407600 call 4076e3 call 407a56 VirtualProtect 689 407a93-407ad1 666->689 690 407ad9-407b22 call 407b20 666->690 689->690 698 407b24 690->698 698->698
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID: =<J=
                        • API String ID: 544645111-1552549898
                        • Opcode ID: 305f7217f1711690d97eb67d90b78793daa302e6a78bc335abcf3a7dc55d5b47
                        • Instruction ID: 738528193e964dbc0e6ed2d9b3dcf20250a3da32534f485b43496aaa868eadc8
                        • Opcode Fuzzy Hash: 305f7217f1711690d97eb67d90b78793daa302e6a78bc335abcf3a7dc55d5b47
                        • Instruction Fuzzy Hash: 6971E5B2D091659BEB248B24CC54BEA7775FF85310F1081FAD80DA7281D6396EC2CF56

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 699 40759c-4075ac 700 4074b1-407587 call 407553 699->700 701 4075b2-4075bf 699->701 707 4075e3-407a91 call 407600 call 4076e3 call 407a56 VirtualProtect 700->707 702 4075c1-4075cb 701->702 703 4075cd 701->703 705 4075d7-4075dd 702->705 703->705 705->707 726 407a93-407ad1 707->726 727 407ad9-407b22 call 407b20 707->727 726->727 735 407b24 727->735 735->735
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: =<J=
                        • API String ID: 0-1552549898
                        • Opcode ID: f9fabbd2a2a82941f7d205b077d745ca264b072a726e91973b0c42cbe854219f
                        • Instruction ID: bb7503dfdbf1590933322bf86fe6dea4c03d3c49bdc58396b39e3ba034320f4b
                        • Opcode Fuzzy Hash: f9fabbd2a2a82941f7d205b077d745ca264b072a726e91973b0c42cbe854219f
                        • Instruction Fuzzy Hash: 4271D3B1D091659AEB248B24DC54BEA7B74FB85314F1081FAD80EA7281D63C6EC2CF56

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 183 406981-406a4b call 406a3a 188 406a51-406ec9 call 406ebe 183->188 189 407349-407a2e call 407377 call 4076e3 183->189 199 406ecb-406f07 188->199 200 406f0c-406f6a 188->200 206 407a34-407a91 call 407a56 VirtualProtect 189->206 199->206 203 406f6c-406f78 200->203 204 406f7d-406f92 200->204 207 40726e-407275 203->207 208 406f94-406fa0 204->208 209 406fa5-406fc4 204->209 224 407a93-407ad1 206->224 225 407ad9-407b22 call 407b20 206->225 207->189 212 40727b-407306 call 407291 call 4072d9 207->212 208->207 210 406fc6-406fd2 209->210 211 406fd7-406fe9 209->211 210->207 216 406feb-406ff7 211->216 217 406ffc-407065 211->217 212->189 250 407308-407344 212->250 216->207 226 407262-407268 217->226 227 40706b-4070b5 217->227 224->225 252 407b24 225->252 226->207 230 4070c6-4070d7 227->230 234 407178-40725b call 407186 call 407197 230->234 235 4070dd-4070ed 230->235 234->207 235->234 239 4070f3-407144 call 40711b 235->239 254 407146-407168 239->254 255 40716a 239->255 250->206 252->252 254->255 258 407171 254->258 255->230 258->234
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID: =<J=$L$L$W$a$a$b$d$i$o$r$r$y
                        • API String ID: 544645111-4014269246
                        • Opcode ID: 242b3a3814fc52744b42c5e6d3e8239d84c2fe5bc98553ddaeb97955af49eb4c
                        • Instruction ID: 7dbc5dd6b3223fae26f022291965f43ab8c5a89abc06b9792139beda074362b3
                        • Opcode Fuzzy Hash: 242b3a3814fc52744b42c5e6d3e8239d84c2fe5bc98553ddaeb97955af49eb4c
                        • Instruction Fuzzy Hash: 18811872E082A49AF7208624EC44BDA7BB5EF95310F0441FAD44DA7281D67E1FC5CFA6

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 263 40675c-406a4b call 406a3a 268 406a51-406ec9 call 406ebe 263->268 269 407349-407a2e call 407377 call 4076e3 263->269 279 406ecb-406f07 268->279 280 406f0c-406f6a 268->280 286 407a34-407a91 call 407a56 VirtualProtect 269->286 279->286 283 406f6c-406f78 280->283 284 406f7d-406f92 280->284 287 40726e-407275 283->287 288 406f94-406fa0 284->288 289 406fa5-406fc4 284->289 304 407a93-407ad1 286->304 305 407ad9-407b22 call 407b20 286->305 287->269 292 40727b-407306 call 407291 call 4072d9 287->292 288->287 290 406fc6-406fd2 289->290 291 406fd7-406fe9 289->291 290->287 296 406feb-406ff7 291->296 297 406ffc-407065 291->297 292->269 330 407308-407344 292->330 296->287 306 407262-407268 297->306 307 40706b-4070b5 297->307 304->305 332 407b24 305->332 306->287 310 4070c6-4070d7 307->310 314 407178-40725b call 407186 call 407197 310->314 315 4070dd-4070ed 310->315 314->287 315->314 319 4070f3-407144 call 40711b 315->319 334 407146-407168 319->334 335 40716a 319->335 330->286 332->332 334->335 338 407171 334->338 335->310 338->314
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID: =<J=$L$L$W$a$a$b$d$i$o$r$r$y
                        • API String ID: 544645111-4014269246
                        • Opcode ID: 928647cb7d64a655767f8b135be432c456f8dcdf0d1ea92984ee5f9edfc46b03
                        • Instruction ID: c5d18e3d2b37e6bb8494259fe987c37ee8e1f86bf4868dc0386e09816f38c9fa
                        • Opcode Fuzzy Hash: 928647cb7d64a655767f8b135be432c456f8dcdf0d1ea92984ee5f9edfc46b03
                        • Instruction Fuzzy Hash: 9071F772E042A49AF7208624DC44BDA7BB5FF95300F0441FAD44DA7281D67E1FC58FA6

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 343 4067b8-406a4b call 406a3a 348 406a51-406ec9 call 406ebe 343->348 349 407349-407a2e call 407377 call 4076e3 343->349 359 406ecb-406f07 348->359 360 406f0c-406f6a 348->360 366 407a34-407a91 call 407a56 VirtualProtect 349->366 359->366 363 406f6c-406f78 360->363 364 406f7d-406f92 360->364 367 40726e-407275 363->367 368 406f94-406fa0 364->368 369 406fa5-406fc4 364->369 384 407a93-407ad1 366->384 385 407ad9-407b22 call 407b20 366->385 367->349 372 40727b-407306 call 407291 call 4072d9 367->372 368->367 370 406fc6-406fd2 369->370 371 406fd7-406fe9 369->371 370->367 376 406feb-406ff7 371->376 377 406ffc-407065 371->377 372->349 410 407308-407344 372->410 376->367 386 407262-407268 377->386 387 40706b-4070b5 377->387 384->385 412 407b24 385->412 386->367 390 4070c6-4070d7 387->390 394 407178-40725b call 407186 call 407197 390->394 395 4070dd-4070ed 390->395 394->367 395->394 399 4070f3-407144 call 40711b 395->399 414 407146-407168 399->414 415 40716a 399->415 410->366 412->412 414->415 418 407171 414->418 415->390 418->394
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID: =<J=$L$L$W$a$a$b$d$i$o$r$r$y
                        • API String ID: 544645111-4014269246
                        • Opcode ID: 928647cb7d64a655767f8b135be432c456f8dcdf0d1ea92984ee5f9edfc46b03
                        • Instruction ID: c5d18e3d2b37e6bb8494259fe987c37ee8e1f86bf4868dc0386e09816f38c9fa
                        • Opcode Fuzzy Hash: 928647cb7d64a655767f8b135be432c456f8dcdf0d1ea92984ee5f9edfc46b03
                        • Instruction Fuzzy Hash: 9071F772E042A49AF7208624DC44BDA7BB5FF95300F0441FAD44DA7281D67E1FC58FA6

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 423 406a27-406a4b 424 406a51-406ec9 call 406ebe 423->424 425 407349-407a2e call 407377 call 4076e3 423->425 435 406ecb-406f07 424->435 436 406f0c-406f6a 424->436 442 407a34-407a91 call 407a56 VirtualProtect 425->442 435->442 439 406f6c-406f78 436->439 440 406f7d-406f92 436->440 443 40726e-407275 439->443 444 406f94-406fa0 440->444 445 406fa5-406fc4 440->445 460 407a93-407ad1 442->460 461 407ad9-407b22 call 407b20 442->461 443->425 448 40727b-407306 call 407291 call 4072d9 443->448 444->443 446 406fc6-406fd2 445->446 447 406fd7-406fe9 445->447 446->443 452 406feb-406ff7 447->452 453 406ffc-407065 447->453 448->425 486 407308-407344 448->486 452->443 462 407262-407268 453->462 463 40706b-4070b5 453->463 460->461 488 407b24 461->488 462->443 466 4070c6-4070d7 463->466 470 407178-40725b call 407186 call 407197 466->470 471 4070dd-4070ed 466->471 470->443 471->470 475 4070f3-407144 call 40711b 471->475 490 407146-407168 475->490 491 40716a 475->491 486->442 488->488 490->491 494 407171 490->494 491->466 494->470
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID: =<J=$L$L$W$a$a$b$d$i$o$r$r$y
                        • API String ID: 544645111-4014269246
                        • Opcode ID: f0b4ee9dc74c54352d7fbf9592ab55b13b16b4dc68492a8a082e016f0b446842
                        • Instruction ID: 529cca8bfd9cca14e4241e86a83515072cc44c854048aa7e0b733c893ad00647
                        • Opcode Fuzzy Hash: f0b4ee9dc74c54352d7fbf9592ab55b13b16b4dc68492a8a082e016f0b446842
                        • Instruction Fuzzy Hash: 1871E872E082A49AF7208624DC44BDA7BB5FF95310F0441FAD44DA7281D67E1FC5CBA6

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 549 41e52e-41e601 call 41e5ea 553 41e603-41e60d 549->553 554 41e612-41e640 call 41e642 549->554 555 41e8ce-41e907 call 41e8ea 553->555 554->555 560 41e909-41e945 555->560 561 41e94a-41e9a8 call 41e978 555->561 566 41f486-41f488 ExitProcess 560->566 569 41e9bb-41e9d0 561->569 570 41e9aa-41e9b6 561->570 572 41e9e3-41ea02 569->572 573 41e9d2-41e9de 569->573 571 41ecac-41ecb3 570->571 576 41ed87-41edf1 call 41edf2 571->576 577 41ecb9-41ed03 call 41ed04 571->577 574 41ea15-41ea27 572->574 575 41ea04-41ea10 572->575 573->571 578 41ea29-41ea35 574->578 579 41ea3a-41eaa3 574->579 575->571 577->566 578->571 585 41eca0-41eca6 579->585 586 41eaa9-41eb15 579->586 585->571 588 41ebb6-41ebc2 call 41ebc3 586->588 589 41eb1b-41eb2b 586->589 588->585 589->588 590 41eb31-41eb40 call 41eb41 589->590 590->588
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID: L$L$W$a$a$b$d$i$o$r$r$y
                        • API String ID: 621844428-4069139063
                        • Opcode ID: 71440b70f4edf20ecdb93d61201ba1ece79b9c468442dfa396d4f51d04353414
                        • Instruction ID: f581cbec88d1b9444b7ccb47932665f0f1bad622cbc066f17daeebda143b93a8
                        • Opcode Fuzzy Hash: 71440b70f4edf20ecdb93d61201ba1ece79b9c468442dfa396d4f51d04353414
                        • Instruction Fuzzy Hash: E031F7B1D092D9CEFB218635CC187D97FA59B52304F0840EAD48C57293C67E0BC9CB66
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: =<J=$=@32
                        • API String ID: 0-3383516053
                        • Opcode ID: bd8c4b132eb592a88b41fbbafbf0e654a5a71060e52978c712f69aba5cdf5c29
                        • Instruction ID: d0c78106edfe5be610d37db869c586dc4b67ebd2c97779dfa1e452e203716ee3
                        • Opcode Fuzzy Hash: bd8c4b132eb592a88b41fbbafbf0e654a5a71060e52978c712f69aba5cdf5c29
                        • Instruction Fuzzy Hash: 2771F571D092685BEB218A54CC94BEB7BB4EF81305F1481FAD409A62C1D6386FC2CF57

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 736 41f13c-41f176 739 41f189-41f19e 736->739 740 41f178-41f184 736->740 742 41f1b1-41f1d0 739->742 743 41f1a0-41f1ac 739->743 741 41f47a-41f488 ExitProcess 740->741 745 41f1e3-41f1f5 742->745 746 41f1d2-41f1de 742->746 743->741 747 41f1f7-41f203 745->747 748 41f208-41f271 745->748 746->741 747->741 750 41f277-41f2c1 748->750 751 41f46e-41f474 748->751 752 41f2d2-41f2e3 750->752 751->741 753 41f384-41f3d5 752->753 754 41f2e9-41f2f9 752->754 756 41f3e3-41f43a 753->756 757 41f3d7-41f3e1 753->757 754->753 755 41f2ff-41f350 call 41f310 call 41f32d 754->755 768 41f352-41f374 755->768 769 41f376 755->769 761 41f448 756->761 762 41f43c-41f446 756->762 760 41f452-41f459 757->760 763 41f469 760->763 764 41f45b-41f467 760->764 761->760 762->760 763->751 764->741 768->769 770 41f37d 768->770 769->752 770->753
                        APIs
                        • ExitProcess.KERNEL32(00000000), ref: 0041F488
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-399585960
                        • Opcode ID: 044063f2aeab60ea10430bcb47f149e00def8fd11386184721a7628e1d0925b3
                        • Instruction ID: 84cd4bb7ec62b5781d08c3df74a51c19c9ada23aec2cd92a84abac801a4fc0f9
                        • Opcode Fuzzy Hash: 044063f2aeab60ea10430bcb47f149e00def8fd11386184721a7628e1d0925b3
                        • Instruction Fuzzy Hash: C69149B4E042289FEB24CF14DC90BEAB7B6BB85305F1481EAD84D67350C635AED68F45

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 772 407801-40786f 774 407880-407891 772->774 775 407932-407983 774->775 776 407897-4078a7 774->776 779 407991-4079f4 call 4079bf 775->779 780 407985-40798f 775->780 776->775 778 4078ad-4078fe 776->778 785 407900-407922 778->785 786 407924 778->786 782 407a00-407a91 call 407a56 VirtualProtect 779->782 780->782 797 407a93-407ad1 782->797 798 407ad9-407b22 call 407b20 782->798 785->786 789 40792b 785->789 786->774 789->775 797->798 806 407b24 798->806 806->806
                        APIs
                        • VirtualProtect.KERNELBASE(00000000,?,00000040,00000000,00000000,?,?,00407479,00407479,?,?,00407479,?,00407479,?,00000000), ref: 00407A89
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID: =<J=
                        • API String ID: 544645111-1552549898
                        • Opcode ID: 5efcf1fceb7c5387daeaef62bad546a26c2015eac6028ea2f35559f23657da7d
                        • Instruction ID: 86a58948c38a69e7730e2a614f35a2f25c32765f3b2afedfec0d8f613b0b926f
                        • Opcode Fuzzy Hash: 5efcf1fceb7c5387daeaef62bad546a26c2015eac6028ea2f35559f23657da7d
                        • Instruction Fuzzy Hash: D87192B1E091589BEB24CB14CC90AFE77B1EB85315F1481EAD409A7281D63D6FC2CF56

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 807 406d70-406de6 809 406e28-406e74 807->809 810 406de8-406e26 call 406e01 call 406e16 807->810 812 406e86 809->812 813 406e76-406e80 809->813 816 406e90-406ec9 call 406ebe 810->816 812->816 813->812 815 406c51-406cc2 call 406cbe 813->815 825 406ecb-406f07 816->825 826 406f0c-406f6a 816->826 830 407a34-407a91 call 407a56 VirtualProtect 825->830 828 406f6c-406f78 826->828 829 406f7d-406f92 826->829 831 40726e-407275 828->831 832 406f94-406fa0 829->832 833 406fa5-406fc4 829->833 848 407a93-407ad1 830->848 849 407ad9-407b22 call 407b20 830->849 836 407349-407a2e call 407377 call 4076e3 831->836 837 40727b-407306 call 407291 call 4072d9 831->837 832->831 834 406fc6-406fd2 833->834 835 406fd7-406fe9 833->835 834->831 840 406feb-406ff7 835->840 841 406ffc-407065 835->841 836->830 837->836 880 407308-407344 837->880 840->831 850 407262-407268 841->850 851 40706b-4070b5 841->851 848->849 883 407b24 849->883 850->831 855 4070c6-4070d7 851->855 861 407178-40725b call 407186 call 407197 855->861 862 4070dd-4070ed 855->862 861->831 862->861 867 4070f3-407144 call 40711b 862->867 886 407146-407168 867->886 887 40716a 867->887 880->830 883->883 886->887 890 407171 886->890 887->855 890->861
                        APIs
                        • VirtualProtect.KERNELBASE(00000000,?,00000040,00000000,00000000,?,?,00407479,00407479,?,?,00407479,?,00407479,?,00000000), ref: 00407A89
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID: =<J=
                        • API String ID: 544645111-1552549898
                        • Opcode ID: b5d2192ee1f7aa5db4832eef668c349e35139c276e9f66c6ae00536205ef4696
                        • Instruction ID: 76fa41f932c2448479985259eac421f02ebf6f015f52d69e987c15119e612cdd
                        • Opcode Fuzzy Hash: b5d2192ee1f7aa5db4832eef668c349e35139c276e9f66c6ae00536205ef4696
                        • Instruction Fuzzy Hash: 0951E9B6D052546FFB208A24DC84BEB7775FB80310F1541BBD80EA6681D63C6EC68A66

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 895 4074d0-407546 896 40754c-407a91 call 407600 call 4076e3 call 407a56 VirtualProtect 895->896 897 407547 call 407553 895->897 916 407a93-407ad1 896->916 917 407ad9-407b22 call 407b20 896->917 897->896 916->917 925 407b24 917->925 925->925
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID: =<J=
                        • API String ID: 544645111-1552549898
                        • Opcode ID: d8025b8d9e6413009d756c5fd0575cee9bd0d931732ce6450ccc7a76b4fd2ca0
                        • Instruction ID: 08acc017aac2b6a84459e23c581b274abd0b1e8b774b2d6f77f64eb65f002ffb
                        • Opcode Fuzzy Hash: d8025b8d9e6413009d756c5fd0575cee9bd0d931732ce6450ccc7a76b4fd2ca0
                        • Instruction Fuzzy Hash: 8061E3B2D092659FEB248B24CC54BEA7B74FB85310F1081FAD50DA7281D6396EC2CF56
                        APIs
                        • VirtualProtect.KERNELBASE(00000000,?,00000040,00000000,00000000,?,?,00407479,00407479,?,?,00407479,?,00407479,?,00000000), ref: 00407A89
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID: =<J=
                        • API String ID: 544645111-1552549898
                        • Opcode ID: a8f4be29f8e4bb6e1804d70e2a4199b4c56be6986352142101ad7a9db7434997
                        • Instruction ID: 99da276cbe10c8c172a1099cc2b2995619a78b6a26377a9e1573c4c3d8e4025b
                        • Opcode Fuzzy Hash: a8f4be29f8e4bb6e1804d70e2a4199b4c56be6986352142101ad7a9db7434997
                        • Instruction Fuzzy Hash: D15138B2D082649AEB208B11CC846FF7775EB80311F1541BBE44E661C1E63C5ED2CE63
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID: =<J=
                        • API String ID: 544645111-1552549898
                        • Opcode ID: 2313dcce7889e4b09059aabfde96d64cf1344642ebdc8ea80dd7a994719826b0
                        • Instruction ID: 848ca1905d64442369d98907fabba43311f14efd62ab1ee3e5ec888b9122e4dc
                        • Opcode Fuzzy Hash: 2313dcce7889e4b09059aabfde96d64cf1344642ebdc8ea80dd7a994719826b0
                        • Instruction Fuzzy Hash: 2D51F5B1E092585FFB208654CC94AEB7BB4EB85314F1441FAE40DA6181D6386FC2CF53
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID: =<J=
                        • API String ID: 544645111-1552549898
                        • Opcode ID: e93f9cd55b5b48f49c75729672f3e6094a945fa0d953f8263ef85af264be1b1b
                        • Instruction ID: 2a6212f3aae6c14ecad9d9d9a13a99a79a6de910924b350dd7a34e21516a51ae
                        • Opcode Fuzzy Hash: e93f9cd55b5b48f49c75729672f3e6094a945fa0d953f8263ef85af264be1b1b
                        • Instruction Fuzzy Hash: 525104B2E091659FEB248A24CC54BEA7B74EB85311F1081FBD50DA62C1D63C6EC2CE57
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID: =<J=
                        • API String ID: 544645111-1552549898
                        • Opcode ID: 0a1a96974c529427ad21bf6890ff641f723d5b8c582e41025654c76c0e5ab224
                        • Instruction ID: 26f745d078dd577aebc1eef2656111b593e7088bdd826626645a953597fc8512
                        • Opcode Fuzzy Hash: 0a1a96974c529427ad21bf6890ff641f723d5b8c582e41025654c76c0e5ab224
                        • Instruction Fuzzy Hash: 8F41C3B2D092649FEB248A14CC54BAA7B74EB85314F1441FAD50E6B2C1C63C6FC1CF56
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID: =<J=
                        • API String ID: 544645111-1552549898
                        • Opcode ID: a28104cb5b6e4896146c41cd4cefce28b6bd6a4d57f901a0df290aeca4214420
                        • Instruction ID: bdbed5da399c6a38459e193f63b156c8b718e895b829d49a0ed295ab78c0c810
                        • Opcode Fuzzy Hash: a28104cb5b6e4896146c41cd4cefce28b6bd6a4d57f901a0df290aeca4214420
                        • Instruction Fuzzy Hash: A031F4B3E092646AFB108614CC54BEB3775FB80310F1441BAE90DB6580D23C6FC68EA7
                        APIs
                        • VirtualProtect.KERNELBASE(00000000,?,00000040,00000000,00000000,?,?,00407479,00407479,?,?,00407479,?,00407479,?,00000000), ref: 00407A89
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID: =<J=
                        • API String ID: 544645111-1552549898
                        • Opcode ID: e63a35f5d76d61e3dc8519f1b76418b48d93d3d960529309f15af67a334b1f56
                        • Instruction ID: 15646194b6118c571e19b72504f61c9361b70c54fdfa1c2d117bbd71720dbca0
                        • Opcode Fuzzy Hash: e63a35f5d76d61e3dc8519f1b76418b48d93d3d960529309f15af67a334b1f56
                        • Instruction Fuzzy Hash: 34319EB2E091599EEB24CA14CC90BEE77B1EB84305F1481EAD509B6281D6386FC2CF16
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID: =<J=
                        • API String ID: 544645111-1552549898
                        • Opcode ID: f8ba3c77f1519eba33b657af8550887a5f61b087a4f8e8f220b33ded038568e3
                        • Instruction ID: c62d4aeb7f183ace03c0fbe117621d8bb6af6efbb8f39545cc0684f40efc8afd
                        • Opcode Fuzzy Hash: f8ba3c77f1519eba33b657af8550887a5f61b087a4f8e8f220b33ded038568e3
                        • Instruction Fuzzy Hash: 3021CEB2E09659ABEB208A14CC94BEE7774FB84301F0041FAE509B6280D7386FC1CF52
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID: =<J=
                        • API String ID: 544645111-1552549898
                        • Opcode ID: ab1f3c9ddeec96c21bfc2465eb0ef328c277b5c9fcf07bfef2394151d7480918
                        • Instruction ID: c360b31caec9741dd6596a3e14725d1f80ce29dd7a7bd6831b77f0a83b6c9aac
                        • Opcode Fuzzy Hash: ab1f3c9ddeec96c21bfc2465eb0ef328c277b5c9fcf07bfef2394151d7480918
                        • Instruction Fuzzy Hash: BC21C1B3E09554AAFB108A24CC95BEA7775EB85310F1441B6E90DB6180D23C6FC28E63
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID: =<J=
                        • API String ID: 544645111-1552549898
                        • Opcode ID: 34d81cf9bc4c1ca29a7625b4869528daa6f600a62596aec53683db146db035e7
                        • Instruction ID: d20ef1d02864c3cd1a8dd42756d6800b121db6cb393a2dc1f1cf0d291cb5af5f
                        • Opcode Fuzzy Hash: 34d81cf9bc4c1ca29a7625b4869528daa6f600a62596aec53683db146db035e7
                        • Instruction Fuzzy Hash: 2921B0B2E09255ABEB248A14CC94AEE7775EB84311F1445EAE509A6280D6386FC28F17
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID: =<J=
                        • API String ID: 544645111-1552549898
                        • Opcode ID: 2376ed718335674000104594ffa531492d251406f2c6fc821499bdaa52bb59c6
                        • Instruction ID: 2ed15739be1e08bd3344b42ea448d3b9b6fef528011d0ed2e0c495fb1f24f242
                        • Opcode Fuzzy Hash: 2376ed718335674000104594ffa531492d251406f2c6fc821499bdaa52bb59c6
                        • Instruction Fuzzy Hash: 9D21B0B2E09255ABEB208A14CC94AEE7775EB84311F1445EAE509A6280D6386FC28F17
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID: =<J=
                        • API String ID: 544645111-1552549898
                        • Opcode ID: aba8315a0fcff4e954300462cf7bf140b7a4280a1aefaab93e69e707f5ada483
                        • Instruction ID: 031850a18d50afdb2034fc53f0991b354779c05c29cf1d460981c6ed8707cb5e
                        • Opcode Fuzzy Hash: aba8315a0fcff4e954300462cf7bf140b7a4280a1aefaab93e69e707f5ada483
                        • Instruction Fuzzy Hash: D521B0B2E09255ABEB248A14CC94AEE7775FB84311F1445EAE509A6280D6386FC28F17
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 81f3a46e481a9001cd8d7df1cb19ad9384fbeaeb947b3088cea07aaf666bbda1
                        • Instruction ID: 805f3272566bda3cc6e13b34d76a54ebf1e425d15819730356833e464192a04b
                        • Opcode Fuzzy Hash: 81f3a46e481a9001cd8d7df1cb19ad9384fbeaeb947b3088cea07aaf666bbda1
                        • Instruction Fuzzy Hash: 33611EB5C0426A8AEB309B22CC807FEB775EB51314F1440FAD84D97681E63D4EC6DB16
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 09b5330b24111d9fd33253ff9ee43d398974985ce982b99bc27fe2d294e082fc
                        • Instruction ID: 9b4c68d9a6c1b3feff0fe73b279bb104b45c793c161d23dd99180bb06f8a0c42
                        • Opcode Fuzzy Hash: 09b5330b24111d9fd33253ff9ee43d398974985ce982b99bc27fe2d294e082fc
                        • Instruction Fuzzy Hash: 9931C1B09045688FEB24DB14CC94BFAB7B5AF8230AF1480FBD85996241D6395ECACE45
                        APIs
                        • ExitProcess.KERNEL32(00000000), ref: 0041F488
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-0
                        • Opcode ID: e17893aaa37c1aac255926972b71e710d378f5cef23699836b695d74e4c9959e
                        • Instruction ID: 3d9aa7455e0593d2c84f24cc7eb80196f2b51176546916de75e3f2145be866ea
                        • Opcode Fuzzy Hash: e17893aaa37c1aac255926972b71e710d378f5cef23699836b695d74e4c9959e
                        • Instruction Fuzzy Hash: FF2190F5D05254ABE7608A11DC85BEF7778FB80320F1540B7E80D96640E63D5EC68A56
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-0
                        • Opcode ID: 257ef34b65dbb1f01441ecc1a1da7d5c31d3b05d70e298f4ba3f3f8b8ab5d473
                        • Instruction ID: 453379fced34fbf1c5b714f7bb3aa0ab99e369a9a315473a5ccfc5f1e927d020
                        • Opcode Fuzzy Hash: 257ef34b65dbb1f01441ecc1a1da7d5c31d3b05d70e298f4ba3f3f8b8ab5d473
                        • Instruction Fuzzy Hash: F9115CF58452889FE7218B22CC883FA7B64DB51311F5445FFD8494A5D2C67D09C7CA16
                        APIs
                        • ExitProcess.KERNEL32(00000000), ref: 0041F488
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-0
                        • Opcode ID: 69fca465b115e9de93662fe957af2e89e8367bb99e6633dbeca7c6c6ca949c85
                        • Instruction ID: 6a054c30de5f04548f25e8dbaeb4a0bc8a9138bdee79ff11cd11d97d9ac3fde4
                        • Opcode Fuzzy Hash: 69fca465b115e9de93662fe957af2e89e8367bb99e6633dbeca7c6c6ca949c85
                        • Instruction Fuzzy Hash: EA11D2B6D005559BF3148A25EC85FFB7778EB44301F1441BBEC4E96280D63D5EC68E62
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-0
                        • Opcode ID: 4c35ebf014580d023ce425432ee36ed3aee2e1ac2622ec0cdb7e0b0417b257c3
                        • Instruction ID: f99f57352ff983d67101c280a8475f287b1e04f41c5ba5930e0569030e62504b
                        • Opcode Fuzzy Hash: 4c35ebf014580d023ce425432ee36ed3aee2e1ac2622ec0cdb7e0b0417b257c3
                        • Instruction Fuzzy Hash: 261126F1C042845FE7208B12CC49BEA7B65EB51314F1844FBDC4987592C67D4ACB8A17
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-0
                        • Opcode ID: 52f8ce0a5811021320afa8de58b4cf66ab4b9f6a618db5b01615b2be86767cf2
                        • Instruction ID: 679f1e4a381523a7bb2f4b1938df693f00b4e7880132a823eebab4ed7d2209a0
                        • Opcode Fuzzy Hash: 52f8ce0a5811021320afa8de58b4cf66ab4b9f6a618db5b01615b2be86767cf2
                        • Instruction Fuzzy Hash: 760147F18092889FE7208B12DC853F97765EB91311F1880FFE88A87591D67D09CB8617
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-0
                        • Opcode ID: 965fb0647620d38bc6789dfa69c6729f7df769bffd36aa689c68b1e7cd11d24e
                        • Instruction ID: 028d492e493900e355de9f9771edfcbc94e052701ce48e8b092cf4c95405fc9d
                        • Opcode Fuzzy Hash: 965fb0647620d38bc6789dfa69c6729f7df769bffd36aa689c68b1e7cd11d24e
                        • Instruction Fuzzy Hash: 25017CB0D01228EFEB24CF10CD41BEA77B4EB85310F1481EAE5495A250D6359ECA8E56
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-0
                        • Opcode ID: 375f193220ab479675139d303b5c77f2fdb54827b57555c0cbd7f0dc9a393c1e
                        • Instruction ID: 420a628833cd9a6875d113add3499725125ee7556035095e5f86afdc11cf0918
                        • Opcode Fuzzy Hash: 375f193220ab479675139d303b5c77f2fdb54827b57555c0cbd7f0dc9a393c1e
                        • Instruction Fuzzy Hash: 45F0ECF5C551449FF7104641DC467FE3254E750321F1440BBDC4955551D57E0ED78917
                        APIs
                        • OpenClipboard.USER32(00000000), ref: 00433F17
                        • RegisterClipboardFormatW.USER32(Shell IDList Array), ref: 00433F36
                        • GetClipboardData.USER32 ref: 00433F47
                        • GlobalLock.KERNEL32(00000000), ref: 00433F52
                        • CloseClipboard.USER32 ref: 00433F8B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: Clipboard$CloseDataFormatGlobalLockOpenRegister
                        • String ID: 4AD$Shell IDList Array
                        • API String ID: 1151311956-2489082455
                        • Opcode ID: 48519a98ff51355961bb7effbf8569a47d7a7025d9368877acad64ed744704c4
                        • Instruction ID: 3f644c05e47439fdc23d2c824a1c84af3f17edb4169f705e82ac8151b23e47f1
                        • Opcode Fuzzy Hash: 48519a98ff51355961bb7effbf8569a47d7a7025d9368877acad64ed744704c4
                        • Instruction Fuzzy Hash: D2019231704204ABDB109F25EC49B6A3BA8EF0875AF04543DFC45EB2A0DB79DA40CB5C
                        APIs
                          • Part of subcall function 0042666F: UnhookWindowsHookEx.USER32(?), ref: 00426679
                        • GetModuleHandleW.KERNEL32(00000000), ref: 00426616
                        • SetWindowsHookExW.USER32(0000000D,0041ED8B,00000000,00000000), ref: 00426625
                        • GetLastError.KERNEL32 ref: 00426634
                        • FormatMessageW.KERNEL32(00001100,00000000,00000000,00000000,?,00000000,00000000), ref: 00426648
                        • MessageBoxW.USER32(00000000,?,Error hooking keyboard,00000010), ref: 0042665D
                        • LocalFree.KERNEL32(?), ref: 00426666
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: HookMessageWindows$ErrorFormatFreeHandleLastLocalModuleUnhook
                        • String ID: Error hooking keyboard
                        • API String ID: 3539256350-2780107085
                        • Opcode ID: fba2087d46c83467c84a28cd1e6aaa1c58a2a6ec1ea7a2086610efa25594ff7a
                        • Instruction ID: f5ea2c017abb1ba6b0e2630cac6da38f566bcf030e92f02af746c3b95a68221d
                        • Opcode Fuzzy Hash: fba2087d46c83467c84a28cd1e6aaa1c58a2a6ec1ea7a2086610efa25594ff7a
                        • Instruction Fuzzy Hash: AEF09672501130FBDB201BA1AC4DEEF3E6DEF09751F101026F506A0091DBB45940EBF8
                        APIs
                        • GetLocaleInfoW.KERNEL32(00000400,7123456,00000000,000001F3), ref: 00432790
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: InfoLocale
                        • String ID: 2$3$4$5$6$7123456
                        • API String ID: 2299586839-3626163788
                        • Opcode ID: 4da3740a6d9d69a3e11bd58766d14d6da9d5a0c6efc4164ef08d50fbd1901268
                        • Instruction ID: df135c90cf4fd96ecc2958faa78990d9e9a54762d9a1c2938bb780a1a1e2f662
                        • Opcode Fuzzy Hash: 4da3740a6d9d69a3e11bd58766d14d6da9d5a0c6efc4164ef08d50fbd1901268
                        • Instruction Fuzzy Hash: 03014BB1800209EBEF11CF88C9497EEBBB8BB04348F504069A700BB2C0D7B95B4ACF54
                        APIs
                        • GetLocaleInfoW.KERNEL32(00000400,0*+,-./,00000000,000001F3), ref: 0043281C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: InfoLocale
                        • String ID: +$,$-$.$/$0*+,-./
                        • API String ID: 2299586839-396296672
                        • Opcode ID: 5ca085d7eb37483b56b1ad4c0e2bd3df6a5eb46fe1b38734cf8d6047dd07eeff
                        • Instruction ID: 182194e9b7aa74f1834d65153d6b30cc8a34f0bf16cbddff9d07cac1a8773447
                        • Opcode Fuzzy Hash: 5ca085d7eb37483b56b1ad4c0e2bd3df6a5eb46fe1b38734cf8d6047dd07eeff
                        • Instruction Fuzzy Hash: 06014BB5900209ABEF10DF98D9497EEBBB4BB04308F104069E700B72C0D7B95A4ACF58
                        APIs
                        • IsWindow.USER32(?), ref: 004324EA
                        • GetKeyboardState.USER32(?), ref: 0043251A
                        • keybd_event.USER32(00000012,00000000,00000001,00000000), ref: 00432535
                        • SetForegroundWindow.USER32(?), ref: 0043253A
                        • GetKeyboardState.USER32(?), ref: 00432547
                        • keybd_event.USER32(00000012,00000000,00000003,00000000), ref: 0043255D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: KeyboardStateWindowkeybd_event$Foreground
                        • String ID:
                        • API String ID: 3738427976-0
                        • Opcode ID: 2c72c861c302e1139b07c97f33455dde5ae2a2ab37e195d2adcee556ea12027a
                        • Instruction ID: 94379a26eef160f79566083ef4e3578c49d00e1bcfa1839136e3bbe5105c761c
                        • Opcode Fuzzy Hash: 2c72c861c302e1139b07c97f33455dde5ae2a2ab37e195d2adcee556ea12027a
                        • Instruction Fuzzy Hash: 1E01B131A002AD7EEF219B74DD44BAB3B6CAB48754F0010B6EA44F21D1D7B09F418E68
                        APIs
                        • LoadLibraryW.KERNEL32(USER32.DLL), ref: 00434390
                        • GetProcAddress.KERNEL32(?,VkKeyScanW), ref: 004343AD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: USER32.DLL$VkKeyScanW$yScanW
                        • API String ID: 2574300362-2509131655
                        • Opcode ID: f33a238c0a0008be8fa80d9092039b86b37356b8e18231454f539763cbe0bda6
                        • Instruction ID: 00ef8408c9c2cd366938f6668c4c85d73a7131af4500c8c6c3acde0d2035717b
                        • Opcode Fuzzy Hash: f33a238c0a0008be8fa80d9092039b86b37356b8e18231454f539763cbe0bda6
                        • Instruction Fuzzy Hash: F3018030908388EEEB5197B4D80938E7FF19B15308F0480ECD44467292D3FA5658DF69
                        APIs
                        • __EH_prolog.LIBCMT ref: 0042183D
                        • GetLocalTime.KERNEL32(00000002,?,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 0042184E
                          • Part of subcall function 00424156: __EH_prolog.LIBCMT ref: 0042415B
                          • Part of subcall function 00424156: GetLocalTime.KERNEL32(?), ref: 0042416C
                          • Part of subcall function 00424156: CopyFileW.KERNEL32(?,00000000,?,00000000,?,?,0048039C,00000000,00445508), ref: 00424207
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: H_prologLocalTime$CopyFile
                        • String ID: last_backup
                        • API String ID: 2992466287-3052884854
                        • Opcode ID: 4e366ab625fe2227e8f56ac358aab6d24cbada234cdc05f17cb09aebade897a5
                        • Instruction ID: a8900d9fa8d7d7e32f2f801e5830e3db12106511594fc8e929056427879ad994
                        • Opcode Fuzzy Hash: 4e366ab625fe2227e8f56ac358aab6d24cbada234cdc05f17cb09aebade897a5
                        • Instruction Fuzzy Hash: 8A01C671E005289ACB24B774AD969BD7364EF94744B50043FE811F22D2E67C8908D69C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: 7B6;
                        • API String ID: 0-129056507
                        • Opcode ID: 531e130ea9de573251cd9ef4a4f9255729852d6085132259d1acd95837e7a242
                        • Instruction ID: a2e1ffb217dc37fb71030f9042c69854828b7e275fdaa14b5f4c44a4850284d7
                        • Opcode Fuzzy Hash: 531e130ea9de573251cd9ef4a4f9255729852d6085132259d1acd95837e7a242
                        • Instruction Fuzzy Hash: AC51EDB1D051298AEB248F25CD107FEBB76EF85300F0481FAD94D96682EA384EC69B15
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 31a0024bab8b4bed6dbc98f51679fa80ffb451d64fd1dd4b800c11bfa53d05ab
                        • Instruction ID: 23bda53a7b0612d3686cd6d251f64e5347905877a5adf01070cdb16cbc1802e2
                        • Opcode Fuzzy Hash: 31a0024bab8b4bed6dbc98f51679fa80ffb451d64fd1dd4b800c11bfa53d05ab
                        • Instruction Fuzzy Hash: 17C1AFB1D042688BEB28CB15CC94BEABBB5FF85304F1445FAD90966780D6795EC1CF82
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2def513f4ae14cae0b52af654849ade124da1b2e7b229a32dcac725956e8dcfe
                        • Instruction ID: a68a93b1dfe12f691498afbb7b2c120d69af411b611a08db01963925a9bf58d2
                        • Opcode Fuzzy Hash: 2def513f4ae14cae0b52af654849ade124da1b2e7b229a32dcac725956e8dcfe
                        • Instruction Fuzzy Hash: 867104B2D002145FF768CA24DD9AAEEBB78EB90314F1581BFD80E66680D67C5FC68D41
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 98068914411b382e58d16850fb313262153f80aa3508047db4f35f45676c3df2
                        • Instruction ID: 27887d31943956b31d3b47e0da6c9ad9fb80d555f4d8071838d31bc948632639
                        • Opcode Fuzzy Hash: 98068914411b382e58d16850fb313262153f80aa3508047db4f35f45676c3df2
                        • Instruction Fuzzy Hash: E66155B2D041185AF7248A65CC55BFF7B75EB81300F1440BFE90E666C0D67D5AC18B52
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 026aa8db736053c1523893a85feb418ac5c12ec1a87ce9bb8aa84310bd574804
                        • Instruction ID: f9795f540f2920e871af5529d029d1775dc9ad22479b0ed988c7490149d3ac04
                        • Opcode Fuzzy Hash: 026aa8db736053c1523893a85feb418ac5c12ec1a87ce9bb8aa84310bd574804
                        • Instruction Fuzzy Hash: B871E6B2D012655FE728CB24DD89AEEBB79EB84304F1481FBD80C66694D6781FC5CE41
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 24d5e67c7b97d2deedaa3df6a781ee32d5a52f2c08da68a1f03d436c7a9ae9ee
                        • Instruction ID: 48b4fbfda18d80c775ce31c10e293a097a3a419f543e5167ef722263b6452a60
                        • Opcode Fuzzy Hash: 24d5e67c7b97d2deedaa3df6a781ee32d5a52f2c08da68a1f03d436c7a9ae9ee
                        • Instruction Fuzzy Hash: 3F71E5B2D012655FF728CA24DD89AEEBB79EB84304F1481FBD80C66684D6781FC5CE41
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 197286419b8e5bb2b98c2be039d4f977a6adb3cd9235ab47d70405b3845b9aa4
                        • Instruction ID: 67d647ed663b86686d8c74d0c2fe09d77287fc08c880a43af023074c8844f321
                        • Opcode Fuzzy Hash: 197286419b8e5bb2b98c2be039d4f977a6adb3cd9235ab47d70405b3845b9aa4
                        • Instruction Fuzzy Hash: 6461B5B2D042258BE728CF24CD959DABBB9EB94304F1481FFD80D67694D6385F86CE41
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 14afaf89f7cc845cf7d9756e5d78b963c7e050ce82adee17f136a369f24f781c
                        • Instruction ID: 34b70eea6939b287f0a7c53db1cd64776a3b17daf5024cf46681b8987b9427b7
                        • Opcode Fuzzy Hash: 14afaf89f7cc845cf7d9756e5d78b963c7e050ce82adee17f136a369f24f781c
                        • Instruction Fuzzy Hash: A951C7B2C002299FE768DB24CD99AD9BB79EB90304F1181FF940E6A5D4DA385FC5CE41
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9f7d85854d80ce778e19d60bf47bc0156e5c751d4398c197ea851de8eb3fe9de
                        • Instruction ID: cd27f7706715f110c4abdf94d1d9e9c87089e2315294f9ead68aa5fbc7ad3193
                        • Opcode Fuzzy Hash: 9f7d85854d80ce778e19d60bf47bc0156e5c751d4398c197ea851de8eb3fe9de
                        • Instruction Fuzzy Hash: 165156B2D102115AF3248B69DC95AFFBB35EFC1300F1440BFE909A66C1E67D5AC68B52
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e9fe7862a14ea6da1c896ad4932d9b636bd3af04608814d76069af5044128d92
                        • Instruction ID: 7a3c1f161eea97eec26771882a62063098ff4d64f2f5a9e7babd00570295a9fd
                        • Opcode Fuzzy Hash: e9fe7862a14ea6da1c896ad4932d9b636bd3af04608814d76069af5044128d92
                        • Instruction Fuzzy Hash: 3E3108A2D101145AF3248B55DC59BFF7A39EF80310F14807EE90A666C0E67D5AC58B92
                        APIs
                        • lstrcatW.KERNEL32(?,00000000,?,0000014E,00000000,00000000,?,?,00000000,TAB,?,?,00000000,00454FB8), ref: 0042112E
                        • lstrcatW.KERNEL32(?,00454FA0,?,0000014E,00000000,00000000,?,?,00000000,TAB,?,?,00000000,00454FB8), ref: 0042114B
                        • wsprintfW.USER32 ref: 0042118C
                        • SetWindowTextW.USER32(?,?), ref: 0042121B
                        • GetSystemMetrics.USER32(00000032), ref: 004212A2
                        • GetSystemMetrics.USER32(00000031), ref: 004212AB
                        • ImageList_Create.COMCTL32(00000000,?,00000001), ref: 004212B2
                          • Part of subcall function 004354E9: GetModuleHandleW.KERNEL32(shell32,004212C7,0000000E,?,00000001), ref: 004354F7
                          • Part of subcall function 004354E9: LoadIconW.USER32(?,00000001), ref: 0043550D
                        • ImageList_ReplaceIcon.COMCTL32(?,000000FF,00000000,0000000E,?,00000001), ref: 004212CD
                        • ImageList_ReplaceIcon.COMCTL32(?,000000FF,00000000,00000098,?,00000001), ref: 004212E8
                        • LoadImageW.USER32(000000D1,00000001,00000010,00000010), ref: 00421300
                        • ImageList_ReplaceIcon.COMCTL32(?,000000FF,00000000,?,?,00000001), ref: 0042130C
                          • Part of subcall function 004215AA: __EH_prolog.LIBCMT ref: 004215AF
                          • Part of subcall function 004215AA: GetDlgItem.USER32(?,?), ref: 004215EB
                          • Part of subcall function 004215AA: CreateWindowExW.USER32(00000000,tooltips_class32,00000000,80000001,80000000,80000000,80000000,80000000,?,00000000,00000000), ref: 00421614
                          • Part of subcall function 004215AA: SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 0042165D
                          • Part of subcall function 004215AA: SendMessageA.USER32(?,00000418,00000000,00000190), ref: 00421670
                        • wsprintfW.USER32 ref: 00421397
                        • wsprintfW.USER32 ref: 004213DC
                        • GetDlgItem.USER32(00000003,0000040E), ref: 004214EB
                        • SetWindowTextW.USER32(00000000), ref: 004214EE
                        • GetDlgItem.USER32(00000003,00000410), ref: 00421505
                        • SetWindowTextW.USER32(00000000), ref: 00421508
                        • GetDlgItem.USER32(00000003,00000419), ref: 0042151F
                        • SetWindowTextW.USER32(00000000), ref: 00421522
                        • wsprintfW.USER32 ref: 00421543
                        • GetDlgItem.USER32(00000003,0000040F), ref: 0042155B
                        • SetWindowTextW.USER32(00000000), ref: 0042155E
                        • RedrawWindow.USER32(00000003,?,?,?,?,?,?,?,?,0000807D,00000000,0000002E,00000431,00000000,0000008F,0000807B), ref: 00421570
                        • RedrawWindow.USER32(?,?,00000105,?,?,?,?,?,?,?,?,0000807D,00000000,0000002E,00000431,00000000), ref: 00421580
                        • RedrawWindow.USER32(?,?,00000105,?,?,00000105,?,?,?,?,?,?,?,?,0000807D,00000000), ref: 0042158B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: Window$ImageItemText$IconList_wsprintf$RedrawReplace$CreateLoadMessageMetricsSendSystemlstrcat$H_prologHandleModule
                        • String ID: - Admin$ Portable$# LNG$%d %s$%s - OS:%d.%d %d$Del$Down$Left$Right$Space$TAB$com
                        • API String ID: 3856370618-2312742896
                        • Opcode ID: 71d12696850239c9f4cd78f3de9dd9938dd74680712ffcc0ab19ed0ec9b747e8
                        • Instruction ID: 834a4a3f23aa5bb824b6522172261bea01426560a814b550b8ce3e832c96033d
                        • Opcode Fuzzy Hash: 71d12696850239c9f4cd78f3de9dd9938dd74680712ffcc0ab19ed0ec9b747e8
                        • Instruction Fuzzy Hash: 02E193B1A40209BFDF00ABA0ED4AEFE7B7DEB54714F10402BF601760D1DAB95D548B69
                        APIs
                        • GetClientRect.USER32(?,?), ref: 00420603
                        • GetWindowRect.USER32(?,00480388), ref: 0042061B
                        • GetSystemMetrics.USER32(00000032), ref: 00420636
                        • SendMessageW.USER32(?,00000005,00000000,00000000), ref: 0042065A
                        • GetSystemMetrics.USER32(00000031), ref: 00420662
                        • SendMessageW.USER32(?,00000404,00000004,?), ref: 004206D7
                        • SetWindowPos.USER32(?,00000000,00000004,00000004,00000000,?,00000000), ref: 004206FB
                        • GetWindowRect.USER32(?,?), ref: 0042070B
                        • GetDlgItem.USER32(?,00000BD7), ref: 0042071D
                        • GetDlgItem.USER32(?,00000FBE), ref: 0042072E
                        • GetWindowRect.USER32(?,?), ref: 0042075D
                        • ScreenToClient.USER32(?,?), ref: 0042077A
                        • ScreenToClient.USER32(?,?), ref: 00420785
                        • CopyRect.USER32(?,?), ref: 00420792
                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000000), ref: 004207BC
                        • ShowWindow.USER32(?,00000000), ref: 004207C6
                        • SetWindowPos.USER32(?,00000000,?,?,?,00000005,00000040), ref: 004207E8
                        • CopyRect.USER32(?,?), ref: 004207F6
                        • SetWindowPos.USER32(00000000,0000000E,?,0000000E,?,00000000), ref: 0042086D
                        • SetWindowPos.USER32(?,00000000,0000000E,?,0000000E,?,00000200), ref: 004208A8
                        • GetSystemMetrics.USER32(00000032), ref: 004208C3
                        • GetDlgItem.USER32(?,00000414), ref: 004208EE
                        • SetWindowPos.USER32(00000000,00000000,0000000E,?,0000000E,?,00000000), ref: 00420912
                        • GetDlgItem.USER32(?,000003EC), ref: 0042091C
                        • SetWindowPos.USER32(?,00000000,0000000E,?,0000000E,?,00000000), ref: 00420956
                        • GetSystemMetrics.USER32(00000032), ref: 0042095A
                        • GetSystemMetrics.USER32(00000032), ref: 00420979
                        • GetDlgItem.USER32(?,00000419), ref: 004209B4
                        • ShowWindow.USER32(00000000,00000000), ref: 004209BC
                        • SetWindowPos.USER32(?,00000000,0000000E,?,0000000E,?,00000040), ref: 004209DD
                        • GetDlgItem.USER32(?,00000410), ref: 004209E7
                        • ShowWindow.USER32(00000000,00000000), ref: 00420A1A
                        • SetWindowPos.USER32(00000000,00000000,0000000E,?,0000000E,?,00000040), ref: 00420A39
                        • GetDlgItem.USER32(?,0000041A), ref: 00420A5B
                        • SetWindowPos.USER32(00000000,00000000,-000000EA,?,00000000,?,00000000), ref: 00420A88
                        • GetDlgItem.USER32(?,00000412), ref: 00420AA6
                        • SetWindowPos.USER32(?,00000000,00000000,?,0000000E,?,00000000), ref: 00420AEA
                        • GetDlgItem.USER32(?,0000041E), ref: 00420AF4
                        • SetWindowPos.USER32(?,00000000,0000000E,?,0000000E,?,00000000), ref: 00420B30
                        • GetDlgItem.USER32(?,00000411), ref: 00420B3A
                        • SetWindowPos.USER32(?,00000000,00000000,?,0000000E,?,00000000), ref: 00420B70
                        • GetSystemMetrics.USER32(00000032), ref: 00420B76
                        • SetWindowPos.USER32(00000000,00000000,?,?,00000000), ref: 00420BA5
                          • Part of subcall function 004362C5: GetWindowLongW.USER32(00000000,000000FC), ref: 004362F0
                          • Part of subcall function 004362C5: SetWindowLongW.USER32(?,000000FC,0043622C), ref: 00436305
                          • Part of subcall function 004362C5: GetClientRect.USER32(?,00000000), ref: 0043631D
                          • Part of subcall function 004362C5: SendMessageW.USER32(?,00000418,00000000,00000000), ref: 0043634A
                          • Part of subcall function 004362C5: SendMessageW.USER32(?,0000041D,-00000001,?), ref: 0043635A
                          • Part of subcall function 004362C5: SetWindowPos.USER32(?,00000000,00420BC1,?,00420BC1,?,00000040,?,?,?,00420BC1,00000000,00000000), ref: 00436379
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: Window$Item$Rect$MetricsSystem$ClientMessageSend$Show$CopyLongScreen
                        • String ID:
                        • API String ID: 1244584264-0
                        • Opcode ID: 6f05e2dde071d3fcd63e3bbacb5e932178fae21c99f71a767f67f7f002c632da
                        • Instruction ID: 923e96935bc56571748812aacab09e6193dce8e74519d4da1ece88cee5b03f58
                        • Opcode Fuzzy Hash: 6f05e2dde071d3fcd63e3bbacb5e932178fae21c99f71a767f67f7f002c632da
                        • Instruction Fuzzy Hash: B912F472D01208EFDF01DFA5EE89AEEBBB9FF48300F259025F904BA165D7715A108B64
                        APIs
                        • __EH_prolog.LIBCMT ref: 004218EB
                        • wsprintfW.USER32 ref: 0042192C
                          • Part of subcall function 00425052: wsprintfW.USER32 ref: 00425084
                        • lstrcatW.KERNEL32(?,L-Win), ref: 004219C6
                        • lstrcatW.KERNEL32(?,004550D4), ref: 00421A01
                        • lstrcatW.KERNEL32(?,?), ref: 00421A0E
                        • lstrcatW.KERNEL32(?,004454A8), ref: 00421A1C
                        • lstrcatW.KERNEL32(?,?), ref: 00421A26
                        • lstrcatW.KERNEL32(?,<E<N<D|), ref: 00421A3F
                        • lstrcmpW.KERNEL32(?,?), ref: 00421A70
                        • lstrcmpW.KERNEL32(?,?), ref: 00421AD4
                        • wsprintfW.USER32 ref: 00421B0D
                          • Part of subcall function 00407418: VirtualProtect.KERNELBASE(00000000,?,00000040,00000000,00000000,?,?,00407479,00407479,?,?,00407479,?,00407479,?,00000000), ref: 00407A89
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$wsprintf$lstrcmp$H_prologProtectVirtual
                        • String ID: 4AD$<E<N<D|$Alt$Alt-Gr$Ctrl$Ctrl-Alt$L-Mouse$L-Win$M-Mouse$R-Ctrl$R-Mouse$R-Win$list_label$list_order$list_text$text_%03d$|PE
                        • API String ID: 766033901-727685743
                        • Opcode ID: ab1ac7291321ffb8395d8699d02c5a76e2d7558d9e51e62a37283f900eb86194
                        • Instruction ID: 305e11b582ee5674688aba6902b22d4fce04e225f30b5c17fe9feb6b59f3fa5b
                        • Opcode Fuzzy Hash: ab1ac7291321ffb8395d8699d02c5a76e2d7558d9e51e62a37283f900eb86194
                        • Instruction Fuzzy Hash: BAA1E971900658BACB10EB90DD95FEE776CAF24304F5480ABF905A3191DB7C9B48CB69
                        APIs
                        • SetWindowTextW.USER32(?,?), ref: 0042121B
                        • GetSystemMetrics.USER32(00000032), ref: 004212A2
                        • GetSystemMetrics.USER32(00000031), ref: 004212AB
                        • ImageList_Create.COMCTL32(00000000,?,00000001), ref: 004212B2
                          • Part of subcall function 004354E9: GetModuleHandleW.KERNEL32(shell32,004212C7,0000000E,?,00000001), ref: 004354F7
                          • Part of subcall function 004354E9: LoadIconW.USER32(?,00000001), ref: 0043550D
                        • ImageList_ReplaceIcon.COMCTL32(?,000000FF,00000000,0000000E,?,00000001), ref: 004212CD
                        • ImageList_ReplaceIcon.COMCTL32(?,000000FF,00000000,00000098,?,00000001), ref: 004212E8
                        • LoadImageW.USER32(000000D1,00000001,00000010,00000010), ref: 00421300
                        • ImageList_ReplaceIcon.COMCTL32(?,000000FF,00000000,?,?,00000001), ref: 0042130C
                          • Part of subcall function 004215AA: __EH_prolog.LIBCMT ref: 004215AF
                          • Part of subcall function 004215AA: GetDlgItem.USER32(?,?), ref: 004215EB
                          • Part of subcall function 004215AA: CreateWindowExW.USER32(00000000,tooltips_class32,00000000,80000001,80000000,80000000,80000000,80000000,?,00000000,00000000), ref: 00421614
                          • Part of subcall function 004215AA: SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 0042165D
                          • Part of subcall function 004215AA: SendMessageA.USER32(?,00000418,00000000,00000190), ref: 00421670
                        • wsprintfW.USER32 ref: 00421397
                        • wsprintfW.USER32 ref: 004213DC
                        • GetDlgItem.USER32(00000003,0000040E), ref: 004214EB
                        • SetWindowTextW.USER32(00000000), ref: 004214EE
                        • GetDlgItem.USER32(00000003,00000410), ref: 00421505
                        • SetWindowTextW.USER32(00000000), ref: 00421508
                        • GetDlgItem.USER32(00000003,00000419), ref: 0042151F
                        • SetWindowTextW.USER32(00000000), ref: 00421522
                        • wsprintfW.USER32 ref: 00421543
                        • GetDlgItem.USER32(00000003,0000040F), ref: 0042155B
                        • SetWindowTextW.USER32(00000000), ref: 0042155E
                        • RedrawWindow.USER32(00000003,?,?,?,?,?,?,?,?,0000807D,00000000,0000002E,00000431,00000000,0000008F,0000807B), ref: 00421570
                        • RedrawWindow.USER32(?,?,00000105,?,?,?,?,?,?,?,?,0000807D,00000000,0000002E,00000431,00000000), ref: 00421580
                        • RedrawWindow.USER32(?,?,00000105,?,?,00000105,?,?,?,?,?,?,?,?,0000807D,00000000), ref: 0042158B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: Window$ImageItemText$IconList_$RedrawReplacewsprintf$CreateLoadMessageMetricsSendSystem$H_prologHandleModule
                        • String ID: # LNG$%d %s
                        • API String ID: 2992916764-2253586768
                        • Opcode ID: da5983419a4559f1027f641c8114bd3c8033d44ed9d59f051ba94f4b05c2b61e
                        • Instruction ID: f622741300ae0914b383a02ba4c5aafbd4e7ebbb19e4042cb346f14007db6421
                        • Opcode Fuzzy Hash: da5983419a4559f1027f641c8114bd3c8033d44ed9d59f051ba94f4b05c2b61e
                        • Instruction Fuzzy Hash: 4191B5B1A40208BFEF00ABA1DC5BEAE7B7DFB14714F10402AF215760D1CEB95D508BA8
                        APIs
                        • __EH_prolog.LIBCMT ref: 00427507
                        • InterlockedIncrement.KERNEL32(-000000F4), ref: 00427532
                        • wsprintfW.USER32 ref: 004275DA
                        • lstrlenW.KERNEL32(00000000,000000FF,?,?,?,00000010), ref: 00427676
                        • lstrlenW.KERNEL32(?,?,?,?,?,00000010), ref: 004276A1
                        • lstrlenW.KERNEL32(00000000,?,?,?,?,?,?,?,00000010), ref: 004276CB
                          • Part of subcall function 00421ECF: __EH_prolog.LIBCMT ref: 00421ED4
                          • Part of subcall function 00421ECF: lstrlenW.KERNEL32(00000000,00001000,?,76F8E0B0,?,00000000,?,?,0042787E,00000000,?,?,00000000,?,?,00000000), ref: 00421F07
                        • lstrlenW.KERNEL32(?,?,00000000,00000000,?,?,?,00000010), ref: 004276F7
                        • MessageBoxW.USER32(0000000A,?,?,00000003), ref: 004277D0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrlen$H_prolog$IncrementInterlockedMessagewsprintf
                        • String ID: %s: %d$0hE$0hE$4AD$list$list_label$list_order$list_text$text_%03d
                        • API String ID: 101203759-2156759317
                        • Opcode ID: 07366b17da1440b678b856b95635ee26cb46325f8c93f296d7edc59e315c434e
                        • Instruction ID: dff87e9b3940e85c95b9824c9d0008bd55deb00be2d41abe113388fb65a849ab
                        • Opcode Fuzzy Hash: 07366b17da1440b678b856b95635ee26cb46325f8c93f296d7edc59e315c434e
                        • Instruction Fuzzy Hash: 24C16171D0424DAADF04EBE5C999EEEBBBCAF19308F10016EE115B31C1DB785A44CB69
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: wsprintf
                        • String ID: Del$Down$ESC3$F%d$Left$NUM_%d$NUM_*$NUM_+$NUM_,$NUM_-$NUM_.$NUM_/$Right$Space$TAB
                        • API String ID: 2111968516-1788754765
                        • Opcode ID: f66a46fd12f69995153c1cae6e64894327a738403d8d8ec6a87eacb9d8e3ef1b
                        • Instruction ID: fb27a073f83e29f15c1bda8b5e65fb32c354b5abc1bede79b60cea97612c775e
                        • Opcode Fuzzy Hash: f66a46fd12f69995153c1cae6e64894327a738403d8d8ec6a87eacb9d8e3ef1b
                        • Instruction Fuzzy Hash: E8218311B48F34B64E300524BE92B3E62525626F66BF08513F902D86EAD1FD8CD691CF
                        APIs
                        • GetIconInfo.USER32(?,?), ref: 0043521B
                        • GetDC.USER32(00000000), ref: 0043522A
                        • CreateCompatibleDC.GDI32(00000000), ref: 0043523C
                        • CreateCompatibleDC.GDI32(00000000), ref: 00435242
                        • GetObjectW.GDI32(?,00000018,?), ref: 00435269
                        • CreateBitmap.GDI32(?,?,?,?,00000000), ref: 0043529A
                        • SelectObject.GDI32(?,?), ref: 004352B7
                        • SelectObject.GDI32(?,?), ref: 004352C2
                        • GetPixel.GDI32(00000000,00000000,?), ref: 004352E6
                        • SetPixel.GDI32(?,00000000,?,?), ref: 0043534A
                        • SelectObject.GDI32(?,?), ref: 00435370
                        • SelectObject.GDI32(?,?), ref: 00435378
                        • CreateIconIndirect.USER32(00000001), ref: 0043538B
                        • DeleteObject.GDI32(?), ref: 00435396
                        • DeleteObject.GDI32(?), ref: 0043539B
                        • DeleteObject.GDI32(?), ref: 004353A0
                        • DeleteDC.GDI32(?), ref: 004353AB
                        • DeleteDC.GDI32(?), ref: 004353B0
                        • ReleaseDC.USER32(00000000,?), ref: 004353B7
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: Object$Delete$CreateSelect$CompatibleIconPixel$BitmapIndirectInfoRelease
                        • String ID:
                        • API String ID: 4176011905-0
                        • Opcode ID: eaea4ba6c47036ab21d483449654682ba20451ed1df99df75e39fb9125468f94
                        • Instruction ID: 049c9c6863bca4da748134b191693f4b8ac029bc71d22b5e3f0e0cc1fe1b6ce3
                        • Opcode Fuzzy Hash: eaea4ba6c47036ab21d483449654682ba20451ed1df99df75e39fb9125468f94
                        • Instruction Fuzzy Hash: 70510271D00218EFDF109FA1DC849AEBFB5FF48351F10902AE911B2260DB759A50EFA4
                        APIs
                        • CreateWindowExW.USER32(p#>u,ToolbarWindow32,00000000,00000000,00000000,00000000,000000B4,00000014,00000000,00000000,00000000,00000000), ref: 00436113
                        • GetStockObject.GDI32(00000011), ref: 00436127
                        • GetObjectW.GDI32(00000000,0000005C,?), ref: 00436145
                        • SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 0043616E
                        • CreateFontIndirectW.GDI32(?), ref: 0043618A
                        • SendMessageW.USER32(?,00000030,?,00000000), ref: 004361A2
                        • SendMessageW.USER32(?,0000041E,00000014,00000000), ref: 004361AF
                        • SendMessageW.USER32(?,00000420,00000000,00100000), ref: 004361BF
                        • GetDlgItem.USER32(?,?), ref: 004361CC
                        • ShowWindow.USER32(00000000,00000000), ref: 004361E1
                        • GetWindowRect.USER32(00000000,?), ref: 004361EC
                        • ScreenToClient.USER32(?,?), ref: 004361FF
                        • ScreenToClient.USER32(?,?), ref: 00436208
                        • SetWindowPos.USER32(?,00000000,?,?,?,00000018,00000000), ref: 0043621E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: Window$MessageSend$ClientCreateObjectScreen$FontIndirectInfoItemParametersRectShowStockSystem
                        • String ID: ToolbarWindow32$p#>u
                        • API String ID: 171734827-4017920843
                        • Opcode ID: 872a04bb76daadf6eeb8962ea1ced062aef14eece72818880b888df5f63a513b
                        • Instruction ID: 92c2e2c1fc3dde78d9c0d2bc275dc0a06e604331f58c1d2c7f24981343337753
                        • Opcode Fuzzy Hash: 872a04bb76daadf6eeb8962ea1ced062aef14eece72818880b888df5f63a513b
                        • Instruction Fuzzy Hash: D541097690021DBFEF119FA4DC84EEE7B7DEB08344F008426FA14A61A0D771AE149F64
                        APIs
                        • CreateWindowExW.USER32(00000000,ToolbarWindow32,00000000,5600994C,00000000,00000000,000000B4,?,?,00000000,00000000), ref: 00435601
                        • GetStockObject.GDI32(00000011), ref: 00435615
                        • GetObjectW.GDI32(00000000,0000005C,?), ref: 00435633
                        • SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 0043565C
                        • CreateFontIndirectW.GDI32(?), ref: 0043567A
                        • SendMessageW.USER32(?,00000030,?,00000000), ref: 00435692
                        • SendMessageW.USER32(?,0000041E,00000014,00000000), ref: 0043569F
                        • SendMessageW.USER32(?,00000420,00000000,00100001), ref: 004356AF
                        • GetClientRect.USER32(?,?), ref: 004356C3
                        • SetWindowPos.USER32(?,00000000,00000000,?,?,00000000,00000040), ref: 004356E9
                        • GetWindowLongW.USER32(?,000000FC), ref: 00435700
                        • SetWindowLongW.USER32(?,000000FC,00435849), ref: 00435717
                        • GetWindowLongW.USER32(?,000000FC), ref: 0043571E
                        • SetWindowLongW.USER32(?,000000FC,0043580B), ref: 0043572F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: Window$Long$MessageSend$CreateObject$ClientFontIndirectInfoParametersRectStockSystem
                        • String ID: ToolbarWindow32
                        • API String ID: 2936060913-4104838417
                        • Opcode ID: 3f51542d2a0b2004c8526f9ef05dbcaebad891402990623c3b930f2bb6b1b828
                        • Instruction ID: f76f25e1fa694d056b7f7f73ac2d24a184e6b0527aa05ac2f277c84c8476ae4a
                        • Opcode Fuzzy Hash: 3f51542d2a0b2004c8526f9ef05dbcaebad891402990623c3b930f2bb6b1b828
                        • Instruction Fuzzy Hash: 5D418172900224BFDB509FA5EC89EEB7F78EF48760F115125FA08E61A1D7709904CF94
                        APIs
                        • CreateWindowExW.USER32(?,ToolbarWindow32,00000000,?,00000000,00000000,000000B4,00000014,?,00000000,00000000), ref: 0043218B
                        • GetStockObject.GDI32(00000011), ref: 0043219E
                        • GetObjectW.GDI32(00000000,0000005C,?), ref: 004321BC
                        • CreateFontIndirectW.GDI32(?), ref: 004321D1
                        • SendMessageW.USER32(00000000,00000030,?,00000000), ref: 004321E7
                        • SendMessageW.USER32(00000000,0000041E,00000014,00000000), ref: 004321F2
                        • SendMessageW.USER32(00000000,00000420,00000000,00100000), ref: 00432200
                        • GetDlgItem.USER32(?,?), ref: 0043220D
                        • ShowWindow.USER32(?,00000000), ref: 00432225
                        • GetWindowRect.USER32(?,?), ref: 00432232
                        • ScreenToClient.USER32(?,?), ref: 00432245
                        • ScreenToClient.USER32(?,?), ref: 0043224E
                        • SetWindowPos.USER32(00000000,00000000,?,?,?,00000018,00000000), ref: 00432262
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: Window$MessageSend$ClientCreateObjectScreen$FontIndirectItemRectShowStock
                        • String ID: ToolbarWindow32
                        • API String ID: 1801995013-4104838417
                        • Opcode ID: 75dccdb2353e919780bed2b11c83ca037eab2203106cc7818d96142dd42cfe0a
                        • Instruction ID: cc59631b687ed46b3897f8ef20cc18819bfc4e5e2055f90e08ac7289b8131753
                        • Opcode Fuzzy Hash: 75dccdb2353e919780bed2b11c83ca037eab2203106cc7818d96142dd42cfe0a
                        • Instruction Fuzzy Hash: E83129B690025DBFEB019FA4EC85EEF7BBDFB48749F004025FA00A61A1D3719D149BA5
                        APIs
                        • __EH_prolog.LIBCMT ref: 00421ED4
                        • lstrlenW.KERNEL32(00000000,00001000,?,76F8E0B0,?,00000000,?,?,0042787E,00000000,?,?,00000000,?,?,00000000), ref: 00421F07
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: H_prologlstrlen
                        • String ID: Alt$Alt-Gr$Ctrl$Ctrl-Alt$L-Mouse$L-Win$M-Mouse$R-Ctrl$R-Mouse$R-Win
                        • API String ID: 2133942097-684211483
                        • Opcode ID: f3bd2888a5d8743ae5920ba6bac0428a4c442ee898a2ef51e22436192443f3a1
                        • Instruction ID: e34d6a5a56890267d0a77cb0a0af09d494010216408d4ade35e7860ad381712d
                        • Opcode Fuzzy Hash: f3bd2888a5d8743ae5920ba6bac0428a4c442ee898a2ef51e22436192443f3a1
                        • Instruction Fuzzy Hash: 6F512522B44A30B5CB31A750F941FBF6364AF2176AF60802FF511E61D2EBEC5A45C29D
                        APIs
                        • lstrcatW.KERNEL32(?,R-Mouse), ref: 0042A381
                        • lstrcatW.KERNEL32(?,L-Win), ref: 0042A395
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat
                        • String ID: Alt$Alt-Gr$Ctrl$Ctrl-Alt$L-Mouse$L-Win$M-Mouse$R-Ctrl$R-Mouse$R-Win
                        • API String ID: 4038537762-684211483
                        • Opcode ID: 0196e6e6f9712b71f51dbd6c5d103967daff606a101654226cc2a381356c9e14
                        • Instruction ID: a020f727c1a1fbe9591c624d4daefe5a6311d8d08f741b389f1f89b872b333bc
                        • Opcode Fuzzy Hash: 0196e6e6f9712b71f51dbd6c5d103967daff606a101654226cc2a381356c9e14
                        • Instruction Fuzzy Hash: 2101D432FC4A30F74E30A4487C51BBA6A401326B22BF14163FD5ABA5A6419D0CB5598F
                        APIs
                        • __EH_prolog.LIBCMT ref: 00430486
                        • OffsetRect.USER32(?,?,?), ref: 004304D0
                        • OffsetRect.USER32(00000001,00000001,00000001), ref: 004304EB
                        • GetSysColor.USER32(00000014), ref: 004304F9
                        • GetSysColor.USER32(00000010), ref: 00430521
                        • CreatePen.GDI32(00000000,00000000,00000000), ref: 00430526
                        • DeleteObject.GDI32(00000000), ref: 00430548
                        • DeleteObject.GDI32(?), ref: 00430552
                        • CreatePen.GDI32(00000000,00000000,00000000), ref: 00430506
                          • Part of subcall function 00431AAD: SelectObject.GDI32(0043058E,753DA5C0), ref: 00431ABA
                          • Part of subcall function 00431AAD: MoveToEx.GDI32(0043058E,0043058E,1015FF56,00000000), ref: 00431AD6
                          • Part of subcall function 00431AAD: LineTo.GDI32(0043058E,8B0043C1,5E5FF44D), ref: 00431AE5
                          • Part of subcall function 00431AAD: MoveToEx.GDI32(0043058E,00000001,1015FF56,00000000), ref: 00431AF1
                          • Part of subcall function 00431AAD: LineTo.GDI32(0043058E,8B0043C2,5E5FF44D), ref: 00431AFC
                          • Part of subcall function 00431AAD: MoveToEx.GDI32(0043058E,0043058E,5E5FF44C,00000000), ref: 00431B08
                          • Part of subcall function 00431AAD: LineTo.GDI32(0043058E,8B0043C1,1015FF55), ref: 00431B13
                          • Part of subcall function 00431AAD: MoveToEx.GDI32(0043058E,5E5FF44D,5E5FF44C,00000000), ref: 00431B21
                          • Part of subcall function 00431AAD: LineTo.GDI32(0043058E,8B0043C2,1015FF55), ref: 00431B2E
                          • Part of subcall function 00431AAD: SelectObject.GDI32(0043058E,753DA5C0), ref: 00431B35
                        • OffsetRect.USER32(00000006,00000001,00000001), ref: 00430562
                        • GetSysColor.USER32(00000012), ref: 0043056A
                        • CreatePen.GDI32(00000000,00000000,00000000), ref: 00430575
                        • DeleteObject.GDI32(00000000), ref: 00430593
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: Object$LineMove$ColorCreateDeleteOffsetRect$Select$H_prolog
                        • String ID:
                        • API String ID: 132611724-0
                        • Opcode ID: 138b57e503952e2e3ef7f0f16d7fd84a21ad59701c9fec39699694140e1e4f3a
                        • Instruction ID: 46e6b0f7213544dc18f5c4da83762ef9c03a1ef126acf789cfd90c33d762b217
                        • Opcode Fuzzy Hash: 138b57e503952e2e3ef7f0f16d7fd84a21ad59701c9fec39699694140e1e4f3a
                        • Instruction Fuzzy Hash: 80411AB1D00218AFDB11DFA5CC85BEEBBB9EF48314F00951AF915B7250C7B59A048FA5
                        APIs
                        • GetModuleFileNameW.KERNEL32(00000000,?,?,?,?,?,?,?,?,004125B6,?,0000006C), ref: 004298BC
                        • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,004125B6,?,0000006C), ref: 004298DC
                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,?,?,?,?,?,?,?,004125B6), ref: 004298F8
                        • lstrlenW.KERNEL32(?,###,00445324,?,?,?,?,?,?,?,?,?,?,?,?,004125B6), ref: 00429959
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00000002,00000000,00000000), ref: 0042997F
                        • WriteFile.KERNEL32(?,?,?,?,00000000,?,00000002,00000000,00000000), ref: 00429994
                        • CloseHandle.KERNEL32(?,?,?,?,00000000,?,00000002,00000000,00000000), ref: 0042999D
                        • ShellExecuteW.SHELL32(00000000,open,?,00000000,?,00000000), ref: 004299B9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: File$ByteCharCloseCreateDeleteExecuteHandleModuleMulusermeShellWideWritelstrlen
                        • String ID: ###$4AD$open
                        • API String ID: 1606040545-3056923521
                        • Opcode ID: efe5b113935c41e16996ba03ce4bbef9e4ee182b36a0f832c85522ae5f0f1a04
                        • Instruction ID: b97f26abca5239a11c7f3b777444ca19ae663cfffff06a9f8f6e3006e6f88426
                        • Opcode Fuzzy Hash: efe5b113935c41e16996ba03ce4bbef9e4ee182b36a0f832c85522ae5f0f1a04
                        • Instruction Fuzzy Hash: C9414D7280112AABCF10EBA1DC89EDFBB78FF05354F1044AAF115B3191DB785A45CB64
                        APIs
                        • lstrlenW.KERNEL32(?,00000000,?,?,?,?,?,00436B7E,?,?), ref: 00436F89
                        • lstrlenW.KERNEL32(?,?,?,?,?,00436B7E,?,?), ref: 00436FA6
                        • SetTextColor.GDI32(0000FFFF,~kC), ref: 00436FB7
                        • OutputDebugStringW.KERNEL32(NULL,?,?,?,?,00436B7E,?,?), ref: 00436FC8
                        • GetCurrentObject.GDI32(0000FFFF,00000006), ref: 00436FD3
                        • GetObjectW.GDI32(00000000,0000005C,?), ref: 00436FE4
                        • CreateFontIndirectW.GDI32(?), ref: 00436FEB
                        • DrawTextW.USER32(0000FFFF,?,0000FFFF,00000000,?), ref: 0043701F
                        • DrawTextW.USER32(0000FFFF,?,000000FF,00000000,?), ref: 0043704F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: Text$DrawObjectlstrlen$ColorCreateCurrentDebugFontIndirectOutputString
                        • String ID: NULL$~kC
                        • API String ID: 2332924160-1157440343
                        • Opcode ID: 4ae050228ae3f762b57b8d527a585c44ffd6c7374dfb5799d373051af9ff40f5
                        • Instruction ID: 32513ef4225b7dbf12b6419026106d66b39d41e6418e96635585d9dc61f34225
                        • Opcode Fuzzy Hash: 4ae050228ae3f762b57b8d527a585c44ffd6c7374dfb5799d373051af9ff40f5
                        • Instruction Fuzzy Hash: 64318D7150020AFFCB149FA8DC85AAA7BB9EF08314F119129F916E22A0C735D9519B18
                        APIs
                        • ScreenToClient.USER32(?,?), ref: 00435C44
                          • Part of subcall function 00435BAB: SendMessageW.USER32(?,00000445,00000000,?), ref: 00435BB9
                        • ScreenToClient.USER32(?,?), ref: 00435C91
                          • Part of subcall function 00435DFE: GetMessagePos.USER32 ref: 00435DFE
                        • PostMessageW.USER32(?,0000084D,00000000,00000000), ref: 00435D01
                        • SendMessageW.USER32(?,0000011F,?,?), ref: 00435D1A
                        • PostMessageW.USER32(?,0000001F,00000000,00000000), ref: 00435D65
                        • PostMessageW.USER32(?,0000084D,00000000,00000000), ref: 00435D71
                        • PostMessageW.USER32(?,00000100,00000028,00000000), ref: 00435D7E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: Message$Post$ClientScreenSend
                        • String ID:
                        • API String ID: 438416525-0
                        • Opcode ID: 60a7e8d324673432992717aaadcd6ff05456399c72d3870ab3bd338f88e9b8a5
                        • Instruction ID: 2a1818dc928b07f8f12ddde4aa5868b3ec20cef3fe632689e787451c26aeece7
                        • Opcode Fuzzy Hash: 60a7e8d324673432992717aaadcd6ff05456399c72d3870ab3bd338f88e9b8a5
                        • Instruction Fuzzy Hash: 8051B231500B04AFCB319F16CC88E9BBBF9EF8CB04F10952EF58696661C774A941DB18
                        APIs
                        • GetClientRect.USER32(00000000,00000000), ref: 0042D511
                        • DrawEdge.USER32(?,00000000,00000006,0000200B), ref: 0042D53A
                        • FillRect.USER32(?,00000000,00000010), ref: 0042D549
                        • DrawEdge.USER32(?,00000000,00000006,00002007), ref: 0042D56D
                        • FillRect.USER32(?,00000000,00000010), ref: 0042D57A
                        • GetSysColor.USER32(00000008), ref: 0042D582
                        • SetTextColor.GDI32(?,00000000), ref: 0042D58A
                        • SetBkMode.GDI32(?,00000001), ref: 0042D593
                        • GetStockObject.GDI32(00000011), ref: 0042D59B
                        • SelectObject.GDI32(?,00000000), ref: 0042D5A9
                        • DrawTextW.USER32(?,?,000000FF,00000004,00008024), ref: 0042D5D0
                        • SelectObject.GDI32(?,00000004), ref: 0042D5DA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: DrawObjectRect$ColorEdgeFillSelectText$ClientModeStock
                        • String ID:
                        • API String ID: 303100802-0
                        • Opcode ID: be91fde70604ba309ba84b06fb5e41ceb87a93f3c22d6c4ac74820cc584e0c58
                        • Instruction ID: d2e2adb73274232bb2aef0161fc503774a35fff9785f72c0be1fa87e41e1273c
                        • Opcode Fuzzy Hash: be91fde70604ba309ba84b06fb5e41ceb87a93f3c22d6c4ac74820cc584e0c58
                        • Instruction Fuzzy Hash: F2316B32900218BFEB018FA4DC88EFFBBB8FB08714F004529FA16E6190C771A945CB65
                        APIs
                          • Part of subcall function 0043672E: GetSysColor.USER32(?), ref: 0043673B
                        • CopyRect.USER32(?,?), ref: 00436943
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ColorCopyRect
                        • String ID:
                        • API String ID: 3794717969-1776720792
                        • Opcode ID: 5c9772dec5d805dd6dfde49b813ff185bcd6ae061b483e24b21aff21b6c50cda
                        • Instruction ID: bab850502f826ae16235fee4ad5b7b1deb26fd9a43b8bc222d4fcaf7f1f5b6e4
                        • Opcode Fuzzy Hash: 5c9772dec5d805dd6dfde49b813ff185bcd6ae061b483e24b21aff21b6c50cda
                        • Instruction Fuzzy Hash: DCD16C71E00209EFCF14DFA8C885BEEBBB6AF48304F15806AE905BB291D775A945CF54
                        APIs
                        • FindWindowExW.USER32(00000000,00000000,Shell_TrayWnd,00000000), ref: 00434F77
                        • FindWindowExW.USER32(00000000,00000000,TrayNotifyWnd,00000000), ref: 00434F85
                        • GetWindowRect.USER32(00000000,?), ref: 00434F8F
                        • SHAppBarMessage.SHELL32(00000005,?), ref: 00434FA7
                        • FindWindowExW.USER32(00000000,00000000,Shell_TrayWnd,00000000), ref: 00435004
                        • GetWindowRect.USER32(00000000,?), ref: 0043500F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: Window$Find$Rect$Message
                        • String ID: $$Shell_TrayWnd$TrayNotifyWnd
                        • API String ID: 805496052-1160186678
                        • Opcode ID: aca470a4a86d356b83a37e2c4104057e75468c51ea3e762e57e9c2cb622da7ca
                        • Instruction ID: 2c9f2e3420141922909e519893d12b107e4d3a1898551895d3851cf8cf98412b
                        • Opcode Fuzzy Hash: aca470a4a86d356b83a37e2c4104057e75468c51ea3e762e57e9c2cb622da7ca
                        • Instruction Fuzzy Hash: 8231A170900605AFC728CF69C888DABBBF8EF89714F14855EF85AD7390D635AC40CB68
                        APIs
                          • Part of subcall function 00435E57: GetSysColor.USER32(00000004), ref: 00435E70
                          • Part of subcall function 00435E57: CreateSolidBrush.GDI32(00202020), ref: 00435E79
                        • IsWindowVisible.USER32(?), ref: 00435F4B
                        • GetActiveWindow.USER32 ref: 00435F59
                        • GetSubMenu.USER32(?,?), ref: 00435F6E
                          • Part of subcall function 00435BC2: SendMessageW.USER32(?,00000403,?,?), ref: 00435BDA
                          • Part of subcall function 00435B92: SendMessageW.USER32(?,0000041D,?,?), ref: 00435BA2
                        • MapWindowPoints.USER32(?,00000000,?,00000001), ref: 00435FC8
                        • MapWindowPoints.USER32(?,00000000,?,00000002), ref: 00435FD4
                        • GetCurrentThreadId.KERNEL32 ref: 00435FF6
                        • SetWindowsHookExW.USER32(000000FF,0043607A,00000000,00000000), ref: 00436007
                        • TrackPopupMenuEx.USER32(?,00000140,?,?,?,00000014), ref: 0043602D
                        • SendMessageW.USER32(?,00000111,00000000,AFFE0000), ref: 00436045
                        • UnhookWindowsHookEx.USER32(?), ref: 00436060
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: Window$MessageSend$HookMenuPointsWindows$ActiveBrushColorCreateCurrentPopupSolidThreadTrackUnhookVisible
                        • String ID:
                        • API String ID: 3555522823-0
                        • Opcode ID: d5e96c71b40245e8c850c57e5173b7712c3bfd98b42217a16c0dcc6eb81ae308
                        • Instruction ID: af8b7d620b30591a07dcb7c5db87775e86cc94bb11aca02fd2cfae0a4338fb78
                        • Opcode Fuzzy Hash: d5e96c71b40245e8c850c57e5173b7712c3bfd98b42217a16c0dcc6eb81ae308
                        • Instruction Fuzzy Hash: 6541BCB2900214BFDF519FA5DC858AFBFB9FF48310B10956AF915E6265C370A900CF94
                        APIs
                        • GetSystemMetrics.USER32(0000000F), ref: 004365F3
                        • GetDC.USER32(00000000), ref: 0043660F
                        • CreateFontIndirectW.GDI32(?), ref: 00436637
                        • SelectObject.GDI32(?,00000000), ref: 00436643
                        • DrawTextW.USER32(?,?,000000FF,?,00000424), ref: 0043667D
                        • SelectObject.GDI32(?,?), ref: 0043668F
                        • DeleteObject.GDI32(?), ref: 0043669A
                        • GetSystemMetrics.USER32(00000047), ref: 004366D8
                        • ReleaseDC.USER32(00000000,?), ref: 004366E9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: Object$MetricsSelectSystem$CreateDeleteDrawFontIndirectReleaseText
                        • String ID:
                        • API String ID: 2845678740-0
                        • Opcode ID: 0dd1cdc975fa90c191e1b3f6d902dcce56dbf230f0a94245f5353f29224a4e99
                        • Instruction ID: eefc56dc4ba074cc05ed8a12dcb2865e0cc639ee1b886fa549392c0575cec96a
                        • Opcode Fuzzy Hash: 0dd1cdc975fa90c191e1b3f6d902dcce56dbf230f0a94245f5353f29224a4e99
                        • Instruction Fuzzy Hash: FE419F31900629EFCF11CFA8C889AEEBBB5FF48740F15816AE915B7251C774A901DF98
                        APIs
                        • __EH_prolog.LIBCMT ref: 00425CE4
                        • SendMessageW.USER32(00001042,00000000,00000000,00000000), ref: 00425D02
                          • Part of subcall function 00425C5D: SendMessageW.USER32(?,00000401,0000807B), ref: 00425C86
                          • Part of subcall function 00425C5D: SendMessageW.USER32(?,00000401,0000807D), ref: 00425C90
                          • Part of subcall function 00425C5D: SendMessageW.USER32(?,00000401,00008019), ref: 00425C9B
                          • Part of subcall function 00425C5D: SendMessageW.USER32(?,00000401,0000807B,00000000), ref: 00425CB7
                          • Part of subcall function 00425C5D: SendMessageW.USER32(?,00000401,0000807D,00000000), ref: 00425CC2
                          • Part of subcall function 00425C5D: SendMessageW.USER32(?,00000401,00008019,00000000), ref: 00425CD6
                        • SetWindowTextW.USER32(?,004547B4), ref: 00425D53
                        • SetWindowTextW.USER32(?,?), ref: 00425D62
                        • KillTimer.USER32(000007E8), ref: 00425D70
                        • SetTimer.USER32(000007E8,000000C8,00000000), ref: 00425D84
                        • SetDlgItemTextW.USER32(00000000,000003EC,00002010), ref: 00425D99
                        • SetWindowTextW.USER32(?,00002010), ref: 00425DAA
                        • SendMessageW.USER32(?,0000014D,00000000,?), ref: 00425DF3
                        • SendMessageW.USER32(?,0000014E,?,00000000), ref: 00425E05
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: MessageSend$Text$Window$Timer$H_prologItemKill
                        • String ID:
                        • API String ID: 82283145-0
                        • Opcode ID: 83940ea356a066c9a797e54e52d9d700b06477df8abd2e1b2e9692bab9a6a61c
                        • Instruction ID: 5f8deb670cbed0adec7b50a07d3aa2b4b88e6be29a6496bd3395f5a303cc45d5
                        • Opcode Fuzzy Hash: 83940ea356a066c9a797e54e52d9d700b06477df8abd2e1b2e9692bab9a6a61c
                        • Instruction Fuzzy Hash: 2C31AD71640208FBDB11AB60ECC9EEEB7B9FB08744F00442DF515A21E1DB74AD54CB18
                        APIs
                        • GetWindowPlacement.USER32(?,?), ref: 00428275
                        • GetSystemMetrics.USER32(0000004F), ref: 004282AE
                        • GetSystemMetrics.USER32(0000004D), ref: 004282B4
                        • GetSystemMetrics.USER32(0000004E), ref: 004282BB
                        • GetSystemMetrics.USER32(0000004C), ref: 004282C1
                        • GetSystemMetrics.USER32(0000004D), ref: 004282C8
                        • GetSystemMetrics.USER32(0000004C), ref: 004282CD
                        • SetRect.USER32(?,00000000), ref: 004282D4
                        • GetWindowRect.USER32(?,?), ref: 004282E1
                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00428336
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: MetricsSystem$Window$Rect$MovePlacement
                        • String ID:
                        • API String ID: 3067230557-0
                        • Opcode ID: 870f133595a486a6bf26aa3be2a5cb3c4c7eade40f216451adebc92329adc0dc
                        • Instruction ID: 8bd225a0a0a47aa8a0b0c8ad36270c41b07badd969337c926225b95b87dd0b4f
                        • Opcode Fuzzy Hash: 870f133595a486a6bf26aa3be2a5cb3c4c7eade40f216451adebc92329adc0dc
                        • Instruction Fuzzy Hash: 4731EC71F00229AFDF04DBA8DD85AEEBBF9EF48710F10412AE605A7250DB75AD41CB94
                        APIs
                        • SelectObject.GDI32(0043058E,753DA5C0), ref: 00431ABA
                        • MoveToEx.GDI32(0043058E,0043058E,1015FF56,00000000), ref: 00431AD6
                        • LineTo.GDI32(0043058E,8B0043C1,5E5FF44D), ref: 00431AE5
                        • MoveToEx.GDI32(0043058E,00000001,1015FF56,00000000), ref: 00431AF1
                        • LineTo.GDI32(0043058E,8B0043C2,5E5FF44D), ref: 00431AFC
                        • MoveToEx.GDI32(0043058E,0043058E,5E5FF44C,00000000), ref: 00431B08
                        • LineTo.GDI32(0043058E,8B0043C1,1015FF55), ref: 00431B13
                        • MoveToEx.GDI32(0043058E,5E5FF44D,5E5FF44C,00000000), ref: 00431B21
                        • LineTo.GDI32(0043058E,8B0043C2,1015FF55), ref: 00431B2E
                        • SelectObject.GDI32(0043058E,753DA5C0), ref: 00431B35
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: LineMove$ObjectSelect
                        • String ID:
                        • API String ID: 796595582-0
                        • Opcode ID: 6aed04852779ff3942b37f3775a677f39a3531c3661310badc0ad0f59d01eb94
                        • Instruction ID: 43eb38f613f85a163b313d79e2c63de9559be0ea8cdf3e02458cd8719bfd43f5
                        • Opcode Fuzzy Hash: 6aed04852779ff3942b37f3775a677f39a3531c3661310badc0ad0f59d01eb94
                        • Instruction Fuzzy Hash: 70117A75200604BFE6129B55DCC0E7BF7F9EF89B10F108819F9A9D2510C725E852AB25
                        APIs
                        • GetMenuItemCount.USER32(?), ref: 004370A1
                        • GetMenuItemInfoW.USER32(00000064,?,00000001,?), ref: 004370ED
                        • lstrlenW.KERNEL32(?), ref: 00437179
                        • lstrcpyW.KERNEL32(00000000,?), ref: 00437199
                        • SetMenuItemInfoW.USER32(00000064,?,00000001,?), ref: 004371AE
                        • GetMenuItemCount.USER32(00000064), ref: 004371BA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ItemMenu$CountInfo$lstrcpylstrlen
                        • String ID: 1$d
                        • API String ID: 1621444650-1642009170
                        • Opcode ID: ae4c2c2dfed70d91c995b68a4d3dcd87616bf17e0b87870d315791c588e9eb51
                        • Instruction ID: ab7f1e7837498ced5c99314300850d25f9edd8aff39392c0aee1037423d7d266
                        • Opcode Fuzzy Hash: ae4c2c2dfed70d91c995b68a4d3dcd87616bf17e0b87870d315791c588e9eb51
                        • Instruction Fuzzy Hash: 5E419DB290420AEFDF30DF94D985AAEBBB4FB08354F10952AE845A7350D7349944CF64
                        APIs
                        • DestroyMenu.USER32(?), ref: 004358A9
                        • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 004358C3
                        • SendMessageW.USER32(?,00000418,00000000,00000000), ref: 004358CF
                        • SendMessageW.USER32(?,00000416,00000000,00000000), ref: 004358E2
                        • GetMenuItemCount.USER32(?), ref: 00435903
                        • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0043594A
                        • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 0043597F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: MessageSend$Menu$Item$CountDestroyInfo
                        • String ID: d
                        • API String ID: 4101362009-2564639436
                        • Opcode ID: 34ee46e3f99a2cd70cd31549637652a982901960939b6ab3df41581c115caaa0
                        • Instruction ID: 67dbf8287af0168786e3cb0bfa77e2e4c122d9a401f88475f16c37208581ae31
                        • Opcode Fuzzy Hash: 34ee46e3f99a2cd70cd31549637652a982901960939b6ab3df41581c115caaa0
                        • Instruction Fuzzy Hash: E1317CB1900208BFDB219F65DC81E9FBBB8EF08354F10542AF645E6690D374AD858F64
                        APIs
                        • __EH_prolog.LIBCMT ref: 004215AF
                        • GetDlgItem.USER32(?,?), ref: 004215EB
                        • CreateWindowExW.USER32(00000000,tooltips_class32,00000000,80000001,80000000,80000000,80000000,80000000,?,00000000,00000000), ref: 00421614
                        • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 0042165D
                        • SendMessageA.USER32(?,00000418,00000000,00000190), ref: 00421670
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: MessageSend$CreateH_prologItemWindow
                        • String ID: ,$Test$tooltips_class32
                        • API String ID: 4127292747-3622912971
                        • Opcode ID: f8674888962ce4a140350cb7c02e21500a5a8d2e049f66933eb3e064291a758e
                        • Instruction ID: 4a65af810be17d5466e0fa3a19395ecaa88b91b0f0ad7673a24ad41d318fb192
                        • Opcode Fuzzy Hash: f8674888962ce4a140350cb7c02e21500a5a8d2e049f66933eb3e064291a758e
                        • Instruction Fuzzy Hash: 7F216072A00218FFDB10CF64DC84AEEBBB9FB18750F11813AF905A6290C7754D44CB68
                        APIs
                        • SendMessageW.USER32(?,0000045A,?,00000000), ref: 00435A62
                        • GetClientRect.USER32(?,00000000), ref: 00435A88
                        • PostMessageW.USER32(?,0000084D,00000000,00000000), ref: 00435ADE
                        • PostMessageW.USER32(?,00000100,00000028,00000000), ref: 00435AEB
                        • SendMessageW.USER32(?,0000045A,?,?), ref: 00435B0A
                        • GetClientRect.USER32(?,00000000), ref: 00435B2C
                        • SendMessageW.USER32(?,0000130A,00000000,00000000), ref: 00435B4D
                        • SendMessageW.USER32(?,00000417,00000000,00000000), ref: 00435B6B
                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00435B7C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: Message$Send$Post$ClientRect
                        • String ID:
                        • API String ID: 2800339571-0
                        • Opcode ID: 02e0a1ac313f76683fc824ef5578c044bd7c86950fdc723cdfe1c487a2cdf429
                        • Instruction ID: 8b76a7bbb7dd5651a2b8aff8d266f85c98f0d81b6d8569f3e9fc264057a03356
                        • Opcode Fuzzy Hash: 02e0a1ac313f76683fc824ef5578c044bd7c86950fdc723cdfe1c487a2cdf429
                        • Instruction Fuzzy Hash: B7414C72900A08BFEB119FA8DD85BEEF7F9EB4C311F105425F601E61A0D7B4AD049B65
                        APIs
                        • GetStockObject.GDI32(00000011), ref: 0043642D
                        • GetObjectW.GDI32(00000000,0000005C,?), ref: 0043643A
                        • SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 00436464
                        • CreateFontIndirectW.GDI32(?), ref: 00436491
                        • CreateFontIndirectW.GDI32(?), ref: 004364A9
                        • GetSystemMetrics.USER32(00000032), ref: 004364B9
                        • GetSystemMetrics.USER32(00000031), ref: 004364C5
                        • GetSystemMetrics.USER32(00000031), ref: 004364D2
                        • GetSystemMetrics.USER32(00000032), ref: 004364DC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: System$Metrics$CreateFontIndirectObject$InfoParametersStock
                        • String ID:
                        • API String ID: 4204584070-0
                        • Opcode ID: ab5df36e46a9c33517faad016574ca79f5ca83dd5ec28b48bc76654b598bc8f7
                        • Instruction ID: 8b5ddb9cb34b4abd4672a7546851bcf7586be4e33035710cce3a73d3990b9d3d
                        • Opcode Fuzzy Hash: ab5df36e46a9c33517faad016574ca79f5ca83dd5ec28b48bc76654b598bc8f7
                        • Instruction Fuzzy Hash: 86312B72D443149FEF548FA48C89BDA7BB8FB04304F0400AAEA08AF186E7B46505CF65
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000), ref: 0043755B
                          • Part of subcall function 00437536: GetModuleFileNameW.KERNEL32(?,?,?,00437425,?,?,00000208), ref: 00437542
                        • RegOpenKeyW.ADVAPI32(-80000001,SOFTWARE\Microsoft\Windows\CurrentVersion\Run,?), ref: 004375F7
                        • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?), ref: 00437620
                        • lstrlenW.KERNEL32(?), ref: 0043764A
                        • RegSetValueExW.ADVAPI32(?,?,00000000,00000001,?,00000000), ref: 00437662
                        Strings
                        • " -bg, xrefs: 004375B7
                        • SOFTWARE\Microsoft\Windows\CurrentVersion\Run, xrefs: 004375F1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ModuleValue$FileHandleNameOpenQuerylstrlen
                        • String ID: " -bg$SOFTWARE\Microsoft\Windows\CurrentVersion\Run
                        • API String ID: 3684264954-3110968143
                        • Opcode ID: 66ab3222d0c0240831c30e7605ffc9ee20574bf8d73156f420feff6f773cae43
                        • Instruction ID: c29cf95cee922bc5516625886b548d78ba82a48099b151cd577d435e0fbe8af1
                        • Opcode Fuzzy Hash: 66ab3222d0c0240831c30e7605ffc9ee20574bf8d73156f420feff6f773cae43
                        • Instruction Fuzzy Hash: AA3164B294011CABDF20DBA5DD89EDFB7BCEF48310F0045A6B509E2151DA749B85CF64
                        APIs
                        • InitCommonControlsEx.COMCTL32(?), ref: 00428E8F
                        • CreateWindowExW.USER32(00000000,tooltips_class32,00456168,?,80000000,80000000,80000000,80000000,00000000,00000000,?,00000000), ref: 00428ECA
                        • SendMessageW.USER32(00000004,00000432,00000000,0000002C), ref: 00428F31
                        • SendMessageW.USER32(00000004,00000421,00000001,?), ref: 00428F46
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: MessageSend$CommonControlsCreateInitWindow
                        • String ID: ,$No Text associated$tooltips_class32
                        • API String ID: 3342334947-1383969392
                        • Opcode ID: c1e45a4e3f247445cfc8ed18c1330415fc3ecb413c95c108c4e7451c0e230ecf
                        • Instruction ID: 8e3712aa7acb00232c6ec16f81002e9e2d711b15805aa15c19c7bcd2e4cca355
                        • Opcode Fuzzy Hash: c1e45a4e3f247445cfc8ed18c1330415fc3ecb413c95c108c4e7451c0e230ecf
                        • Instruction Fuzzy Hash: E42171B1A01309AFDB10CF95DD85AAFBBF9FB48314F50402EF615E3290C7B499048B64
                        APIs
                        • __EH_prolog.LIBCMT ref: 00427C1F
                        • RegSetValueExW.ADVAPI32(?,_________ADMIN_TEST_SoftwareOK_DOK,00000000,00000004,00000000,00000004,80000002,SOFTWARE\Microsoft\Windows\CurrentVersion,00020006,?,?,?,?,004211E5,?), ref: 00427C75
                        • RegCloseKey.ADVAPI32(?,?,?,?,004211E5,?), ref: 00427C8D
                        • RegDeleteValueW.ADVAPI32(?,_________ADMIN_TEST_SoftwareOK_DOK,?,?,?,004211E5,?), ref: 00427C9B
                        • RegCloseKey.ADVAPI32(?,?,?,?,004211E5,?), ref: 00427CB2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: CloseValue$DeleteH_prolog
                        • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion$_________ADMIN_TEST_SoftwareOK_DOK
                        • API String ID: 2485495262-3000701925
                        • Opcode ID: 9bd88f4235432e50c426d5700a8792d4f1201c1e48b424f363935baa0b819853
                        • Instruction ID: b68bf3dc38133edbe771ec151f4e5719081e62b5f70673435e2283974a714e34
                        • Opcode Fuzzy Hash: 9bd88f4235432e50c426d5700a8792d4f1201c1e48b424f363935baa0b819853
                        • Instruction Fuzzy Hash: 511194B0A00225EBCB219FA6EC45BAFBBB9FB84701F00062BF111B51A1C7784940DB68
                        APIs
                        • SetBkColor.GDI32(?,00000000), ref: 00436DB1
                        • ExtTextOutW.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 00436DD3
                        • SetBkColor.GDI32(?,00000000), ref: 00436DDF
                        • SetPixel.GDI32(?,?,00000000,00000000), ref: 00436E0C
                        • SetPixel.GDI32(?,00000000,00000000,00000000), ref: 00436E1D
                        • SetPixel.GDI32(?,?,00000000,00000000), ref: 00436E55
                        • SetPixel.GDI32(?,00000000,00000000,00000000), ref: 00436E66
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: Pixel$Color$Text
                        • String ID:
                        • API String ID: 98714010-0
                        • Opcode ID: 823f748bbc1fa12dc0c71d92b990de8f11a86ca1ce6d5b11bbc1689569002d4a
                        • Instruction ID: d099eac011f95741b9d61141177dafcc1c442d3a7173c642c8adaa2b6a63c7a4
                        • Opcode Fuzzy Hash: 823f748bbc1fa12dc0c71d92b990de8f11a86ca1ce6d5b11bbc1689569002d4a
                        • Instruction Fuzzy Hash: DF510572A0011EAFCF01CFA8CD859EE7BB5FF08348F02812AFD54A6250C3759D259B94
                        APIs
                        • __EH_prolog.LIBCMT ref: 00424935
                        • SendMessageW.USER32(?,00001073,?,?), ref: 004249B2
                        • lstrlenW.KERNEL32(00000000), ref: 004249C1
                        • lstrcpynW.KERNEL32(?,?,?,?,No-Edit,?,?,00000001), ref: 00424A5B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: H_prologMessageSendlstrcpynlstrlen
                        • String ID: 4AD$No-Edit
                        • API String ID: 1355327639-2827627885
                        • Opcode ID: ca2140508e88d2823e51b227dfb65c55b94b4dd3de4d7bb3ec7bc2a5443e0de2
                        • Instruction ID: 525aca3b652f3ad0fd2ff23f3a39ad9f164bad48392fc2ea544207c4399d0d49
                        • Opcode Fuzzy Hash: ca2140508e88d2823e51b227dfb65c55b94b4dd3de4d7bb3ec7bc2a5443e0de2
                        • Instruction Fuzzy Hash: 3941C4B2A10219DFDB10DFA4D885AEF77B4EF54314F10452FE401A72C0DB785A44CBA8
                        APIs
                          • Part of subcall function 0042C5A9: CreateWindowExW.USER32(00000000,ToolbarWindow32,00000000,?,?,00000000,?,00000000,?,00000000,00000000,5600094E), ref: 0042C5ED
                        • SendMessageW.USER32(00000000,0000041E,00000014,00000000), ref: 0042BE92
                        • SendMessageW.USER32(?,00000444,00000001,?), ref: 0042BEBC
                        • SendMessageW.USER32(?,00000420,00000000,000B000D), ref: 0042BECD
                        • SendMessageW.USER32(?,0000041F,00000000,00120014), ref: 0042BEDC
                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000014,00000012,00000016,?,00000000,5600094E,00000000,00000000,?,00000000,?), ref: 0042BF04
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: MessageSend$Window$Create
                        • String ID: R
                        • API String ID: 363225742-880014062
                        • Opcode ID: 44d74488b458383f830a37710df3e5c9157c40167d0e38d6889842612e2d3058
                        • Instruction ID: 4f984f6de87d68ed15a3930f1a19e0a1d8b0ccabfa63d346ffacca1ab36ff6cb
                        • Opcode Fuzzy Hash: 44d74488b458383f830a37710df3e5c9157c40167d0e38d6889842612e2d3058
                        • Instruction Fuzzy Hash: 4421A431740268BAEB205B5ADC46FDB7FB9EBC9B04F40005AB700FA1E6C6F05904DAE5
                        APIs
                        • SendMessageW.USER32(?,00001042,00000000,00000000), ref: 0042595E
                        • lstrcpyW.KERNEL32(?,MenuBreak:,00000000,00000000,00000000), ref: 004259DD
                        • lstrcpyW.KERNEL32(?,MenuBreak:), ref: 004259E7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$MessageSend
                        • String ID: E54453$E54455$MenuBreak:
                        • API String ID: 749160242-3811496160
                        • Opcode ID: d847fb029aeb95c1808352b37276a7629e34667e6f5bf58758126a7060354814
                        • Instruction ID: ae8bf0fb2b8ac56c75039195bb49617105d3e424e9a1fa973d64a3bfbcaa12ab
                        • Opcode Fuzzy Hash: d847fb029aeb95c1808352b37276a7629e34667e6f5bf58758126a7060354814
                        • Instruction Fuzzy Hash: D9210B71B11218B7CF14A7A59C56AEE77AD9BC8320F10406FF901F7381DAB85E418798
                        APIs
                          • Part of subcall function 00424245: lstrcpyW.KERNEL32(?), ref: 0042425B
                          • Part of subcall function 00424245: lstrcatW.KERNEL32(?,00000000,\Backup), ref: 0042428F
                          • Part of subcall function 00424245: CreateDirectoryW.KERNEL32(?,00000000), ref: 004242A6
                          • Part of subcall function 00424245: lstrlenW.KERNEL32(?), ref: 004242BD
                        • MessageBoxW.USER32(?,00000000,00000000,00000000), ref: 00423C42
                        • lstrcpyW.KERNEL32(?), ref: 00423C62
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$CreateDirectoryMessagelstrcatlstrlen
                        • String ID: Error 321$open$use_backup_d$use_backup_h
                        • API String ID: 2723441971-4221616228
                        • Opcode ID: 4c4bb09373d20a6c2803dccd173523e41e1d200dbffac5f50e3391eb70922121
                        • Instruction ID: 5a414714267ca566798a7933c35b8ce7628397c0567d460f9e152fcddd83709a
                        • Opcode Fuzzy Hash: 4c4bb09373d20a6c2803dccd173523e41e1d200dbffac5f50e3391eb70922121
                        • Instruction Fuzzy Hash: B811E772620220AEDB246F31FC0AA7E3768EB00306F50487FF901F2191F97D9A55975D
                        APIs
                        • __EH_prolog.LIBCMT ref: 0042415B
                          • Part of subcall function 00424245: lstrcpyW.KERNEL32(?), ref: 0042425B
                          • Part of subcall function 00424245: lstrcatW.KERNEL32(?,00000000,\Backup), ref: 0042428F
                          • Part of subcall function 00424245: CreateDirectoryW.KERNEL32(?,00000000), ref: 004242A6
                          • Part of subcall function 00424245: lstrlenW.KERNEL32(?), ref: 004242BD
                        • GetLocalTime.KERNEL32(?), ref: 0042416C
                          • Part of subcall function 00407418: VirtualProtect.KERNELBASE(00000000,?,00000040,00000000,00000000,?,?,00407479,00407479,?,?,00407479,?,00407479,?,00000000), ref: 00407A89
                        • CopyFileW.KERNEL32(?,00000000,?,00000000,?,?,0048039C,00000000,00445508), ref: 00424207
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: CopyCreateDirectoryFileH_prologLocalProtectTimeVirtuallstrcatlstrcpylstrlen
                        • String ID: %02d-%02d-%02d_%02d-%02d-%02d_%s.ini$4AD$last_backup
                        • API String ID: 1991952598-3850644810
                        • Opcode ID: 9e552855b8de75b9d4827896550e001c5279c362eb6a3d3a5da95fbda08a0535
                        • Instruction ID: 8c1af6343298e20960110cf1ab86fd2bd36cdd14f9dc99471fedbc98cf0c5e88
                        • Opcode Fuzzy Hash: 9e552855b8de75b9d4827896550e001c5279c362eb6a3d3a5da95fbda08a0535
                        • Instruction Fuzzy Hash: 74214BB1C00249AADB00EBE5C946BFEBBB8AF08705F10406AF551B31C2D77C9A44D779
                        APIs
                        • CallWindowProcW.USER32(?,00000014,?,?), ref: 0043624A
                        • GetParent.USER32(?), ref: 0043625E
                        • GetParent.USER32(00000000), ref: 00436261
                        • MapWindowPoints.USER32(?,00000000,?,00000001), ref: 0043627D
                        • OffsetWindowOrgEx.GDI32(?,?,?,?), ref: 00436296
                        • SendMessageW.USER32(00000000,00000014,?,00000000), ref: 0043629F
                        • OffsetWindowOrgEx.GDI32(?,?,?,?), ref: 004362BA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: Window$OffsetParent$CallMessagePointsProcSend
                        • String ID:
                        • API String ID: 593092700-0
                        • Opcode ID: 626aed2c86cc15b35851dd1dd7cd3fbf682c3f01cfdcc080fc99eecc66589346
                        • Instruction ID: 1b369d1bca0969bd8b2634237acd7de0d378513594854ca44be8d192bcae6432
                        • Opcode Fuzzy Hash: 626aed2c86cc15b35851dd1dd7cd3fbf682c3f01cfdcc080fc99eecc66589346
                        • Instruction Fuzzy Hash: 6D11A77690025DBFDF119F95DC84CEEBFBEFB48350F018466FA15A2160C6719A10AF64
                        APIs
                        • lstrcpyW.KERNEL32(?), ref: 0042425B
                        • lstrcatW.KERNEL32(?,00000000,\Backup), ref: 0042428F
                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 004242A6
                        • lstrlenW.KERNEL32(?), ref: 004242BD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: CreateDirectorylstrcatlstrcpylstrlen
                        • String ID: \Backup$hAB
                        • API String ID: 291623610-2780332934
                        • Opcode ID: df9651015e083aa5677f6518775e4b3ace0f5f424d346ddda6fe4bd26c0da0b8
                        • Instruction ID: 5d9425836112100eaf2b6b8e5aeeddb2b8b346ef44fab14ca78b7b7aa9d58edc
                        • Opcode Fuzzy Hash: df9651015e083aa5677f6518775e4b3ace0f5f424d346ddda6fe4bd26c0da0b8
                        • Instruction Fuzzy Hash: 180156F59101099BDF10EBA1DD59F9A777CAB44304F0004E5A705F20D2DB749A458F5C
                        APIs
                        • SetRect.USER32(0042BD45,00000000,00000000,00000000,?), ref: 0042D44B
                        • SetWindowPos.USER32(?,00000000,00000002,00000003,00000000,00000000,00000015,?,?,0042BD45,?,00000000), ref: 0042D468
                        • SetWindowPos.USER32(?,00000000,00000000,?,00000000,?,00000004,?,?,0042BD45,?,00000000), ref: 0042D483
                        • SetRect.USER32(0042BD45,00000000,00000000,00000000,00000000), ref: 0042D49B
                        • SetWindowPos.USER32(?,00000000,-000000E9,00000003,00000000,00000000,00000015,?,?,0042BD45,?,00000000), ref: 0042D4BD
                        • InvalidateRect.USER32(00000000,0042BD45,00000001,?,?,0042BD45,?,00000000), ref: 0042D4E7
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: RectWindow$Invalidate
                        • String ID:
                        • API String ID: 1056487977-0
                        • Opcode ID: 5afb842bdec1a3cce351e7e9e9114239a5e0f35c927c0db12be784a85ca540a9
                        • Instruction ID: 9a7c52b52044f0b9150fede3bba70a30080b0dbe8a6437ef3e0f636978d02bb5
                        • Opcode Fuzzy Hash: 5afb842bdec1a3cce351e7e9e9114239a5e0f35c927c0db12be784a85ca540a9
                        • Instruction Fuzzy Hash: 1F3143B2600618BFEB119FA4DCC4EBBB7ADEB48754F408529FA46E7650C670FD018B64
                        APIs
                        • GetWindowLongW.USER32(00000000,000000FC), ref: 004362F0
                        • SetWindowLongW.USER32(?,000000FC,0043622C), ref: 00436305
                        • GetClientRect.USER32(?,00000000), ref: 0043631D
                        • SendMessageW.USER32(?,00000418,00000000,00000000), ref: 0043634A
                        • SendMessageW.USER32(?,0000041D,-00000001,?), ref: 0043635A
                        • SetWindowPos.USER32(?,00000000,00420BC1,?,00420BC1,?,00000040,?,?,?,00420BC1,00000000,00000000), ref: 00436379
                          • Part of subcall function 004360E5: CreateWindowExW.USER32(p#>u,ToolbarWindow32,00000000,00000000,00000000,00000000,000000B4,00000014,00000000,00000000,00000000,00000000), ref: 00436113
                          • Part of subcall function 004360E5: GetStockObject.GDI32(00000011), ref: 00436127
                          • Part of subcall function 004360E5: GetObjectW.GDI32(00000000,0000005C,?), ref: 00436145
                          • Part of subcall function 004360E5: SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 0043616E
                          • Part of subcall function 004360E5: CreateFontIndirectW.GDI32(?), ref: 0043618A
                          • Part of subcall function 004360E5: SendMessageW.USER32(?,00000030,?,00000000), ref: 004361A2
                          • Part of subcall function 004360E5: SendMessageW.USER32(?,0000041E,00000014,00000000), ref: 004361AF
                          • Part of subcall function 004360E5: SendMessageW.USER32(?,00000420,00000000,00100000), ref: 004361BF
                          • Part of subcall function 004360E5: GetDlgItem.USER32(?,?), ref: 004361CC
                          • Part of subcall function 004360E5: ShowWindow.USER32(00000000,00000000), ref: 004361E1
                          • Part of subcall function 004360E5: GetWindowRect.USER32(00000000,?), ref: 004361EC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: Window$MessageSend$CreateLongObjectRect$ClientFontIndirectInfoItemParametersShowStockSystem
                        • String ID:
                        • API String ID: 3062793459-0
                        • Opcode ID: cdd7510cf0f21a5f206af28a3c6f98eba230aeda3fa79f76c1b1993af790ee0a
                        • Instruction ID: 6fa5585dfdfa755437bdcf99a996e14e6fb65e5566723ec97538393471b35915
                        • Opcode Fuzzy Hash: cdd7510cf0f21a5f206af28a3c6f98eba230aeda3fa79f76c1b1993af790ee0a
                        • Instruction Fuzzy Hash: 882162B2900619BFEB11AFA4DC85CBFBBB9FB08754F004529F612A11A0C772AD10CB54
                        APIs
                        • __EH_prolog.LIBCMT ref: 00430278
                        • GetWindowDC.USER32(?,?,?,?,00000001), ref: 004302B5
                          • Part of subcall function 004318E0: CreateBitmap.GDI32(00000008,00000008,00000001,00000001,?), ref: 00431915
                          • Part of subcall function 004318E0: CreatePatternBrush.GDI32(00000000), ref: 00431922
                          • Part of subcall function 004318E0: DeleteObject.GDI32(00000000), ref: 0043192B
                        • SelectObject.GDI32(?,?), ref: 004302DA
                        • PatBlt.GDI32(?,?,?,?,?,005A0049), ref: 004302FA
                        • SelectObject.GDI32(?,00000000), ref: 00430304
                        • DeleteObject.GDI32(?), ref: 00430307
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: Object$CreateDeleteSelect$BitmapBrushH_prologPatternWindow
                        • String ID:
                        • API String ID: 3230913206-0
                        • Opcode ID: f6250e884e8d8b66865a145d47d1cc8868aca51843dab574d2639dc39cc198a2
                        • Instruction ID: c11674e792ad895603e7ae83b2f7238172a1f69c4ea2e823c6e8fab6d9ad6268
                        • Opcode Fuzzy Hash: f6250e884e8d8b66865a145d47d1cc8868aca51843dab574d2639dc39cc198a2
                        • Instruction Fuzzy Hash: 5F21E572D00219AFCB00EFE9CD869EEBBB9FB08350F04516AE515B3291D7399941CBA4
                        APIs
                        • SendMessageW.USER32(?,00000401,0000807B), ref: 00425C86
                        • SendMessageW.USER32(?,00000401,0000807D), ref: 00425C90
                        • SendMessageW.USER32(?,00000401,00008019), ref: 00425C9B
                        • SendMessageW.USER32(?,00000401,0000807B,00000000), ref: 00425CB7
                        • SendMessageW.USER32(?,00000401,0000807D,00000000), ref: 00425CC2
                        • SendMessageW.USER32(?,00000401,00008019,00000000), ref: 00425CD6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: MessageSend
                        • String ID:
                        • API String ID: 3850602802-0
                        • Opcode ID: 76cfa821a99e5cd8c24453d739d7a6786c4f021e617c5beb8bf8cb98bf5a9bfa
                        • Instruction ID: ca941d673646c457d2aca30d321aa660bec5691bca5c67db969b8d8c9d1bec7e
                        • Opcode Fuzzy Hash: 76cfa821a99e5cd8c24453d739d7a6786c4f021e617c5beb8bf8cb98bf5a9bfa
                        • Instruction Fuzzy Hash: 0701D171B4432876D23096379C88F277EACEBC2F61F15442AB644E60C1CA79A804C774
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: CombineDesktopFolderFreeH_prolog
                        • String ID: 4AD
                        • API String ID: 2472301591-1156607891
                        • Opcode ID: e1c6b5c3396b9a74d4f7803e7b67e7efc60ef74d1efc0caebdd765398830d3df
                        • Instruction ID: c43f26274bbcab29b743a3eba8f8bc5ae05b5634fbb95af1ae08d608ebfbef1e
                        • Opcode Fuzzy Hash: e1c6b5c3396b9a74d4f7803e7b67e7efc60ef74d1efc0caebdd765398830d3df
                        • Instruction Fuzzy Hash: 10516071904259EFDF10DFA4C989ADEBBB8EF48314F1040AAF505B7281C778AE04CBA5
                        APIs
                        • RegOpenKeyW.ADVAPI32(-80000001,SOFTWARE\Microsoft\Windows\CurrentVersion\Run,?), ref: 004374AB
                        • lstrlenW.KERNEL32(?,?,?,00437486,?,?,?,?," -bg,?,?,?,00454984), ref: 004374BA
                        • RegSetValueExW.ADVAPI32(00000000,00000208,00000000,00000001,?,00000000,?,?,00437486,?,?,?,?," -bg,?,?), ref: 004374CF
                        • RegCloseKey.ADVAPI32(00000000,?,?,00437486,?,?,?,?," -bg,?,?,?,00454984), ref: 004374DA
                        Strings
                        • SOFTWARE\Microsoft\Windows\CurrentVersion\Run, xrefs: 00437499
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: CloseOpenValuelstrlen
                        • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
                        • API String ID: 2964171075-3913687870
                        • Opcode ID: 30a21f67d9d09dc05d4b23aefdb543e1f9a85324633e6cdcfef0dd8a64dfa347
                        • Instruction ID: 2ceedae9dc0c1995bab63891bbcd1d91b5384f924f370bdbf12778e3a071c21b
                        • Opcode Fuzzy Hash: 30a21f67d9d09dc05d4b23aefdb543e1f9a85324633e6cdcfef0dd8a64dfa347
                        • Instruction Fuzzy Hash: 94F09A3781036AEBDF210FA0DC4ABEB3B69FF043A1F018620FC28A5160D775C9609B94
                        APIs
                        • InvalidateRect.USER32(753D4920,?,00000001,?,753D4920,?,00000001), ref: 0042BC10
                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004,?,?,?,753D4920,?,00000001), ref: 0042BC4F
                        • InvalidateRect.USER32(753D4920,?,00000001,?,?,?,753D4920,?,00000001), ref: 0042BC60
                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004,?,?,753D4920,?,00000001), ref: 0042BCA7
                        • InvalidateRect.USER32(753D4920,?,00000001,?,?,753D4920,?,00000001), ref: 0042BCB8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: InvalidateRect$Window
                        • String ID:
                        • API String ID: 2579585970-0
                        • Opcode ID: d25773a06468afcf545132c1d8922e7dc084e531c35e1c88104e25638d9c6b93
                        • Instruction ID: 19135094c6df45e34b20abd5c0d7e70cbf642a7af8c4ebe2beb88d05cbd2d263
                        • Opcode Fuzzy Hash: d25773a06468afcf545132c1d8922e7dc084e531c35e1c88104e25638d9c6b93
                        • Instruction Fuzzy Hash: F6311BB2A0011AEFCF10DF99D9869FFBB79EB44314F50016AE611A3290CB356941DB95
                        APIs
                        • lstrlenW.KERNEL32(00000000), ref: 004264F0
                        • GetEnvironmentVariableW.KERNEL32(?,?,00000208), ref: 00426567
                        • lstrcatW.KERNEL32(?,?), ref: 00426595
                        • lstrlenW.KERNEL32(?), ref: 004265B0
                        • lstrcpyW.KERNEL32(00000000,?), ref: 004265E5
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrlen$EnvironmentVariablelstrcatlstrcpy
                        • String ID:
                        • API String ID: 4067718196-0
                        • Opcode ID: 689eb6f683813cff23308c80fd02acc3e2134cfa9f3102650246d9308dc47932
                        • Instruction ID: a93edea7da4d4899329c06e4eb84b9fb86500c73c2a2d66807996ec3ed989cbd
                        • Opcode Fuzzy Hash: 689eb6f683813cff23308c80fd02acc3e2134cfa9f3102650246d9308dc47932
                        • Instruction Fuzzy Hash: 8431B072910228ABCF21DF48EC846DEB3F4FF18300F5045A6D945E3220E7749AD58BD8
                        APIs
                        • __EH_prolog.LIBCMT ref: 004323C1
                        • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000004,00000080,00000000,00000000,?,?,?,0042181D,00456830,?,00000000,00000000), ref: 004323E2
                        • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000,00456830,?,?,0042181D,00456830,?,00000000,00000000,?), ref: 0043240B
                        • WriteFile.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,?,0042181D,00456830,?,00000000,00000000,?), ref: 00432428
                        • CloseHandle.KERNEL32(00000000,?,?,0042181D,00456830,?,00000000,00000000,?,?,?,00421E9B,?,?,?,?), ref: 0043242B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: File$Write$CloseCreateH_prologHandle
                        • String ID:
                        • API String ID: 2041372692-0
                        • Opcode ID: 1d0891a27ab082212569f6b6c974edbf0ce1f31d20da91cb306e8ec8960a8337
                        • Instruction ID: e0cf3023d2533926c737bf7126066b7ab1a7276685e7b990d7760ebfb0582e74
                        • Opcode Fuzzy Hash: 1d0891a27ab082212569f6b6c974edbf0ce1f31d20da91cb306e8ec8960a8337
                        • Instruction Fuzzy Hash: 0A118E70500208BEDB10DB65DD89EAF7B7CEB88724F10421AF551E72E1D7B45A01CB64
                        APIs
                        • GetSystemMetrics.USER32(?), ref: 0043033D
                        • GetWindowLongW.USER32(?,000000EC), ref: 0043035C
                        • GetSystemMetrics.USER32(?), ref: 00430372
                        • GetSystemMetrics.USER32(?), ref: 0043038E
                        • SystemParametersInfoW.USER32(00000026,00000000,?,00000000), ref: 0043039F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: System$Metrics$InfoLongParametersWindow
                        • String ID:
                        • API String ID: 72108969-0
                        • Opcode ID: 1cc4a1359398968863d07bd687d5fdc9b902957087c532c0d436a0cca70025cd
                        • Instruction ID: e0a1c76b84bf8acbd95bf98adef0aa024b93c271ea1de0d9e930c4df4dd8b195
                        • Opcode Fuzzy Hash: 1cc4a1359398968863d07bd687d5fdc9b902957087c532c0d436a0cca70025cd
                        • Instruction Fuzzy Hash: FC11AC722507109FE7209F39CD4AB6AB3E4EBA8710F001B2EE482C76D0D778E845CB48
                        APIs
                        • GetClientRect.USER32(?,?), ref: 0041F60F
                        • GetDlgItem.USER32(?,000003F7), ref: 0041F642
                        • SetWindowPos.USER32(00000000), ref: 0041F64B
                        • GetDlgItem.USER32(?,0000041D), ref: 0041F655
                        • SetWindowPos.USER32(00000000,00000000,?,?,?,00000014,00000000), ref: 0041F66F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: ItemWindow$ClientRect
                        • String ID:
                        • API String ID: 3857652467-0
                        • Opcode ID: 2ec0658b5d4e4b8b45ed11b5361e37e669d432922f7a65f0b14cab60ca4adec7
                        • Instruction ID: 39b0bc59052787c31fa0be47496c43408b3b1618e3587cfc5ac7796f203d5fa7
                        • Opcode Fuzzy Hash: 2ec0658b5d4e4b8b45ed11b5361e37e669d432922f7a65f0b14cab60ca4adec7
                        • Instruction Fuzzy Hash: 1B010476A00219BBDF00EBE8DC55FBE7B7DEB88700F040158F611B61A2C671AA10DBA4
                        APIs
                        • lstrcatW.KERNEL32(?,00456168), ref: 00426E3B
                        • GetModuleHandleW.KERNEL32(00000000), ref: 00426E4E
                        • GetOpenFileNameW.COMDLG32(0000004C), ref: 00426E7C
                          • Part of subcall function 00427502: __EH_prolog.LIBCMT ref: 00427507
                          • Part of subcall function 00427502: InterlockedIncrement.KERNEL32(-000000F4), ref: 00427532
                          • Part of subcall function 00427502: wsprintfW.USER32 ref: 004275DA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: FileH_prologHandleIncrementInterlockedModuleNameOpenlstrcatwsprintf
                        • String ID: L
                        • API String ID: 998826993-2909332022
                        • Opcode ID: 56594663d0703831b2f3f0b6afeaadba6e808f07715dbfa4f927eebb35addb0f
                        • Instruction ID: 5d8469f7ef1b97ed5ccfa38109bf4958b2e7bba871ead841c3b78ac34a2f7ac0
                        • Opcode Fuzzy Hash: 56594663d0703831b2f3f0b6afeaadba6e808f07715dbfa4f927eebb35addb0f
                        • Instruction Fuzzy Hash: 76116A71E003589BDF54CF94CC457DEB7B9BF48302F00406AD105B7280DBB95A898F59
                        APIs
                        • SendMessageW.USER32(00000000,00000444,00000001,?), ref: 004359F6
                        • SendMessageW.USER32(00000000,00000440,?,00000020), ref: 00435A0E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: MessageSend
                        • String ID: $:cC
                        • API String ID: 3850602802-2689247352
                        • Opcode ID: b6be724ffc89ea9c68968f2ea9316348c7c60fb0f0a11f3cf0fab30b33a0f5c2
                        • Instruction ID: c420a73713401dbab9f0e02ccf6eaa8cd534b2db7598aba9dc244a5b4b478a92
                        • Opcode Fuzzy Hash: b6be724ffc89ea9c68968f2ea9316348c7c60fb0f0a11f3cf0fab30b33a0f5c2
                        • Instruction Fuzzy Hash: 03113071A0028CEFDF00CFD9D844BDEBBB4EF44314F048016E914AA295D3B59515DF65
                        APIs
                        • GetDlgItem.USER32(?,?), ref: 004216B1
                        • SendMessageW.USER32(?,00000433,00000000,?), ref: 004216EC
                        • SendMessageW.USER32(?,00000432,00000000,0000002C), ref: 00421717
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: MessageSend$Item
                        • String ID: ,
                        • API String ID: 3888421826-3772416878
                        • Opcode ID: 54e00455506e2c76601c277b6ec646d38a313d747a679faeb7b5c55891d413a2
                        • Instruction ID: e5665baada64295f7c02611f98c27c35f43ebbc44d05b6f3011a9d3297f79af1
                        • Opcode Fuzzy Hash: 54e00455506e2c76601c277b6ec646d38a313d747a679faeb7b5c55891d413a2
                        • Instruction Fuzzy Hash: BE11AF76E00218AFDB00DFA9DC55ADDBBB4FF4C710F109026EA14BB290D6B59A45CF68
                        APIs
                        • RegOpenKeyW.ADVAPI32(-80000001,SOFTWARE\Microsoft\Windows\CurrentVersion\Run,?), ref: 00437509
                        • RegDeleteValueW.ADVAPI32(?,?), ref: 0043751B
                        • RegCloseKey.ADVAPI32(?), ref: 00437526
                        Strings
                        • SOFTWARE\Microsoft\Windows\CurrentVersion\Run, xrefs: 004374F7
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: CloseDeleteOpenValue
                        • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
                        • API String ID: 849931509-3913687870
                        • Opcode ID: 0220bb65a57990b1609bbb8ec334c0a7c02d6554820eec917214b62211459a15
                        • Instruction ID: 59c5435105357cda73140981fc49627d41e5a9f77ffab6543ae7563a6603dc63
                        • Opcode Fuzzy Hash: 0220bb65a57990b1609bbb8ec334c0a7c02d6554820eec917214b62211459a15
                        • Instruction Fuzzy Hash: 5DE03037810229EBCF251FB0DC4969A7BA5EB08371F01C125FD18AA210D739C9409F94
                        APIs
                        • LoadLibraryW.KERNEL32(USER32.DLL,00435EA8,?,?,?,?), ref: 00435528
                        • GetProcAddress.KERNEL32(?,SetMenuInfo), ref: 00435546
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: SetMenuInfo$USER32.DLL
                        • API String ID: 2574300362-3329878150
                        • Opcode ID: 98adff75472883bb36f32fb166f88d904f831f7eadf3cd23d295b96331bbcdeb
                        • Instruction ID: 5916e2fc36fe8bba6e0fc43ecc7b0183c6b496dbd579211a3983e5e27e86c943
                        • Opcode Fuzzy Hash: 98adff75472883bb36f32fb166f88d904f831f7eadf3cd23d295b96331bbcdeb
                        • Instruction Fuzzy Hash: FAE0C271620600AFDF619F24EC0971A3AA5F728742F00683AB40A922A4D778A448EF4C
                        APIs
                        • SetPixel.GDI32(?,?,00000000,?), ref: 00436C99
                        • SetPixel.GDI32(?,?,00000000,?), ref: 00436CA7
                        • SetPixel.GDI32(?,?,00000000,?), ref: 00436CB5
                        • SetPixel.GDI32(?,?,00000000,?), ref: 00436CC3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: Pixel
                        • String ID:
                        • API String ID: 3195210534-0
                        • Opcode ID: f5ac0db82702d0b4e9d5f0b973c34283a37342df7875bbe1c37e92ff6137fece
                        • Instruction ID: db52c432db6c09696b0e690863e35eee4e14e024e0a01d6cddf26fbad3f81550
                        • Opcode Fuzzy Hash: f5ac0db82702d0b4e9d5f0b973c34283a37342df7875bbe1c37e92ff6137fece
                        • Instruction Fuzzy Hash: 0421F33290011EEFCF019FA9DD458DEBFB2FF48350F158166EA14A2260C7359A61EB90
                        APIs
                        • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000002,00000080,00000000), ref: 00429B97
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,?,00000000,00000000), ref: 00429BCF
                        • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00429BE3
                        • CloseHandle.KERNEL32(?), ref: 00429BEC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: File$ByteCharCloseCreateHandleMultiWideWrite
                        • String ID:
                        • API String ID: 1078690013-0
                        • Opcode ID: fcd345e099a6bf93a850157cf3f6ac57d52df9ba181830237b478ca082b12d32
                        • Instruction ID: 82ed86162d68cebab0e1acd3225a60407c9899cbbfb5fde9063b479654f97b37
                        • Opcode Fuzzy Hash: fcd345e099a6bf93a850157cf3f6ac57d52df9ba181830237b478ca082b12d32
                        • Instruction Fuzzy Hash: 1E113A71100008BFEB209F55DC89EAABBBDEB89754F10416AF511E71E0DB70AE41DB64
                        APIs
                        • CallWindowProcW.USER32(?,?,?,00000005,?), ref: 0042D29E
                        • GetMessagePos.USER32 ref: 0042D2B0
                        • ScreenToClient.USER32(?,?), ref: 0042D2CC
                        • PtInRect.USER32(?,?,?), ref: 0042D2EE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: CallClientMessageProcRectScreenWindow
                        • String ID:
                        • API String ID: 2980354656-0
                        • Opcode ID: 7a72edbe208eb9f7f80a718336dc999f757fa1644bf2837c0e2e88546a471468
                        • Instruction ID: 2b02a2273540d2a3acd45090b37fce7c15d31cc95de6c475789917453dd6b7b5
                        • Opcode Fuzzy Hash: 7a72edbe208eb9f7f80a718336dc999f757fa1644bf2837c0e2e88546a471468
                        • Instruction Fuzzy Hash: 0D11A372E00229AF8F219F94DC898AFBFB9FB04315B504166EC45E2210D7359911D794
                        APIs
                        • SendMessageW.USER32(?,00000419,?,00000000), ref: 004254F9
                        • SendMessageW.USER32(?,0000041D,00000000,?), ref: 00425506
                        • ClientToScreen.USER32(?), ref: 00425527
                        • SendMessageW.USER32(?,00000403,?,00000001), ref: 00425538
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: MessageSend$ClientScreen
                        • String ID:
                        • API String ID: 1264711397-0
                        • Opcode ID: 21e99f49a25e7fbfcdc5034213d00d10bced2840db0a81dce533fe62294a2d52
                        • Instruction ID: 10029316b969c1ebf7fa3ffa1d4ece043839d52826b7b2918982b16436b64cd7
                        • Opcode Fuzzy Hash: 21e99f49a25e7fbfcdc5034213d00d10bced2840db0a81dce533fe62294a2d52
                        • Instruction Fuzzy Hash: BA01EDB6600308BFD714DF59DC85E9ABBE8EF48710F00841DFA5AA7291D6B0A940CF64
                        APIs
                        • GetClientRect.USER32(00000000,00000000), ref: 0042D600
                        • GetWindowLongW.USER32(00000000,000000EC), ref: 0042D622
                        • DrawEdge.USER32(?,0000200F,0000000A,0000200F), ref: 0042D63D
                        • FillRect.USER32(?,?,0000000D), ref: 0042D64C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: Rect$ClientDrawEdgeFillLongWindow
                        • String ID:
                        • API String ID: 3481374107-0
                        • Opcode ID: e8cfec484e0ef5a0949931e2ad442549fda3965c659d69b96471c2229f3c6ed5
                        • Instruction ID: 96f4ce3220ef17525b354dea075bca18e00ecb8dabc2a2a3ce0780306437d17c
                        • Opcode Fuzzy Hash: e8cfec484e0ef5a0949931e2ad442549fda3965c659d69b96471c2229f3c6ed5
                        • Instruction Fuzzy Hash: 05012132900219BFDB109F64DC49FAABBB8FB54750F004926F955F2160D770A9058B95
                        APIs
                        • InterlockedExchange.KERNEL32(004808E8,00000001), ref: 004380C8
                        • InitializeCriticalSection.KERNEL32(004808D0,?,?,?,00422D81), ref: 004380D3
                        • EnterCriticalSection.KERNEL32(004808D0,?,?,?,0042CB90,?,?,00470638,?,?,?,00422D81), ref: 00438112
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: CriticalSection$EnterExchangeInitializeInterlocked
                        • String ID:
                        • API String ID: 3643093385-0
                        • Opcode ID: d66494a0eb13fe10eba1f62d4e9df0684cb66f902e58c6fc4cb43092a07d42e0
                        • Instruction ID: c9d80109e13dfd4b469843542c2470c3f20b05a7db7b7469771456da1fb489db
                        • Opcode Fuzzy Hash: d66494a0eb13fe10eba1f62d4e9df0684cb66f902e58c6fc4cb43092a07d42e0
                        • Instruction Fuzzy Hash: 7CF04930B80300D7D9A0B7546C85A1F73A4EB48351F20243FF504E0102CD6848C9679D
                        APIs
                          • Part of subcall function 00435E57: GetSysColor.USER32(00000004), ref: 00435E70
                          • Part of subcall function 00435E57: CreateSolidBrush.GDI32(00202020), ref: 00435E79
                        • GetCurrentThreadId.KERNEL32 ref: 00435EC8
                        • SetWindowsHookExW.USER32(000000FF,0043607A,00000000,00000000), ref: 00435ED9
                        • TrackPopupMenuEx.USER32(00000001,?,?,?,?,00000000), ref: 00435EFB
                          • Part of subcall function 00435BC2: SendMessageW.USER32(?,00000403,?,?), ref: 00435BDA
                        • UnhookWindowsHookEx.USER32(?), ref: 00435F17
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: HookWindows$BrushColorCreateCurrentMenuMessagePopupSendSolidThreadTrackUnhook
                        • String ID:
                        • API String ID: 848778860-0
                        • Opcode ID: 1d873a512fcda4e245097d57ed7911f59a8c40b2c60a321dac30504288063662
                        • Instruction ID: cf64ac5a47d6376922e15437f2d7f2f83126d17ed40067883966b7e05527ed14
                        • Opcode Fuzzy Hash: 1d873a512fcda4e245097d57ed7911f59a8c40b2c60a321dac30504288063662
                        • Instruction Fuzzy Hash: 81015672100204BFEBA25F56EC8985ABFF9EFA8720B10552EF41992270C7B568909F58
                        APIs
                        • EndDialog.USER32(?,00000000), ref: 0041F6D6
                        • GetDlgItem.USER32(?,0000041D), ref: 0041F6F3
                        • GetDlgItem.USER32(?,000003F7), ref: 0041F74C
                        • SendMessageW.USER32(00000000), ref: 0041F753
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: Item$DialogMessageSend
                        • String ID:
                        • API String ID: 2485852401-0
                        • Opcode ID: 3216459fc540d4e531237b778d380bc645650f6ab5a306c85b629d0275c759bf
                        • Instruction ID: 4589bec126f157b5648a86f0faf83c62447a804bef39f48419c5bfca6cf3ada6
                        • Opcode Fuzzy Hash: 3216459fc540d4e531237b778d380bc645650f6ab5a306c85b629d0275c759bf
                        • Instruction Fuzzy Hash: 27F03673644308B7DB115F78DD89FDA3F69A704750F104032B609AA1E1C679D9C2975C
                        APIs
                        • __EH_prolog.LIBCMT ref: 0042172D
                        • SendMessageW.USER32(?,00000440,?,00000000), ref: 00421798
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: H_prologMessageSend
                        • String ID: 4AD
                        • API String ID: 2337391251-1156607891
                        • Opcode ID: 7c7efd9a41c4564eb31d483a36773584485011917f6f380ef5ccd48d1d8448ba
                        • Instruction ID: 733a4daa048f09d878c84373d9e27e6e514a652ddd9bfd7e8f13655adea388da
                        • Opcode Fuzzy Hash: 7c7efd9a41c4564eb31d483a36773584485011917f6f380ef5ccd48d1d8448ba
                        • Instruction Fuzzy Hash: 06116A72D14248EBDB10DFA9D845BDEFBB8BF54318F10816AE251B71D0C7B85648CBA8
                        APIs
                        • __EH_prolog.LIBCMT ref: 004217CB
                          • Part of subcall function 0043226F: __EH_prolog.LIBCMT ref: 00432274
                          • Part of subcall function 0043226F: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,00000400,?,?,00000000,00456830,?), ref: 0043234B
                          • Part of subcall function 004323BC: __EH_prolog.LIBCMT ref: 004323C1
                          • Part of subcall function 004323BC: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000004,00000080,00000000,00000000,?,?,?,0042181D,00456830,?,00000000,00000000), ref: 004323E2
                          • Part of subcall function 004323BC: WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000,00456830,?,?,0042181D,00456830,?,00000000,00000000,?), ref: 0043240B
                          • Part of subcall function 004323BC: WriteFile.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,?,0042181D,00456830,?,00000000,00000000,?), ref: 00432428
                          • Part of subcall function 004323BC: CloseHandle.KERNEL32(00000000,?,?,0042181D,00456830,?,00000000,00000000,?,?,?,00421E9B,?,?,?,?), ref: 0043242B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: FileH_prolog$Write$CloseCreateHandlelstrlen
                        • String ID: 0hE$4AD
                        • API String ID: 1478509966-3579489994
                        • Opcode ID: 2a0967ffddc51ba83c71f050ea1981077daa5538e582c75cfa8f3ba9a157e76a
                        • Instruction ID: 9e83c795c787fddd3087b27f22b1da45db781b12704cccbdf9cbf08cfdd3352a
                        • Opcode Fuzzy Hash: 2a0967ffddc51ba83c71f050ea1981077daa5538e582c75cfa8f3ba9a157e76a
                        • Instruction Fuzzy Hash: 7C018672915115ABEB08EB95E906ABF73B8EF09324F10552FF051A31C0DB785A048AA9
                        APIs
                        • SHGetFileInfoW.SHELL32(C:\,00000000,00004001,000002B4,00004001), ref: 00435438
                        • SHGetFileInfoW.SHELL32(C:\,00000000,?,000002B4,00004000), ref: 0043544B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: FileInfo
                        • String ID: C:\
                        • API String ID: 4041567068-3404278061
                        • Opcode ID: 01dc84b88e69e622cc95e543275c728969252cc4be772f7a86a4fbfaad203ff7
                        • Instruction ID: 1c494cc5095be1daaf244086f18a01e1dbc19f33f732a340317776a5c34a2c14
                        • Opcode Fuzzy Hash: 01dc84b88e69e622cc95e543275c728969252cc4be772f7a86a4fbfaad203ff7
                        • Instruction Fuzzy Hash: 99F012B25007046FF324DA15FD80B67B7DCEBC5704F41883AB650A7291D7B569088B6A
                        APIs
                          • Part of subcall function 00425052: wsprintfW.USER32 ref: 00425084
                          • Part of subcall function 00424F77: lstrcatW.KERNEL32(?,00000000,?,00425030,?,?,?,?,?,753D5540), ref: 00424FE3
                        • lstrcatW.KERNEL32(?, + ,?,?,?,753D5540), ref: 0042503F
                        • lstrcatW.KERNEL32(?,?,?,?,?,753D5540), ref: 00425049
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$wsprintf
                        • String ID: +
                        • API String ID: 3128662910-2316452435
                        • Opcode ID: 9d691adb5465460d9d67230d8dad96486cfee40a2408d7953968010c8d6e6f81
                        • Instruction ID: 31f09c5765a734f01087b9e08a0d40a2a40db7a6571c408345fa732e7d9f4246
                        • Opcode Fuzzy Hash: 9d691adb5465460d9d67230d8dad96486cfee40a2408d7953968010c8d6e6f81
                        • Instruction Fuzzy Hash: 72F090339002196BEB10AB55EC85FAA3BB9FB84710F0040A6F918A6152E375AA55CF95
                        APIs
                        • GetSysColor.USER32(00000004), ref: 00435E70
                        • CreateSolidBrush.GDI32(00202020), ref: 00435E79
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: BrushColorCreateSolid
                        • String ID:
                        • API String ID: 2798526982-1776720792
                        • Opcode ID: aaca61e81d3d844478bb37b696ac1b44aa490725bc7ce6fe2d2d7237d7cd6fc2
                        • Instruction ID: 3dd9d888673b6d09164eca94f326f92a682deda0ecca37f3c94d09e4dc8b9edb
                        • Opcode Fuzzy Hash: aaca61e81d3d844478bb37b696ac1b44aa490725bc7ce6fe2d2d7237d7cd6fc2
                        • Instruction Fuzzy Hash: C8F08973904205AFEF04AFA4E846BEF7BB9DB54314F10402AEE00F7286D67555054BE9
                        APIs
                        • GetModuleHandleW.KERNEL32(shell32,004212C7,0000000E,?,00000001), ref: 004354F7
                        • LoadIconW.USER32(?,00000001), ref: 0043550D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1625884948.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1625859479.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625928161.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1625952340.0000000000444000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000481000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626032229.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626085788.000000000049E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626107435.00000000004AA000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626128541.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626150548.00000000004B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626169096.00000000004B9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626191889.00000000004BE000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626217666.00000000004C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626236299.00000000004C9000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626257359.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626288901.00000000004FB000.00000080.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1626308609.00000000004FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_QuickTextPaste.jbxd
                        Yara matches
                        Similarity
                        • API ID: HandleIconLoadModule
                        • String ID: shell32
                        • API String ID: 3495291681-4179111565
                        • Opcode ID: 03b9c54a1b8e5c80b5bd845499610cc0e2a2e66cb0a35801c504cfa6e16a83cf
                        • Instruction ID: e6696932341dcb94caecbd5586413caec97c01d6295ff654805490fc0b1eae49
                        • Opcode Fuzzy Hash: 03b9c54a1b8e5c80b5bd845499610cc0e2a2e66cb0a35801c504cfa6e16a83cf
                        • Instruction Fuzzy Hash: 49D05B702205006A67D05F209C4862736D89A04701B10343EB005C2154E734E944FF1C
                        Memory Dump Source
                        • Source File: 00000003.00000002.3863445424.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_5730000_csc.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3c9e026156fec3feaf7b6a3671e6d601a6a289c022718a94ce29d5c74953424e
                        • Instruction ID: f664ba2553f76e574978a20b6ebe04e3d0ae99cb7b1bfdd128ad1d3fc4d12c34
                        • Opcode Fuzzy Hash: 3c9e026156fec3feaf7b6a3671e6d601a6a289c022718a94ce29d5c74953424e
                        • Instruction Fuzzy Hash: EF416472E043599FCB10CFAAD8057EEBBF5FF89220F15856AD408A7241EB749844CBE0
                        APIs
                        • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,0573B45A), ref: 0573B547
                        Memory Dump Source
                        • Source File: 00000003.00000002.3863445424.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_5730000_csc.jbxd
                        Similarity
                        • API ID: GlobalMemoryStatus
                        • String ID:
                        • API String ID: 1890195054-0
                        • Opcode ID: dd03e1a61243d55e7cd754ebaf4b83378f1750fda82b42bd530f8e231d512ac2
                        • Instruction ID: c283e2984ec570f3baf4b4c35fde5d8cad468c328e53425b521342627a557004
                        • Opcode Fuzzy Hash: dd03e1a61243d55e7cd754ebaf4b83378f1750fda82b42bd530f8e231d512ac2
                        • Instruction Fuzzy Hash: 021130B1C046599BCB10CF9AC445BAEFBF4FB48320F10816AE818A7241D3B8A944CFE5